Books
Discover a curated selection of books on Computer Science available in our library. Here you will find key textbooks, reference materials, and recommended readings to enhance your understanding of Computer Science. Use the search tools to locate specific titles, or browse our collection for inspiration. Happy reading!
The SAGE handbook of web history
by
SummaryThe Web has been with us now for almost 25 years. An integral part of our social, cultural and political lives, 'new media' is simply not that new anymore. Despite the rapidly expanding archives of information at our disposal, and the recent growth of interest in web history as a field of research, the information available to us still far outstrips our understanding of how to interpret it. The SAGE Handbook of Web History marks the first comprehensive review of this subject to date. Its editors emphasise two main different forms of study: the use of the web as an historical resource, and the web as an object of study in its own right. Bringing together all the existing knowledge of the field, with an interdisciplinary focus and an international scope, this is an incomparable resource for researchers and students alike.
The Routledge social science handbook of AI
by
The Routledge Social Science Handbook of AI is a landmark volume providing students and teachers with a comprehensive and accessible guide to the major topics and trends of research in the social sciences of artificial intelligence (AI), as well as surveying how the digital revolution--from supercomputers and social media to advanced automation and robotics--is transforming society, culture, politics and economy. The Handbook provides representative coverage of the full range of social science engagements with the AI revolution, from employment and jobs to education and new digital skills to automated technologies of military warfare and the future of ethics. The reference work is introduced by editor Anthony Elliott, who addresses the question of relationship of social sciences to artificial intelligence, and who surveys various convergences and divergences between contemporary social theory and the digital revolution. The Handbook is exceptionally wide-ranging in span, covering topics all the way from AI technologies in everyday life to single-purpose robots throughout home and work life, and from the mainstreaming of human-machine interfaces to the latest advances in AI, such as the ability to mimic (and improve on) many aspects of human brain function. A unique integration of social science on the one hand and new technologies of artificial intelligence on the other, this Handbook offers readers new ways of understanding the rise of AI and its associated global transformations. Written in a clear and direct style, the Handbook will appeal to a wide undergraduate audience.
Cybersecurity Labeling for Internet of Things
by
Gender Approaches to Cybersecurity Design, Defense and Response
by
New Age Cyber Threat Mitigation for Cloud Computing Networks
by
Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks. New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era. These topics include: · Ransomware and DDoS attacks · Security algorithms · Design and implementation solutions for resilient and fault-tolerant cloud and network services · Security policy · End user data security The book is an essential resource for anyone involved in cloud computing and network security, including learners, professionals and enthusiasts.
Handbook of Mobile Application Development
by
This handbook is a concise yet complete guide to fundamental engineering requirements and quality characteristics that users, developers, and marketers of mobile applications should be aware of. It provides detailed definitions and descriptions of eight key software application features that are integral to the overall design and user experience goals, and which may often overlap with certain functionalities. The book explains the essential aspects of these features clearly to novice developers. Readers will also learn about how to optimize the listed features to tailor their applications to the needs of their users. Key Features: - Presents detailed information about eight different features which guide mobile application development: capability, reliability, usability, charisma, security, performance, mobility and compatibility - Reader-friendly, structured layout of each chapter including relevant illustrations and clear language, designed for quick learning - Focus on both software function and user perception of applications on mobile devices - Includes a handy appendix with information about mobile learning projects and related work packages Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features is the ideal learning tool for novice software developers, computer science students, IT enthusiasts and marketers who want to design or develop mobile apps for an optimal user experience.
Human computer interaction and emerging technologies
by
INTERACT Conferences are an important platform for researchers and practitioners in the field of human-computer interaction (HCI) to showcase their work. They are organised biennially by the International Federation for Information Processing Technical Committee on Human-Computer Interaction (IFIP TC13), a committee of 30 member national societies and 9 Working Groups. This volume contains the Adjunct Proceedings to the 17th INTERACT Conference (2019), which was held in Paphos, Cyprus. The papers were submitted after the main publication deadline and published after the conference. They are selected papers from conference workshops, the Student Design Consortium and the Doctoral Consortium.
Cryptocurrencies : Money, Trust and Regulation
by
Oonagh McDonald examines the challenges, opportunities and threats that cryptocurrencies pose to cash and to existing fiat currencies and their potential to change how global finance operates.
Internet of Things
by
The concept of Internet of Things has silently existed since the late nineteenth century but in the current decade expectations and excitement has peaked. However not many have understood the profound change that it can usher in. How big this change can be and how it can transform our working!! This book aims to bring in this realization with illustrative and practical case studies with comprehensive concepts. From beginners to practitioners in the field of academics or industry, it serves as a comprehensive yet easy to comprehend source of information on the multiple facets of IoT. Simplistic but comprehensive introduction of the facets of primarily the industrial IoT Practical adoption cases explaining the Core technology stack and business applications Comprehensive view of current technologies which complete the IoT delivery ecosystem, followed by overview of IoT enabled new business models. Realistic view of how industrial firms can evolve into the next stage of maturity along with determinants influencing this transformation since manufacturing is envisioned to be a key segment to adopt and benefit from IoT. Detailed analysis of IoT benefits for the universal triad- energy management, logistics optimization and distribution channel management. A full-fledged case study on Adoption of Green manufacturing using IoT. Real world example of gauging End User perception using different models which is important for a successful adoption of IoT. A futuristic visionary view of IoT as comprehended based on evolution of technology and platforms, and finally analysis of the extremely crucial concepts of security, privacy and governance.
Robot Dreams
by
This collection of 21 of Isaac Asimov's short stories spans the body of his fiction from the 1940s to the 1980s--exploring not only the future of technology, but the future of humanity's maturity and growth.