Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Data Mining

    Practical Machine Learning Tools and Techniques
    • 3rd Edition
    • Ian H. Witten + 2 more
    • English
    Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining. Thorough updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including new material on Data Transformations, Ensemble Learning, Massive Data Sets, Multi-instance Learning, plus a new version of the popular Weka machine learning software developed by the authors. Witten, Frank, and Hall include both tried-and-true techniques of today as well as methods at the leading edge of contemporary research. The book is targeted at information systems practitioners, programmers, consultants, developers, information technology managers, specification writers, data analysts, data modelers, database R&D professionals, data warehouse engineers, data mining professionals. The book will also be useful for professors and students of upper-level undergraduate and graduate-level data mining and machine learning courses who want to incorporate data mining as part of their data management knowledge base and expertise.
  • Thoughts on Interaction Design

    • 2nd Edition
    • Jon Kolko
    • English
    Thoughts on Interaction Design, Second Edition, contemplates and contributes to the theory of Interaction Design by exploring the semantic connections that live between technology and form that are brought to life when someone uses a product. It defines Interaction Design in a way that emphasizes the intellectual and cultural facets of the discipline. This edition explores how changes in the economic climate, increased connectivity, and international adoption of technology affect designing for behavior and the nature of design itself. Ultimately, the text exists to provide a definition that encompasses the intellectual facets of the field, the conceptual underpinnings of interaction design as a legitimate human-centered field, and the particular methods used by practitioners in their day-to-day experiences. This text is recommended for practicing designers: interaction designers, industrial designers, UX practitioners, graphic designers, interface designers, and managers.
  • Windows Registry Forensics

    Advanced Digital Forensic Analysis of the Windows Registry
    • 1st Edition
    • Harlan Carvey
    • English
    Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book. This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc.
  • Developing High Quality Data Models

    • 1st Edition
    • Matthew West
    • English
    Developing High Quality Data Models provides an introduction to the key principles of data modeling. It explains the purpose of data models in both developing an Enterprise Architecture and in supporting Information Quality; common problems in data model development; and how to develop high quality data models, in particular conceptual, integration, and enterprise data models. The book is organized into four parts. Part 1 provides an overview of data models and data modeling including the basics of data model notation; types and uses of data models; and the place of data models in enterprise architecture. Part 2 introduces some general principles for data models, including principles for developing ontologically based data models; and applications of the principles for attributes, relationship types, and entity types. Part 3 presents an ontological framework for developing consistent data models. Part 4 provides the full data model that has been in development throughout the book. The model was created using Jotne EPM Technologys EDMVisualExpress data modeling tool. This book was designed for all types of modelers: from those who understand data modeling basics but are just starting to learn about data modeling in practice, through to experienced data modelers seeking to expand their knowledge and skills and solve some of the more challenging problems of data modeling.
  • Securing SQL Server

    Protecting Your Database from Attackers
    • 1st Edition
    • Denny Cherry
    • English
    Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.
  • Using Robots in Hazardous Environments

    Landmine Detection, De-Mining and Other Applications
    • 1st Edition
    • Y Baudoin + 1 more
    • English
    There have been major recent advances in robotic systems that can replace humans in undertaking hazardous activities in demanding or dangerous environments. Published in association with the CLAWAR (Climbing and Walking Robots and Associated Technologies Association) (www.clawar.org), this important book reviews the development of robotic systems for de-mining and other risky activities such as fire-fighting.Part one provides an overview of the use of robots for humanitarian de-mining work. Part two discusses the development of sensors for mine detection whilst Part thee reviews developments in both teleoperated and autonomous robots. Building on the latter, Part four concentrates on robot autonomous navigation. The final part of the book reviews research on multi-agent-systems (MAS) and the multi-robotics-syste... (MRS), promising tools that take into account modular design of mobile robots and the use of several robots in multi-task missions.With its distinguished editors and international team of contributors, Using robots in hazardous environments: landmine detection, de-mining and other applications is a standard reference for all those researching the use of robots in hazardous environments as well as government and other agencies wishing to use robots for dangerous tasks such as landmine detection and disposal.
  • Understanding Motion Capture for Computer Animation

    • 2nd Edition
    • Alberto Menache
    • English
    Understanding Motion Capture for Computer Animation discusses the latest technology developments in digital design, film, games, medicine, sports, and security engineering. Motion capture records a live-motion event and translates it into a digital context. It is the technology that converts a live performance into a digital performance. In contrast, performance animation is the actual performance that brings life to the character, even without using technology. If motion capture is the collection of data that represents motion, performance animation is the character that a performer represents. The book offers extensive information about motion capture. It includes state-of-the-art technology, methodology, and developments in the current motion-capture industry. In particular, the different ways to capture motions are discussed, including using cameras or electromagnetic fields in tracking a group of sensors. This book will be useful for students taking a course about digital filming, as well as for anyone who is interested in this topic.
  • Web Application Obfuscation

    '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
    • 1st Edition
    • Mario Heiderich + 3 more
    • English
    Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
  • Entity Resolution and Information Quality

    • 1st Edition
    • John R. Talburt
    • English
    Entity Resolution and Information Quality presents topics and definitions, and clarifies confusing terminologies regarding entity resolution and information quality. It takes a very wide view of IQ, including its six-domain framework and the skills formed by the International Association for Information and Data Quality {IAIDQ). The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable.
  • E-books in Academic Libraries

    • 1st Edition
    • Ksenija Mincic-Obradovic
    • English
    Written from the perspective of a librarian, this book offers a comprehensive overview of the impact of e-books on academic libraries. The author discusses advantages to both researchers and librarians and provides current examples of innovative uses of e-books in academic contexts. This book reviews the current situation in e-book publishing, and describes problems in managing e-books in libraries caused by the variety of purchase models and varying formats available, and the lack of standardisation. It discusses solutions for providing access and maintaining bibliographic control, looks at various initiatives to publicise and promote e-books, and compares e-book usage surveys to track changes in user preferences and behaviour over the last decade. E-books have already had a huge impact on academic libraries, and major advances in technology will bring further changes. There is a need for collaboration between libraries and publishers. The book concludes with reflections on the future of e-books in academic libraries.