Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation

    • 1st Edition
    • Tony Redmond
    • English
    Microsoft Exchange Server 2007 marks the biggest advancement in the history of the Exchange Product group. The completely re-engineered server system will change the face of how IT administrators approach Exchange. Tony Redmond, one of the world’s most acclaimed Exchange experts, offers insider insight from the very basics of the newly transformed architecture to understanding the nuances of the new and improved Microsoft Management Console (MMC) 3.0 and the two new administrative interfaces—the Exchange Management Console (EMC) and the Exchange Management Shell (EMS).
  • Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress

    • 1st Edition
    • David E. Williams
    • English
    Complete Coverage of Xen, Including Version 3.2Virtualization with Xen is the first book to demonstrate to readers how to install, administer, and maintain a virtual infrastructure based on XenSource’s latest release, Xen 3.2. It discusses best practices for setting up a Xen environment correctly the first time, maximizing the utilization of server assets while taking advantage of the fastest and most secure enterprise-grade paravirtualization architecture. It covers both basic and advanced topics, such as planning and installation, physical-to-virtual migrations, virtual machine provisioning, resource management, and monitoring and troubleshooting guests and Xen hosts.* Explore Xen’s Virtualization ModelFind a complete overview of the architecture model as well of all products: Xen 3.0 , Xen Express, XenServer, and Xen Enterprise.* Deploy XenUnderstand the system requirements, learn installation methods, and see how to install Xen on a free Linux distribution.* Master the Administrator ConsoleLearn how to use the command-line tools and the remote Java-based consoler that manages the configuration and operations of XenServer hosts and VMs.* Manage Xen with Third-Party ToolsUse products like openQRM, Enomalism, and Project ConVirt to manage the VMM.* Deploy a Virtual Machine in XenLearn about workload planning and installing modified guests, unmodified guests, and Windows guests.* Explore Advanced Xen ConceptsBuild a Xen Cluster, complete a XenVM migration, and discover XenVM backup and recovery solutions.* See the Future of VirtualizationSee the unofficial Xen road map and what virtual infrastructure holds for tomorrow’s data center.* See Other Virtualization Technologies and How They Compare with XenTake a look at the different types of server virtualization, other virtual machine software available, and how they compare with Xen.
  • Secure Roaming in 802.11 Networks

    • 1st Edition
    • Paul Goransson + 1 more
    • English
    Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrastin... it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we’re mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can’t, in its "pure" form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces. This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.
  • Advances in Computers

    Architectural Advances
    • 1st Edition
    • Volume 69
    • Marvin Zelkowitz
    • English
    The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes architectural advances and includes five chapters on hardware development, games for mobile devices such as cell phones, and open source software development. The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.
  • Machine Learning and Data Mining

    • 1st Edition
    • Igor Kononenko + 1 more
    • English
    Data mining is often referred to by real-time users and software solutions providers as knowledge discovery in databases (KDD). Good data mining practice for business intelligence (the art of turning raw software into meaningful information) is demonstrated by the many new techniques and developments in the conversion of fresh scientific discovery into widely accessible software solutions. This book has been written as an introduction to the main issues associated with the basics of machine learning and the algorithms used in data mining.Suitable for advanced undergraduates and their tutors at postgraduate level in a wide area of computer science and technology topics as well as researchers looking to adapt various algorithms for particular data mining tasks. A valuable addition to the libraries and bookshelves of the many companies who are using the principles of data mining (or KDD) to effectively deliver solid business and industry solutions.
  • X3D

    Extensible 3D Graphics for Web Authors
    • 1st Edition
    • Don Brutzman + 1 more
    • English
    In the early days of the Web a need was recognized for a language to display 3D objects through a browser. An HTML-like language, VRML, was proposed in 1994 and became the standard for describing interactive 3D objects and worlds on the Web. 3D Web courses were started, several best-selling books were published, and VRML continues to be used today. However VRML, because it was based on HTML, is a stodgy language that is not easy to incorporate with other applications and has been difficult to add features to. Meanwhile, applications for interactive 3D graphics have been exploding in areas such as medicine, science, industry, and entertainment. There is a strong need for a set of modern Web-based technologies, applied within a standard extensible framework, to enable a new generation of modeling & simulation applications to emerge, develop, and interoperate. X3D is the next generation open standard for 3D on the web. It is the result of several years of development by the Web 3D Consortium's X3D Task Group. Instead of a large monolithic specification (like VRML), which requires full adoption for compliance, X3D is a component-based architecture that can support applications ranging from a simple non-interactive animation to the latest streaming or rendering applications. X3D replaces VRML, but also provides compatibility with existing VRML content and browsers. Don Brutzman organized the first symposium on VRML and is playing a similar role with X3D; he is a founding member of the consortium. Len Daly is a professional member of the consortium and both Len and Don have been involved with the development of the standard from the start.
  • User-Centered Design Stories

    Real-World UCD Case Studies
    • 1st Edition
    • Carol Righi + 1 more
    • English
    User-Centered Design Stories is the first user-centered design casebook with cases covering the key tasks and issues facing UCD practitioners today. Intended for both students and practitioners, this book follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to analyze dozens of UCD work situations and propose solutions for the problem set. The problems posed in the cases cover a wide variety of key tasks and issues faced by practitioners, including those related to organizational/manag... topics, UCD methods and processes, and technical/ project issues. The benefit of the casebook and its organization is that it offers new practitioners (as well as experienced practitioners working in new settings) valuable practice in decision-making that cannot be obtained by simply reading a book or attending a seminar.
  • Sketching User Experiences: Getting the Design Right and the Right Design

    • 1st Edition
    • Bill Buxton
    • English
    Sketching User Experiences approaches design and design thinking as something distinct that needs to be better understood—by both designers and the people with whom they need to work— in order to achieve success with new products and systems. So while the focus is on design, the approach is holistic. Hence, the book speaks to designers, usability specialists, the HCI community, product managers, and business executives. There is an emphasis on balancing the back-end concern with usability and engineering excellence (getting the design right) with an up-front investment in sketching and ideation (getting the right design). Overall, the objective is to build the notion of informed design: molding emerging technology into a form that serves our society and reflects its values. Grounded in both practice and scientific research, Bill Buxton’s engaging work aims to spark the imagination while encouraging the use of new techniques, breathing new life into user experience design.
  • Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook

    • 1st Edition
    • Ken England + 1 more
    • English
    Database professionals will find that this new edition aids in mastering the latest version of Microsoft’s SQL Server. Developers and database administrators (DBAs) use SQL on a daily basis in application development and the subsequent problem solving and fine tuning. Answers to SQL issues can be quickly located helping the DBA or developer optimize and tune a database to maximum efficiency.Basic questions are easily located on the topics of filtering, sorting, operators, conditionals, pseudo columns, single row functions, joins, grouping functions, sub queries, composite queries, hierarchies, flashback queries, parallel queries, expressions and regular expressions. Assistance on DML, data types (including collections), XML, DDL for basic database objects such as tales, views and indexes, partitioning, and security is also considered.
  • IPv6 Advanced Protocols Implementation

    • 1st Edition
    • Qing Li + 2 more
    • English
    IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security. This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none. Key Features: Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including: Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the "SHISA" implementation DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today Numerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications An introduction to the IP security protocols along with the use of the racoon key exchange daemon Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software