This is just a selection of our collection of computer science handbooks:
Agent Technology Handbook by Dimitris N. ChorafasAgents are smart programs that gather information along a network. Aimed at systems administrators, network designers and communications specialists, this guide explains what agents can do for LANs, WANs and telecommunications systems.
Call Number: QA 76.76 I58 C48 1998
Publication Date: 1997-08-01
Algorithms and Theory of Computation Handbook by Marina BlantonAlgorithms and Theory of Computation Handbook, Second Editionprovides an up-to-date compendium of fundamental computer science topics and techniques. It also illustrates how the topics and techniques come together to deliver efficient solutions to important practical problems. New to the Second Edition Along with updating and revising many of the existing chapters, this second edition contains more than 20 new chapters. This edition now covers external memory, parameterized, self-stabilizing, and pricing algorithms as well as the theories of algorithmic coding, privacy and anonymity, databases, computational games, and communication networks. It also discusses computational topology, computational number theory, natural language processing, and grid computing and explores applications in intensity-modulated radiation therapy, voting, DNA research, systems biology, and financial derivatives. This best-selling handbook continues to help computer professionals and engineers find significant information on various algorithmic topics. The expert contributors clearly define the terminology, present basic results and techniques, and offer a number of current references to the in-depth literature. They also provide a glimpse of the major research issues concerning the relevant topics.
Call Number: QA 76.9 A43 A44 2010
Publication Date: 2009-11-20
Computer and Information Security Handbook, 3rd ed. by John R. VaccaComputer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437
Publication Date: 2017-07-17
Computer Science Handbook by Allen B. Tucker (Editor)When you think about how far and fast computer science has progressed in recent years, it's not hard to conclude that a seven-year old handbook may fall a little short of the kind of reference today's computer scientists, software engineers, and IT professionals need. With a broadened scope, more emphasis on applied computing, and more than 70 chapters either new or significantly revised, the Computer Science Handbook, Second Edition is exactly the kind of reference you need. This rich collection of theory and practice fully characterizes the current state of the field and conveys the modern spirit, accomplishments, and direction of computer science. Highlights of the Second Edition: Coverage that reaches across all 11 subject areas of the discipline as defined in Computing Curricula 2001, now the standard taxonomy More than 70 chapters revised or replaced Emphasis on a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction More than 150 contributing authors--all recognized experts in their respective specialties New chapters on: cryptography computational chemistry computational astrophysics human-centered software development cognitive modeling transaction processing data compression scripting languages event-driven programming software architecture
Call Number: QA 76 C54755 2004
Publication Date: 2004-06-28
Expert Systems by Cornelius T. Leondes (Editor)This six-volume set presents cutting-edge advances and applications of expert systems. Because expert systems combine the expertise of engineers, computer scientists, and computer programmers, each group will benefit from buying this important reference work. An "expert system" is a knowledge-based computer system that emulates the decision-making ability of a human expert. The primary role of the expert system is to perform appropriate functions under the close supervision of the human, whose work is supported by that expert system. In the reverse, this same expert system can monitor and double check the human in the performance of a task. Human-computer interaction in our highly complex world requires the development of a wide array of expert systems. Key Features * Expert systems techniques and applications are presented for a diverse array of topics including: * Experimental design and decision support * The integration of machine learning with knowledge acquisition for the design of expert systems * Process planning in design and manufacturing systems and process control applications * Knowledge discovery in large-scale knowledge bases * Robotic systems * Geograhphic information systems * Image analysis, recognition and interpretation * Cellular automata methods for pattern recognition * Real-time fault tolerant control systems * CAD-based vision systems in pattern matching processes * Financial systems * Agricultural applications * Medical diagnosis
Call Number: QA 76.76 E95 E9465 2002
Publication Date: 2001-08-30
Handbook of Applied Cryptography by Scott A. Vanstone; Alfred J. Menezes; Paul C. Van OorschotCryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
The Handbook of Data Communications and Networks by B. Buchanan02. 2 Network topologies 744 02. 3 Token ring 747 02. 4 Ethernet 749 02. 5 LAN components 752 02. 6 Cabling standards 762 02. 7 Important networking definitions 769 03 Ethernet 771 03. 1 Introduction 771 03. 2 IEEE standards 772 03. 3 Ethernet-media access control (MAC) layer 773 03. 4 IEEE 802. 2 and Ethernet SNAP 775 03. 5 OSI and the IEEE 802. 3 standard 777 03. 6 Ethernet types 780 03. 7 Twisted-pair hubs 781 03. 8 100 Mbps Ethernet 782 03. 9 Gigabit Ethernet 787 03. 10 Bridges 792 03. 11 ARP 793 03. 12 RARP 797 03. 13 Spanning-Tree Protocol 798 03. 14 Additional 799 03. 15 Network interface card design BOO 03. 16 82559-based Ethernet 804 03. 17 Comparison of fast Ethernet with other technologies 806 04 Network Design, Switches and vLANs 807 04. 1 Introduction 807 04. 2 Network design 807 04. 3 Hierarchical network design 809 04. 4 Switches and switching hubs 814 04. 5 vlANs 818 05 Token Ring 825 05. 1 Introduction 825 05. 2 Operation 825 05. 3 Token Ring-media access control (MAC) 826 05. 4 Token Ring maintenance 828 05. 5 Token Ring multistation access units (MAUs) 829 05. 6 Cabling and connectors 830 05. 7 Repeaters 830 05. 8 Jitter suppression 831 06 FDDI 833 06. 1 Introduction 833 06. 2 Operation 834 06. 3 FOOl layers 834 06. 4 SMT protocol 836 06. 5 Physical connection management 836 06.
Call Number: TK 5105 B82 2004
Publication Date: 2013-12-04
Handbook of Digital Games and Entertainment Technologies by Ryohei Nakatsu (Editor); Matthias Rauterberg (Editor)The topics treated in this handbook cover all areas of games and entertainment technologies, such as digital entertainment; technology, design/art, and sociology. The handbook consists of contributions from top class scholars and researchers from the interdisciplinary topic areas. The aim of this handbook is to serving as a key reference work in the field and provides readers with a holistic picture of this interdisciplinary field covering technical issues, aesthetic/design issues, and sociological issues. At present, there is no reference work in the field that provides such a broad and complete picture of the field. Engineers and researchers who want to learn about this emerging area will be able to find adequate answers regarding technology issues on digital entertainment. Designers and artists can learn how their skills and expertise can contribute to this emerging area. Also researchers working in the field of sociology and psychology will find how their experience and knowledge are connected to other areas such as technology and art/design. Although topics are written by foremost experts from the field, the description for each topic has been intended to be easily understandable but yet comprehensive enough so that it caters not only for the experts but also beginners and students in the field.
Publication Date: 2017-03-01
Handbook of Floating-Point Arithmetic by Nicolas Brunie; Florent de Dinechin; Claude-Pierre Jeannerod; Mioara Joldes; Vincent Lefèvre; Guillaume Melquiond; Jean-Michel Muller; Nathalie Revol; Serge TorresFloating-point arithmetic is the most widely used way of implementing real-number arithmetic on modern computers. However, making such an arithmetic reliable and portable, yet fast, is a very difficult task. As a result, floating-point arithmetic is far from being exploited to its full potential. This handbook aims to provide a complete overview of modern floating-point arithmetic. So that the techniques presented can be put directly into practice in actual coding or design, they are illustrated, whenever possible, by a corresponding program. The handbook is designed for programmers of numerical applications, compiler designers, programmers of floating-point algorithms, designers of arithmetic operators, and more generally, students and researchers in numerical analysis who wish to better understand a tool used in their daily work and research.
Publication Date: 2018-05-24
Handbook of Internet Computing by Borivoje FurhtScientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.
Call Number: TK 5105.875 I57 F88 2000
Publication Date: 2000-06-27
Handbook of Metaheuristics by Michel Gendreau (Editor); Jean-Yves Potvin (Editor)The third edition of this handbook is designed to provide a broad coverage of the concepts, implementations, and applications in metaheuristics. The book's chapters serve as stand-alone presentations giving both the necessary underpinnings as well as practical guides for implementation. The nature of metaheuristics invites an analyst to modify basic methods in response to problem characteristics, past experiences, and personal preferences, and the chapters in this handbook are designed to facilitate this process as well. This new edition has been fully revised and features new chapters on swarm intelligence and automated design of metaheuristics from flexible algorithm frameworks. The authors who have contributed to this volume represent leading figures from the metaheuristic community and are responsible for pioneering contributions to the fields they write about. Their collective work has significantly enriched the field of optimization in general and combinatorial optimization in particular. Metaheuristics are solution methods that orchestrate an interaction between local improvement procedures and higher level strategies to create a process capable of escaping from local optima and performing a robust search of a solution space. In addition, many new and exciting developments and extensions have been observed in the last few years. Hybrids of metaheuristics with other optimization techniques, like branch-and-bound, mathematical programming or constraint programming are also increasingly popular. On the front of applications, metaheuristics are now used to find high-quality solutions to an ever-growing number of complex, ill-defined real-world problems, in particular combinatorial ones. This handbook should continue to be a great reference for researchers, graduate students, as well as practitioners interested in metaheuristics.
Publication Date: 2018-10-02
Handbook of Neural Computation by Pijush Samui (Editor); Sanjiban Sekhar Roy (Editor); Valentina E. Balas (Editor)Handbook of Neural Computation explores neural computation applications, ranging from conventional fields of mechanical and civil engineering, to electronics, electrical engineering and computer science. This book covers the numerous applications of artificial and deep neural networks and their uses in learning machines, including image and speech recognition, natural language processing and risk analysis. Edited by renowned authorities in this field, this work is comprised of articles from reputable industry and academic scholars and experts from around the world. Each contributor presents a specific research issue with its recent and future trends. As the demand rises in the engineering and medical industries for neural networks and other machine learning methods to solve different types of operations, such as data prediction, classification of images, analysis of big data, and intelligent decision-making, this book provides readers with the latest, cutting-edge research in one comprehensive text. Features high-quality research articles on multivariate adaptive regression splines, the minimax probability machine, and more Discusses machine learning techniques, including classification, clustering, regression, web mining, information retrieval and natural language processing Covers supervised, unsupervised, reinforced, ensemble, and nature-inspired learning methods
Handbook of Pattern Recognition and Image Processing by Tzay Y. Young (Editor)This volume emphasizes computer vision and three-dimensional shapes - their representation, recovery, recognition and extraction. It covers the methods for 3D shape recovery, including shape from shading, shape from edge and contours, range image analysis and stereo vision. It also presents analysis of 3D motion from an image sequence, including non-rigid motion and human movement. Finally, the book provides coverage of representation, matching and recognition of 3D objects.
Call Number: TK 7882 .P3 H36 1986
Publication Date: 1994-04-04
Handbook of Theoretical Computer Science by Jan Van Leeuwen (Editor)The Handbook of Theoretical Computer Scienceprovides professionals and students with a comprehensive overview of the main results and developments in this rapidly evolving field. Volume A covers models of computation, complexity theory, data structures, and efficient computation in many recognized subdisciplines of theoretical computer science. Volume B takes up the theory of automata and rewriting systems, the foundations of modern programming languages, and logics for program specification and verification, and presents several studies on the theoretic modeling of advanced information processing. The two volumes contain thirty-seven chapters, with extensive chapter references and individual tables of contents for each chapter. There are 5,387 entry subject indexes that include notational symbols, and a list of contributors and affiliations in each volume.
Call Number: QA 76 H279 1990
Publication Date: 1994-01-04
Handbook on Parallel and Distributed Processing by Jacek Blazewicz (Editor); Klaus Ecker (Editor); Brigitte Plateau (Editor); Denis Trystram (Editor)Here, authors from academia and practice provide practitioners, scientists and graduates with basic methods and paradigms, as well as important issues and trends across the spectrum of parallel and distributed processing. In particular, they cover such fundamental topics as efficient parallel algorithms, languages for parallel processing, parallel operating systems, architecture of parallel and distributed systems, management of resources, tools for parallel computing, parallel database systems and multimedia object servers, as well as the relevant networking aspects. A chapter is dedicated to each of parallel and distributed scientific computing, high-performance computing in molecular sciences, and multimedia applications for parallel and distributed systems.
Call Number: QA 76.58 H36 2000
Publication Date: 1999-12-15
The Handook of Formal Methods in Human-Computer Interaction by Benjamin Weyers (Editor); Judy Bowen (Editor); Alan Dix (Editor); Philippe Palanque (Editor)This book provides a comprehensive collection of methods and approaches for using formal methods within Human-Computer Interaction (HCI) research, the use of which is a prerequisite for usability and user-experience (UX) when engineering interactive systems. World-leading researchers present methods, tools and techniques to design and develop reliable interactive systems, offering an extensive discussion of the current state-of-the-art with case studies which highlight relevant scenarios and topics in HCI as well as presenting current trends and gaps in research and future opportunities and developments within this emerging field. The Handbook of Formal Methods in Human-Computer Interaction is intended for HCI researchers and engineers of interactive systems interested in facilitating formal methods into their research or practical work.
Publication Date: 2017-05-03
The Image Processing Handbook, 2nd ed. by John C. RussWhether obtained by microscopes, space probes, or the human eye, the same basic tools can be applied to acquire, process, and analyze the data contained in images. Ideal for self study, The Image Processing Handbook, Sixth Edition, first published in 1992, raises the bar once again as the gold-standard reference on this subject. Using extensive new illustrations and diagrams, it offers a logically organized exploration of the important relationship between 2D images and the 3D structures they reveal. Provides Hundreds of Visual Examples in FULL COLOR The author focuses on helping readers visualize and compare processing and measurement operations and how they are typically combined in fields ranging from microscopy and astronomy to real-world scientific, industrial, and forensic applications. Presenting methods in the order in which they would be applied in a typical workflow from acquisition to interpretation this book compares a wide range of algorithms used to: Improve the appearance, printing, and transmission of an image Prepare images for measurement of the features and structures they reveal Isolate objects and structures, and measure their size, shape, color, and position Correct defects and deal with limitations in images Enhance visual content and interpretation of details This handbook avoids dense mathematics, instead using new practical examples that better convey essential principles of image processing. This approach is more useful to develop readers grasp of how and why to apply processing techniques and ultimately process the mathematical foundations behind them. Much more than just an arbitrary collection of algorithms, this is the rare book that goes beyond mere image improvement, presenting a wide range of powerful example images that illustrate techniques involved in color processing and enhancement. Applying his 50-year experience as a scientist, educator, and industrial consultant, John Russ offers the benefit of his image processing expertise for fields ranging from astronomy and biomedical research to food science and forensics. His valuable insights and guidance continue to make this handbook a must-have reference."
Call Number: TA 1637 R87 1999
Publication Date: 2011-04-07
An Information Security Handbook by John M. HunterThis book is geared at postgraduate courses on managing and designing information systems. It concentrates primarily on security in military systems and looks at the different goals organizations might have in employing security techniques and which techniques are best suited to achieving certain goals. The book provides answers to questions such as What is security? and What are the security problems particular to an IT system? It is essential reading for students on final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems, and Design of Information Systems. The text is up-to-date and includes implications which arose from the Y2K date change.
Call Number: QA 76.9 A25 H87 2001
Publication Date: 2012-12-06
The InfoSec Handbook by Umesh Hodeghatta Rao; Umesha NayakThe InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it's an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.
Publication Date: 2014-08-30
The Practical Handbook of Genetic Algorithms - Applications by Lance D. Chambers (Editor)Rapid developments in the field of genetic algorithms along with the popularity of the first edition precipitated this completely revised, thoroughly updated second edition of The Practical Handbook of Genetic Algorithms. Like its predecessor, this edition helps practitioners stay up to date on recent developments in the field and provides material they can use productively in their own endeavors. For this edition, the editor again recruited authors at the top of their field and from a cross section of academia and industry, theory and practice. Their contributions detail their own research, new applications, experiment results, and recent advances. Among the applications explored are scheduling problems, optimization, multidimensional scaling, constraint handling, and feature selection and classification. The science and art of GA programming and application has come a long way in the five years since publication of the bestselling first edition. But there still is a long way to go before its bounds are reached-we are still just scratching the surface of GA applications and refinements. By introducing intriguing new applications, offering extensive lists of code, and reporting advances both subtle and dramatic, The Practical Handbook of Genetic Algorithms is designed to help readers contribute to scratching that surface a bit deeper.