Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Video Coding for Mobile Communications

    Efficiency, Complexity and Resilience
    • 1st Edition
    • Mohammed Al-Mualla + 2 more
    • English
    In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area of video source coding is one of the key challenges in the worldwide push to deliver full video communications over wireless devices. Video Coding for Mobile Communications reviews current progress in this field and looks at how to solve some of the most important technology issues in the months and years ahead. The vision of being able to communicate from anywhere, at any time, and with any type of information is on its way to becoming reality. This natural convergence of mobile communications and multimedia is a field that is expected to achieve unprecedented growth and commercial success. Current wireless communication devices support a number of basic multimedia services (voice, messages, basic internet access), but have coding problems that need to be solved before "real-time" mobile video communication can be achieved.
  • Hack Proofing Your Network

    • 2nd Edition
    • Syngress
    • English
    A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:· The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure SystemsThe central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
  • Hackproofing Your Wireless Network

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
  • Information Security Best Practices

    205 Basic Rules
    • 1st Edition
    • George L Stefanek
    • English
    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.
  • Journey to the Center of the Internet

    Now Showing in 3D
    • 1st Edition
    • Syngress
    • English
    Jules Verne watch out! Now you can take a virtual tour to the centre of a computer network.If you need to know the difference between a router and a bridge, or a WAN and a LAN, where do you start? Journey to the Center of the Network: Now Showing in 3D is a truely innovative book and CD package. It introduces the reader to the highly complicated subject of computer networking. Covering history, protocols, hardware, servers, switches, bridges, routers and discusses implementation issues, costs and network limitations. Readers will be able to experience a computer network from the inside out using the innovative 3D imaging software from Periscope3, included on the CD. It allows readers to view pieces of a network from various angles ranges and see how the hardware interacts with the network as a whole.
  • Biz Talk Server 2000 Developer's Guide

    • 1st Edition
    • Syngress
    • English
    The BizTalk 2000 Developer's Guide is written for developers who are responsible for installing, configuring and deploying the BizTalk Server in their organizations IT infrastructure. The opening chapters of the book discuss the benefits of seamless business-to-business application integration, summarize the features and enhancements of BizTalk Server 2000, and offer an introduction to XML - the driving force behind BizTalk. The next chapters explore the multiple tools that are incorporated into BizTalk that will transform the way in which information is created, transmitted and maintained in the server environment. Other chapters include complete coverage of the security considerations for BizTalk, and an examination of the various third-party plug-ins for enhancing BizTalk Server 2000.
  • Practical RF Handbook

    • 3rd Edition
    • Ian Hickman
    • English
    New sections and major updates in the third edition include: RF ICs, DBMs, SAW filters, integrated power amplifier modules, active arrays, use of network analysers, and a completely new chapter on digital filtering.
  • Ruby Developers Guide

    • 1st Edition
    • Syngress
    • English
    An expert guide to Ruby, a popular new Object-Oriented Programming LanguageRuby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
  • .NET Mobile Web Developers Guide

    • 1st Edition
    • Syngress
    • English
    Introducing Microsoft's flagship wireless development toolThe .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP.
  • Simulation

    • 3rd Edition
    • Sheldon M. Ross
    • English
    Sheldon Ross' Simulation, Third Edition introduces aspiring and practicing actuaries, engineers, computer scientists and others to the practical aspects of constructing computerized simulation studies to analyze and interpret real phenomena. Readers learn to apply results of these analyses to problems in a wide variety of fields to obtain effective, accurate solutions and make predictions about future outcomes. This new edition provides a comprehensive, in-depth, and current guide for constructing probability models and simulations for a variety of purposes. It features new information, including the presentation of the Insurance Risk Model, generating a Random Vector, and evaluating an Exotic Option. Also new is coverage of the changing nature of statistical methods due to the advancements in computing technology.