Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Computer Architecture

    A Quantitative Approach
    • 5th Edition
    • John L. Hennessy + 1 more
    • English
    Computer Architecture: A Quantitative Approach, Fifth Edition, explores the ways that software and technology in the cloud are accessed by digital media, such as cell phones, computers, tablets, and other mobile devices. The book, which became a part of Intel's 2012 recommended reading list for developers, covers the revolution of mobile computing. It also highlights the two most important factors in architecture today: parallelism and memory hierarchy.This fully updated edition is comprised of six chapters that follow a consistent framework: explanation of the ideas in each chapter; a crosscutting issues section, which presents how the concepts covered in one chapter connect with those given in other chapters; a putting it all together section that links these concepts by discussing how they are applied in real machine; and detailed examples of misunderstandings and architectural traps commonly encountered by developers and architects. Formulas for energy, static and dynamic power, integrated circuit costs, reliability, and availability are included. The book also covers virtual machines, SRAM and DRAM technologies, and new material on Flash memory. Other topics include the exploitation of instruction-level parallelism in high-performance processors, superscalar execution, dynamic scheduling and multithreading, vector architectures, multicore processors, and warehouse-scale computers (WSCs). There are updated case studies and completely new exercises. Additional reference appendices are available online.This book will be a valuable reference for computer architects, programmers, application developers, compiler and system software developers, computer system designers and application developers.
  • OCEB Certification Guide

    Business Process Management - Fundamental Level
    • 1st Edition
    • Tim Weilkiens
    • English
    OCEB Certification Guide delivers expert insight into BPM from one of the developers of the OCEB Fundamental exam, offering full coverage of the exam material for both the business and technical tracks. The first study guide to prepare candidates to take and pass the OCEB Fundamental exam, it explains and builds on basic concepts, focusing on key areas and testing knowledge of all critical topics with sample questions and detailed answers. Suitable for practitioners and those newer to the field, this book provides a solid grounding in business process management based on the authors’ own extensive BPM consulting experience.
  • Digital Forensics for Legal Professionals

    Understanding Digital Evidence from the Warrant to the Courtroom
    • 1st Edition
    • Larry Daniel + 1 more
    • English
    Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again and again: "What do I ask for?" "Is the evidence relevant?" "What does this item in the forensic report mean?" "What should I ask the other expert?" "What should I ask you?" "Can you explain that to a jury?" This book answers many of those questions in clear language that is understandable by non-technical people. With many illustrations and diagrams that will be usable in court, it explains technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries. The book also explains how to determine what evidence to ask for, evidence that might be discoverable, and furthermore, it provides an overview of the current state of digital forensics, the right way to select a qualified expert, what to expect from that expert, and how to properly use experts before and during trial. With this book, readers will clearly understand different types of digital evidence and examples of direct and cross examination questions. It includes a reference of definitions of digital forensic terms, relevant case law, and resources. This book will be a valuable resource for attorneys, judges, paralegals, and digital forensic professionals.
  • Introduction to the Theory of Linear Partial Differential Equations

    • 1st Edition
    • Volume 14
    • J. Chazarain + 1 more
    • English
  • Theories of Computational Complexity

    • 1st Edition
    • Volume 35
    • C. Calude
    • English
    This volume presents four machine-independent theories of computational complexity, which have been chosen for their intrinsic importance and practical relevance. The book includes a wealth of results - classical, recent, and others which have not been published before.In developing the mathematics underlying the size, dynamic and structural complexity measures, various connections with mathematical logic, constructive topology, probability and programming theories are established. The facts are presented in detail. Extensive examples are provided, to help clarify notions and constructions. The lists of exercises and problems include routine exercises, interesting results, as well as some open problems.
  • Mathematical Models in Environmental Problems

    • 1st Edition
    • Volume 16
    • G.I. Marchuk
    • English
  • Probabilities and Potential, C

    Potential Theory for Discrete and Continuous Semigroups
    • 1st Edition
    • Volume 151
    • C. Dellacherie + 1 more
    • English
    This third volume of the monograph examines potential theory. The first chapter develops potential theory with respect to a single kernel (or discrete time semigroup). All the essential ideas of the theory are presented: excessive functions, reductions, sweeping, maximum principle. The second chapter begins with a study of the notion of reduction in the most general situation possible - the ``gambling house'' of Dubins and Savage. The beautiful results presented have never been made accessible to a wide public. These are then connected with the theory of sweeping with respect to a cone of continuous functions, and the integral representation in compact convex sets. The third chapter presents new or little-known results, with the aim of illustrating the effectiveness of capacitary methods in the most varied fields. The last two chapters are concerned with the theory of resolvents.The fourth and last part of the English edition will be devoted to the theory of Markov processes.
  • Probabilities and Potential, B

    Theory of Martingales
    • 1st Edition
    • Volume 72
    • C. Dellacherie + 1 more
    • English
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 1st Edition
    • Eric D. Knapp + 1 more
    • English
    Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
  • IMS Application Developer's Handbook

    Creating and Deploying Innovative IMS Applications
    • 1st Edition
    • Rogier Noldus + 5 more
    • English
    IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.