Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Applications of ATILA FEM Software to Smart Materials

    Case Studies in Designing Devices
    • 1st Edition
    • Kenji Uchino + 1 more
    • English
    ATILA Finite Element Method (FEM) software facilitates the modelling and analysis of applications using piezoelectric, magnetostrictor and shape memory materials. It allows entire designs to be constructed, refined and optimized before production begins. Through a range of instructive case studies, Applications of ATILA FEM software to smart materials provides an indispensable guide to the use of this software in the design of effective products.Part one provides an introduction to ATILA FEM software, beginning with an overview of the software code. New capabilities and loss integration are discussed, before part two goes on to present case studies of finite element modelling using ATILA. The use of ATILA in finite element analysis, piezoelectric polarization, time domain analysis of piezoelectric devices and the design of ultrasonic motors is considered, before piezo-composite and photonic crystal applications are reviewed. The behaviour of piezoelectric single crystals for sonar and thermal analysis in piezoelectric and magnetostrictive materials is also discussed, before a final reflection on the use of ATILA in modelling the damping of piezoelectric structures and the behaviour of single crystal devices.With its distinguished editors and international team of expert contributors, Applications of ATILA FEM software to smart materials is a key reference work for all those involved in the research, design, development and application of smart materials, including electrical and mechanical engineers, academics and scientists working in piezoelectrics, magenetostrictors and shape memory materials.
  • Augmented Reality

    An Emerging Technologies Guide to AR
    • 1st Edition
    • Joseph Rampolla + 1 more
    • English
    With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
  • The Basics of Cyber Warfare

    Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    • 1st Edition
    • Jason Andress + 1 more
    • English
    The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
  • Advanced Persistent Threat

    Understanding the Danger and How to Protect Your Organization
    • 1st Edition
    • Eric Cole
    • English
    The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
  • Data Insights

    New Ways to Visualize and Make Sense of Data
    • 1st Edition
    • Hunter Whitney
    • English
    Data Insights: New Ways to Visualize and Make Sense of Data offers thought-provoking insights into how visualization can foster a clearer and more comprehensive understanding of data. The book offers perspectives from people with different backgrounds, including data scientists, statisticians, painters, and writers. It argues that all data is useless, or misleading, if we do not know what it means.Organized into seven chapters, the book explores some of the ways that data visualization and other emerging approaches can make data meaningful and therefore useful. It also discusses some fundamental ideas and basic questions in the data lifecycle; the process of interactions between people, data, and displays that lead to better questions and more useful answers; and the fundamentals, origins, and purposes of the basic building blocks that are used in data visualization. The reader is introduced to tried and true approaches to understanding users in the context of user interface design, how communications can get distorted, and how data visualization is related to thinking machines. Finally, the book looks at the future of data visualization by assessing its strengths and weaknesses. Case studies from business analytics, healthcare, network monitoring, security, and games, among others, as well as illustrations, thought-provoking quotes, and real-world examples are included.This book will prove useful to computer professionals, technical marketing professionals, content strategists, Web and product designers, and researchers.
  • CUDA Programming

    A Developer's Guide to Parallel Computing with GPUs
    • 1st Edition
    • Shane Cook
    • English
    If you need to learn CUDA but don't have experience with parallel computing, CUDA Programming: A Developer's Introduction offers a detailed guide to CUDA with a grounding in parallel fundamentals. It starts by introducing CUDA and bringing you up to speed on GPU parallelism and hardware, then delving into CUDA installation. Chapters on core concepts including threads, blocks, grids, and memory focus on both parallel and CUDA-specific issues. Later, the book demonstrates CUDA in practice for optimizing applications, adjusting to new hardware, and solving common problems.
  • Heterogeneous Computing with OpenCL

    Revised OpenCL 1.2 Edition
    • 2nd Edition
    • Benedict Gaster + 4 more
    • English
    Heterogeneous Computing with OpenCL, Second Edition teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. It is the first textbook that presents OpenCL programming appropriate for the classroom and is intended to support a parallel programming course. Students will come away from this text with hands-on experience and significant knowledge of the syntax and use of OpenCL to address a range of fundamental parallel algorithms. Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, Heterogeneous Computing with OpenCL explores memory spaces, optimization techniques, graphics interoperability, extensions, and debugging and profiling. It includes detailed examples throughout, plus additional online exercises and other supporting materials that can be downloaded at http://www.heterogen... This book will appeal to software engineers, programmers, hardware engineers, and students/advanced students.
  • Violent Python

    A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
    • 1st Edition
    • TJ O'Connor
    • English
    Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
  • Computer and Information Security Handbook

    • 2nd Edition
    • John Vacca
    • English
    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
  • Open Source Software in Life Science Research

    Practical Solutions to Common Challenges in the Pharmaceutical Industry and Beyond
    • 1st Edition
    • Lee Harland + 1 more
    • English
    The free/open source approach has grown from a minor activity to become a significant producer of robust, task-orientated software for a wide variety of situations and applications. To life science informatics groups, these systems present an appealing proposition - high quality software at a very attractive price. Open source software in life science research considers how industry and applied research groups have embraced these resources, discussing practical implementations that address real-world business problems.The book is divided into four parts. Part one looks at laboratory data management and chemical informatics, covering software such as Bioclipse, OpenTox, ImageJ and KNIME. In part two, the focus turns to genomics and bioinformatics tools, with chapters examining GenomicsTools and EBI Atlas software, as well as the practicalities of setting up an ‘omics’ platform and managing large volumes of data. Chapters in part three examine information and knowledge management, covering a range of topics including software for web-based collaboration, open source search and visualisation technologies for scientific business applications, and specific software such as DesignTracker and Utopia Documents. Part four looks at semantic technologies such as Semantic MediaWiki, TripleMap and Chem2Bio2RDF, before part five examines clinical analytics, and validation and regulatory compliance of free/open source software. Finally, the book concludes by looking at future perspectives and the economics and free/open source software in industry.