Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Embedded Software

    The Works
    • 1st Edition
    • Colin Walls
    • English
    Embedded software needs have grown exponentially over the past quarter century. In 1975 writing 10,000 lines of assembly code was a considered a huge undertaking. Today, a cell phone can contain five million lines of C or C++! Embedded software developers must have a strong grasp of many complex topics in order to make faster, more efficient and more powerful microprocessors to meet the public’s growing demand. This practical guide, written by industry pioneer Colin Walls, helps embedded design engineers to rise to that challenge. The author offers expertise and insights from his quarter century of design experience, covering a plethora of major concerns in an easy-to-reference essay format that provides the reader with detailed tips and techniques, and rigorous explanations of technologies. Contributions from other well-known designers in the embedded systems field offer additional seasoned perspectives on everything from exotic memories to USB software. This one book has an amazing breadth of coverage, undertaking all the key subjects embedded engineers need to understand in order to succeed, including Design and Development, Programming, Languages including C/C++, and UML, Real Time Operating Systems Considerations, Networking, Programmable Logic and much more. For those in the field who are looking to broaden their professional skill-sets in order to advance, as well as those "newbies" just entering the field of embedded systems design, this comprehensive new reference is a must-have!The accompanying CD-ROM contains source code for the many real-world examples in the text, to save readers from needless re-typing. Also included are PowerPoint slides to create training seminars or classes from the text, and various product-related spec sheets.
  • Oracle Data Warehouse Tuning for 10g

    • 1st Edition
    • Gavin JT Powell
    • English
    “This book should satisfy those who want a different perspective than the official Oracle documentation. It will cover all important aspects of a data warehouse while giving the necessary examples to make the reading a lively experience.” - Tim Donar, Author and Systems Architect for Enterprise Data WarehousesTuning a data warehouse database focuses on large transactions, mostly requiring what is known as throughput. Throughput is the passing of large amounts of information through a server, network and Internet environment, backwards and forwards, constantly! The ultimate objective of a data warehouse is the production of meaningful and useful reporting, from historical and archived data. The trick is to make the reports print within an acceptable time frame.A data model contains tables and relationships between tables. Tuning a data model involves Normalization and Denormalization. Different approaches are required depending on the application, such as OLTP or a Data Warehouse. Inappropriate database design can make SQL code impossible to tune. Poor data modeling can have a most profound effect on database performance since all SQL code is constructed from the data model.
  • Grid Computing

    The Savvy Manager's Guide
    • 1st Edition
    • Pawel Plaszczak + 1 more
    • English
    A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing’s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company’s culture.
  • Configuring Microsoft Outlook 2003

    • 1st Edition
    • Sue Mosher + 3 more
    • English
    One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.
  • Complete Maya Programming Volume II

    An In-depth Guide to 3D Fundamentals, Geometry, and Modeling
    • 1st Edition
    • Volume 2
    • David Gould
    • English
    David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of computer graphics. Each concept is explained progressively and is fully implemented in both MEL and C++ so that an artist or programmer can use the source code directly in their own programs. Geometry and modeling are covered in detail with progressively more complex examples demonstrating all of Maya's possible programming features. David Gould's first volume is widely regarded as the most authoritative reference on Maya programming. Volume II continues this tradition and provides an unmatched guide for the artist and programmer tackling complex tasks.
  • Nessus, Snort, and Ethereal Power Tools

    Customizing Open Source Security Applications
    • 1st Edition
    • Brian Caswell + 3 more
    • English
    Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
  • Penetration Tester's Open Source Toolkit

    • 1st Edition
    • Jeremy Faircloth + 5 more
    • English
    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader “inside their heads” to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.
  • SQL

    Practical Guide for Developers
    • 1st Edition
    • Michael J. Donahoo + 1 more
    • English
    SQL is a solid guide and reference to the key elements of SQL and how to use it effectively. Developed by authors who needed a good resource for students in their database class, this is an ideal supplement for database courses — no matter what main text you use or what flavor of SQL is required. It features a short and inexpensive introduction to SQL for students who have some programming experience and need to learn the main features of SQL; and suggested shortcuts for learning and practice, depending on the experience of the user. This book is recommended for novice developers, programmers, and database administrators as well as students in database courses, business courses, and IT-related courses.
  • Joe Celko's SQL for Smarties

    Advanced SQL Programming
    • 3rd Edition
    • Joe Celko
    • English
    SQL for Smarties was hailed as the first book devoted explicitly to the advanced techniques needed to transform an experienced SQL programmer into an expert. Now, 10 years later and in the third edition, this classic still reigns supreme as the book written by an SQL master that teaches future SQL masters. These are not just tips and techniques; Joe also offers the best solutions to old and new challenges and conveys the way you need to think in order to get the most out of SQL programming efforts for both correctness and performance. In the third edition, Joe features new examples and updates to SQL-99, expanded sections of Query techniques, and a new section on schema design, with the same war-story teaching style that made the first and second editions of this book classics.
  • Designer's Guide to the Cypress PSoC

    • 1st Edition
    • Robert Ashby
    • English
    This it the first technical reference book available on the PSoC, and it offers the most comprehensive combination of technical data, example code, and descriptive prose you’ll find anywhere. Embedded design expert Robert Ashby will guide you through the entire PSoC world, providing thorough coverage of device feature, design, programming and development of the software-reconfigura... PSoC. He shares his best tips, tricks, and techniques that will help you to utilize the flexible and inexpensive PSoC to its greatest potential, with a minimum of heartaches and late nights. With its emphasis on designing for adaptability – a feature of the utmost importance in today’s fast-paced and cost-pressured design cycles – this book will bring you up to speed quickly on everything PSoC, from memory management to interconnects. You will add brains and capable signal conditioning to a design with one chip, giving you extreme flexibility for a relatively low price. Specific application examples highlighting the PSoC’s unique capabilities are included throughout the text, with the supporting sample source code.