Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Computational Network Science

    An Algorithmic Approach
    • 1st Edition
    • Henry Hexmoor
    • English
    The emerging field of network science represents a new style of research that can unify such traditionally-divers... fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatib... datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.
  • Practical Predictive Analytics and Decisioning Systems for Medicine

    Informatics Accuracy and Cost-Effectiveness for Healthcare Administration and Delivery Including Medical Research
    • 1st Edition
    • Gary D. Miner + 7 more
    • English
    With the advent of electronic medical records years ago and the increasing capabilities of computers, our healthcare systems are sitting on growing mountains of data. Not only does the data grow from patient volume but the type of data we store is also growing exponentially. Practical Predictive Analytics and Decisioning Systems for Medicine provides research tools to analyze these large amounts of data and addresses some of the most pressing issues and challenges where data integrity is compromised: patient safety, patient communication, and patient information. Through the use of predictive analytic models and applications, this book is an invaluable resource to predict more accurate outcomes to help improve quality care in the healthcare and medical industries in the most cost–efficient manner.Practical Predictive Analytics and Decisioning Systems for Medicine provides the basics of predictive analytics for those new to the area and focuses on general philosophy and activities in the healthcare and medical system. It explains why predictive models are important, and how they can be applied to the predictive analysis process in order to solve real industry problems. Researchers need this valuable resource to improve data analysis skills and make more accurate and cost-effective decisions.
  • CSA Guide to Cloud Computing

    Implementing Cloud Privacy and Security
    • 1st Edition
    • Raj Samani + 2 more
    • English
    CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.
  • Embedded C Programming

    Techniques and Applications of C and PIC MCUS
    • 1st Edition
    • Mark Siegesmund
    • English
    This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand method of learning the correct and efficient practices to program a PIC® microcontroller in C language. Principles of C programming are introduced gradually, building on skill sets and knowledge. Early chapters emphasize the understanding of C language through experience and exercises, while the latter half of the book covers the PIC® microcontroller, its peripherals, and how to use those peripherals from within C in great detail. This book demonstrates the programming methodology and tools used by most professionals in embedded design, and will enable you to apply your knowledge and programming skills for any real-life application. Providing a step-by-step guide to the subject matter, this book will encourage you to alter, expand, and customize code for use in your own projects.
  • Software and System Development using Virtual Platforms

    Full-System Simulation with Wind River Simics
    • 1st Edition
    • Daniel Aarno + 1 more
    • English
    Virtual platforms are finding widespread use in both pre- and post-silicon computer software and system development. They reduce time to market, improve system quality, make development more efficient, and enable truly concurrent hardware/software design and bring-up. Virtual platforms increase productivity with unparalleled inspection, configuration, and injection capabilities. In combination with other types of simulators, they provide full-system simulations where computer systems can be tested together with the environment in which they operate. This book is not only about what simulation is and why it is important, it will also cover the methods of building and using simulators for computer-based systems. Inside you’ll find a comprehensive book about simulation best practice and design patterns, using Simics as its base along with real-life examples to get the most out of your Simics implementation. You’ll learn about: Simics architecture, model-driven development, virtual platform modelling, networking, contiguous integration, debugging, reverse execution, simulator integration, workflow optimization, tool automation, and much more.
  • There's Not an App for That

    Mobile User Experience Design for Life
    • 1st Edition
    • Simon Robinson + 2 more
    • English
    There’s Not an App for That will make your work stand out from the crowd. It walks you through mobile experiences, and teaches you to evaluate current UX approaches, enabling you to think outside of the screen and beyond the conventional. You’ll review diverse aspects of mobile UX: the screens, the experience, how apps are used, and why they’re used. You’ll find special sections on "challenging your approach", as well as a series of questions you can use to critique and evaluate your own designs. Whether the authors are discussing real-world products in conjunction with suggested improvements, showcasing how existing technologies can be put together in unconventional ways, or even evaluating "far out" mobile experiences of the future, you’ll find plenty of practical pointers and action items to help you in your day-to-day work.
  • Geriatric Dentistry, An Issue of Dental Clinics of North America

    • 1st Edition
    • Volume 58-4
    • Lisa A. Thompson
    • English
    This issue of Dental Clinics, edited by Lisa A. Thompson and Leonard J. Brennan, focuses on Geriatric Dentistry. Articles include: Our Current Geriatric Population: Demographic and Oral Health Care Utilization; Physiology of Aging of Older Adults: Systemic and Oral Health Considerations; Treatment Planning Considerations in Older Adults; Oral Health Disparity in Older Adults: Dental Decay and Tooth Loss; Oral Health Disparities in Older Adults: Oral bacteria, Inflammation and Aspiration Pneumonia; Salivary Function and Xerostomia and the Implications of Polypharmacy in Elderly; Systemic and Oral Health; Cognitive Impairment in Older Adults and Oral Health considerations: Treatment and Management; Integrating Oral Health into the Interdisciplinary Health Sciences Curriculum; Innovations in Dental Care Delivery for the Older Adult; and more!
  • Hacking and Penetration Testing with Low Power Devices

    • 1st Edition
    • Philip Polstra
    • English
    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
  • Modern Enterprise Business Intelligence and Data Management

    A Roadmap for IT Directors, Managers, and Architects
    • 1st Edition
    • Alan Simon
    • English
    Nearly every large corporation and governmental agency is taking a fresh look at their current enterprise-scale business intelligence (BI) and data warehousing implementations at the dawn of the "Big Data Era"…and most see a critical need to revitalize their current capabilities. Whether they find the frustrating and business-impeding continuation of a long-standing "silos of data" problem, or an over-reliance on static production reports at the expense of predictive analytics and other true business intelligence capabilities, or a lack of progress in achieving the long-sought-after enterprise-wide "single version of the truth" – or all of the above – IT Directors, strategists, and architects find that they need to go back to the drawing board and produce a brand new BI/data warehousing roadmap to help move their enterprises from their current state to one where the promises of emerging technologies and a generation’s worth of best practices can finally deliver high-impact, architecturally evolvable enterprise-scale business intelligence and data warehousing. Author Alan Simon, whose BI and data warehousing experience dates back to the late 1970s and who has personally delivered or led more than thirty enterprise-wide BI/data warehousing roadmap engagements since the mid-1990s, details a comprehensive step-by-step approach to building a best practices-driven, multi-year roadmap in the quest for architecturally evolvable BI and data warehousing at the enterprise scale. Simon addresses the triad of technology, work processes, and organizational/human factors considerations in a manner that blends the visionary and the pragmatic.
  • Bitemporal Data

    Theory and Practice
    • 1st Edition
    • Tom Johnston
    • English
    Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. But to use these products effectively, someone in your IT organization needs to know more than how to code bitemporal SQL statements. Perhaps, in your organization, that person is you. To correctly interpret business requests for temporal data, to correctly specify requirements to your IT development staff, and to correctly design bitemporal databases and applications, someone in your enterprise needs a deep understanding of both the theory and the practice of managing bitemporal data. Someone also needs to understand what the future may bring in the way of additional temporal functionality, so their enterprise can plan for it. Perhaps, in your organization, that person is you. This is the book that will show the do-it-yourself IT professional how to design and build bitemporal databases and how to write bitemporal transactions and queries, and will show those who will direct the use of vendor-provided bitemporal DBMSs exactly what is going on "under the covers" of that software.