Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Penetration Tester's Open Source Toolkit

    • 3rd Edition
    • Jeremy Faircloth
    • English
    Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
  • Deploying Next Generation Multicast-enabled Applications

    Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet
    • 1st Edition
    • Vinod Joseph + 1 more
    • English
    Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards—next-gener... Multicast-based standards, Multicast Applications, and case studies with detailed configurations. Focusing on three vendors—Juniper, Cisco, and Alcatel-Lucent—the text features illustrations that contain configurations of JUNOS, TiMOS (Alcatel’s OS), or Cisco IOS, and each configuration is explained in great detail. Multiple- rather than single-vendor configurations were selected for the sake of diversity as well as to highlight the direction in which the overall industry is going rather than that of a specific vendor. Beginning with a discussion of the building blocks or basics of IP Multicast, the book then details applications and emerging trends, including vendor adoptions, as well as the future of Multicast.The book is written for engineers, technical managers, and visionaries engaged in the development of next-generation IP Multicast infrastructures.
  • Computer Technology for Textiles and Apparel

    • 1st Edition
    • Jinlian Hu
    • English
    Computer technology has transformed textiles from their design through to their manufacture and has contributed to significant advances in the textile industry. Computer technology for textiles and apparel provides an overview of these innovative developments for a wide range of applications, covering topics including structure and defect analysis, modelling and simulation, and apparel design.The book is divided into three parts. Part one provides a review of different computer-based technologies suitable for textile materials, and includes chapters on computer technology for yarn and fabric structure analysis, defect analysis and measurement. Chapters in part two discuss modelling and simulation principles of fibres, yarns, textiles and garments, while part three concludes with a review of computer-based technologies specific to apparel and apparel design, with themes ranging from 3D body scanning to the teaching of computer-aided design to fashion students.With its distinguished editor and international team of expert contributors, Computer technology for textiles and apparel is an invaluable tool for a wide range of people involved in the textile industry, from designers and manufacturers to fibre scientists and quality inspectors.
  • Information Dynamics in Virtual Worlds

    Gaming and Beyond
    • 1st Edition
    • Woody Evans
    • English
    Presents a broad examination of the nature of virtual worlds and the potential they provide in managing and expressing information practices through that medium, grounding information professionals and students of new media in the fundamental elements of virtual worlds and online gaming. The book details the practical issues in finding and using information in virtual environments and presents a general theory of librarianship as it relates to virtual gaming worlds. It is encompassed by a set of best practice methods that libraries can effectively execute in their own environments, meeting the needs of this new generation of library user, and explores ways in which information literacy can be approached in virtual worlds. Final chapters examine how conventional information evaluation skills work falls short in virtual worlds online.
  • The Basics of Information Security

    Understanding the Fundamentals of InfoSec in Theory and Practice
    • 1st Edition
    • Jason Andress
    • English
    The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
  • Data Mining: Concepts and Techniques

    • 3rd Edition
    • Jiawei Han + 2 more
    • English
    Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining and the tools used in discovering knowledge from the collected data. This book is referred as the knowledge discovery from data (KDD). It focuses on the feasibility, usefulness, effectiveness, and scalability of techniques of large data sets. After describing data mining, this edition explains the methods of knowing, preprocessing, processing, and warehousing data. It then presents information about data warehouses, online analytical processing (OLAP), and data cube technology. Then, the methods involved in mining frequent patterns, associations, and correlations for large data sets are described. The book details the methods for data classification and introduces the concepts and methods for data clustering. The remaining chapters discuss the outlier detection and the trends, applications, and research frontiers in data mining. This book is intended for Computer Science students, application developers, business professionals, and researchers who seek information on data mining.
  • Heuristic Search

    Theory and Applications
    • 1st Edition
    • Stefan Edelkamp + 1 more
    • English
    Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as pattern databases and search with efficient use of external memory and parallel processing units on main boards and graphics cards are detailed. Heuristic search as a problem solving tool is demonstrated in applications for puzzle solving, game playing, constraint satisfaction and machine learning. While no previous familiarity with heuristic search is necessary the reader should have a basic knowledge of algorithms, data structures, and calculus. Real-world case studies and chapter ending exercises help to create a full and realized picture of how search fits into the world of artificial intelligence and the one around us.
  • Security on the Web

    • 1st Edition
    • Volume 83
    • Marvin Zelkowitz
    • English
    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.
  • Semantic Web for the Working Ontologist

    Effective Modeling in RDFS and OWL
    • 2nd Edition
    • Dean Allemang + 1 more
    • English
    Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Second Edition, discusses the capabilities of Semantic Web modeling languages, such as RDFS (Resource Description Framework Schema) and OWL (Web Ontology Language). Organized into 16 chapters, the book provides examples to illustrate the use of Semantic Web technologies in solving common modeling problems. It uses the life and works of William Shakespeare to demonstrate some of the most basic capabilities of the Semantic Web. The book first provides an overview of the Semantic Web and aspects of the Web. It then discusses semantic modeling and how it can support the development from chaotic information gathering to one characterized by information sharing, cooperation, and collaboration. It also explains the use of RDF to implement the Semantic Web by allowing information to be distributed over the Web, along with the use of SPARQL to access RDF data. Moreover, the reader is introduced to components that make up a Semantic Web deployment and how they fit together, the concept of inferencing in the Semantic Web, and how RDFS differs from other schema languages. Finally, the book considers the use of SKOS (Simple Knowledge Organization System) to manage vocabularies by taking advantage of the inferencing structure of RDFS-Plus. This book is intended for the working ontologist who is trying to create a domain model on the Semantic Web.
  • Do You Web 2.0?

    Public Libraries and Social Networking
    • 1st Edition
    • Linda Berube
    • English
    Web 2.0 technology is a hot topic at the moment, and public librarians in particular are beginning to feel the pressure to apply these tools. Indeed, Web 2.0 has the potential to transform library services, but only if the policy and strategy for those services are ready to be transformed. The author not only reviews these tools and provides practical advice and case studies on how they can be applied in the public library setting, but also recommends the policies and business cases that begin to create a new strategy for public libraries.