Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Network and System Security

    • 2nd Edition
    • John Vacca
    • English
    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
  • Big Data Analytics

    From Strategic Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph
    • 1st Edition
    • David Loshin
    • English
    Big Data Analytics will assist managers in providing an overview of the drivers for introducing big data technology into the organization and for understanding the types of business problems best suited to big data analytics solutions, understanding the value drivers and benefits, strategic planning, developing a pilot, and eventually planning to integrate back into production within the enterprise.
  • Cyber Security and IT Infrastructure Protection

    • 1st Edition
    • John Vacca
    • English
    This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
  • Credible Checklists and Quality Questionnaires

    A User-Centered Design Method
    • 1st Edition
    • Chauncey Wilson
    • English
    Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method. In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a difficult task. This chapter discusses being mindful of the choice of words, order of questions and how early questions influence later questions, answer scales and how they impact the user response, questionnaire design, and much more. The final chapter provides examples of some common questionnaires (both free and fee-based) for assessing the usability of products. After reading this book, readers will be able to use these user design tools with greater confidence and certainty.
  • Managing Information Security

    • 2nd Edition
    • John Vacca
    • English
    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
  • FISMA Compliance Handbook

    Second Edition
    • 1st Edition
    • Laura P. Taylor
    • English
    This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
  • X-Ways Forensics Practitioner’s Guide

    • 1st Edition
    • Brett Shavers + 1 more
    • English
    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
  • Security Risks in Social Media Technologies

    Safe Practices in Public Service Applications
    • 1st Edition
    • Alan Oxley
    • English
    Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
  • Computer-Aided Vaccine Design

    • 1st Edition
    • Joo Chuan Tong + 1 more
    • English
    Computational pre-screening of antigens is now routinely applied to the discovery of vaccine candidates.Computer-... vaccine design is a comprehensive introduction to this exciting field of study. The book is intended to be a textbook for researchers and for courses in bioinformatics, as well as a laboratory reference guide. It is written mainly for biologists who want to understand the current methods of computer-aided vaccine design. The contents are designed to help biologists appreciate the underlying concepts and algorithms used, as well as limitations of the methods and strategies for their use. Chapters include: MHC and T cell responses; Immunoglobulins and B cell responses; Scientific publications and databases; Database design; Computational T cell vaccine design; Computational B cell vaccine design; infectious disease informatics; Vaccine safety and quality assessments; and Vaccine adjuvant informatics.
  • Up and Running with AutoCAD 2014

    2D and 3D Drawing and Modeling
    • 1st Edition
    • Elliot J. Gindis
    • English
    Get "Up and Running" with AutoCAD using Gindis’s combination of step-by-step instruction, examples, and insightful explanations. The emphasis from the beginning is on core concepts and practical application of AutoCAD in architecture, engineering and design. Equally useful in instructor-led classroom training, self-study, or as a professional reference, the book is written with the user in mind by a long-time AutoCAD professional and instructor based on what works in the industry and the classroom.