Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Presentations for Librarians

    A Complete Guide to Creating Effective, Learner-Centred Presentations
    • 1st Edition
    • Lee Hilyer
    • English
    Recent research on learning from multimedia presentations has indicated that the current way many people prepare their slide presentations may actually hinder learning. Considering the ubiquity of the PowerPoint presentation in business and in education, presenters should be concerned whether or not their audience members are effectively receiving the information they wish to impart. This issue is of special import for librarians who teach, as they often must convey complex information in a very limited amount of time. Combining the best evidence on multimedia learning with real-world practical guidelines, this book aims to provide novice and expert presenters alike with the tools they need to ensure an effective, learner-centred presentation.
  • Instant Messaging Reference

    A Practical Guide
    • 1st Edition
    • Rachel Bridgewater + 1 more
    • English
    Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future potential. Targeting busy practitioners who are looking for comprehensive answers about instant messaging in particular, rather than virtual reference in general, this book addresses questions from the basics of what IM is and how it operates to the more complicated issues such as privacy and security to its future potential as a strong candidate in the virtual reference arena.
  • The Revolution Will Not Be Downloaded

    Dissent in the Digital Age
    • 1st Edition
    • Tara Brabazon
    • English
    This book attacks the often implicit and damaging assumption that ‘everyone’ is online and that ‘everyone’ is using online resources within the specified parameters of employers, government and national laws. This book summons a critical Web Studies, asking not only who is using particular applications, but also how and why. This remedial work is required. The concept and label of ‘Web 2.0’ is part of a wide-ranging suite of assumptions that offer simple answers to difficult questions. The term captures a desire for online collaboration and the sharing of information, performed most visibly through blogs, podcasts and wikis. Other ‘products’ that capture the Web 2.0 ideology include Google Maps, Facebook, MySpace and Flickr. Within this framework, websites no long hold information but become a platform to connect applications with users. The business applications have gained the most attention - particularly content syndication - but there are also ‘political’ initiatives overlaying this project including open communication, the sharing of data and the deep linking of web architecture.
  • Digital Electronics and Design with VHDL

    • 1st Edition
    • Volnei A. Pedroni
    • English
    Digital Electronics and Design with VHDL offers a friendly presentation of the fundamental principles and practices of modern digital design. Unlike any other book in this field, transistor-level implementations are also included, which allow the readers to gain a solid understanding of a circuit's real potential and limitations, and to develop a realistic perspective on the practical design of actual integrated circuits. Coverage includes the largest selection available of digital circuits in all categories (combinational, sequential, logical, or arithmetic); and detailed digital design techniques, with a thorough discussion on state-machine modeling for the analysis and design of complex sequential systems. Key technologies used in modern circuits are also described, including Bipolar, MOS, ROM/RAM, and CPLD/FPGA chips, as well as codes and techniques used in data storage and transmission. Designs are illustrated by means of complete, realistic applications using VHDL, where the complete code, comments, and simulation results are included. This text is ideal for courses in Digital Design, Digital Logic, Digital Electronics, VLSI, and VHDL; and industry practitioners in digital electronics.
  • Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL

    • 1st Edition
    • Joe Celko
    • English
    Perfectly intelligent programmers often struggle when forced to work with SQL. Why? Joe Celko believes the problem lies with their procedural programming mindset, which keeps them from taking full advantage of the power of declarative languages. The result is overly complex and inefficient code, not to mention lost productivity.This book will change the way you think about the problems you solve with SQL programs.. Focusing on three key table-based techniques, Celko reveals their power through detailed examples and clear explanations. As you master these techniques, you’ll find you are able to conceptualize problems as rooted in sets and solvable through declarative programming. Before long, you’ll be coding more quickly, writing more efficient code, and applying the full power of SQL
  • Internet Multimedia Communications Using SIP

    A Modern Approach Including Java® Practice
    • 1st Edition
    • Rogelio Martinez Perea
    • English
    Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow.The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts. Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples.This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts.
  • The Best Damn Exchange, SQL and IIS Book Period

    • 1st Edition
    • Henrik Walther + 2 more
    • English
    Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management. The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.
  • Handbook of Knowledge Representation

    • 1st Edition
    • Volume 1
    • Frank van Harmelen + 2 more
    • English
    Handbook of Knowledge Representation describes the essential foundations of Knowledge Representation, which lies at the core of Artificial Intelligence (AI). The book provides an up-to-date review of twenty-five key topics in knowledge representation, written by the leaders of each field. It includes a tutorial background and cutting-edge developments, as well as applications of Knowledge Representation in a variety of AI systems. This handbook is organized into three parts. Part I deals with general methods in Knowledge Representation and reasoning and covers such topics as classical logic in Knowledge Representation; satisfiability solvers; description logics; constraint programming; conceptual graphs; nonmonotonic reasoning; model-based problem solving; and Bayesian networks. Part II focuses on classes of knowledge and specialized representations, with chapters on temporal representation and reasoning; spatial and physical reasoning; reasoning about knowledge and belief; temporal action logics; and nonmonotonic causal logic. Part III discusses Knowledge Representation in applications such as question answering; the semantic web; automated planning; cognitive robotics; multi-agent systems; and knowledge engineering. This book is an essential resource for graduate students, researchers, and practitioners in knowledge representation and AI.
  • How to Cheat at Configuring VmWare ESX Server

    • 1st Edition
    • David Rule
    • English
    A virtual evolution in IT shops large and small has begun. VMware’s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress’ proven “How to Cheat” methodology to configure and build VMware’s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz!This book will detail the default and custom installation of VMware’s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
  • Perl Scripting for Windows Security

    Live Response, Forensic Analysis, and Monitoring
    • 1st Edition
    • Harlan Carvey
    • English
    I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.