« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 
 RSS

Computer Science - Concordia University Libraries Recent Acquisitions

Titles in the call number range QA 75 - QA 76 (Computer Science) that were added to the Concordia University Libraries collection in the last 60 days.


  • Wearable computing : from modeling to implementation of wearable systems based on body sensor networks / Giancarlo Fortino, Raffaele Gravina, Stefano Galzarano
    QA 76.592 F67 2018eb
    This book provides the most up-to-date research and development on wearable computing, wireless body sensor networks, wearable systems integrated with mobile computing, wireless networking and cloud computing

    This book has a specific focus on advanced methods for programming Body Sensor Networks (BSNs) based on the reference SPINE project. It features an on-line website (http://spine.deis.unical.it) to support readers in developing their own BSN application/systems and covers new emerging topics on BSNs such as collaborative BSNs, BSN design methods, autonomic BSNs, integration of BSNs and pervasive environments, and integration of BSNs with cloud computing. The book provides a description of real BSN prototypes with the possibility to see on-line demos and download the software to test them on specific sensor platforms and includes case studies for more practical applications.

    * Provides a future roadmap by learning advanced technology and open research issues

    * Gathers the background knowledge to tackle key problems, for which solutions will enhance the evolution of next-generation wearable systems

    * References the SPINE web site (http://spine.deis.unical.it) that accompanies the text

    * Includes SPINE case studies and span topics like human activity recognition, rehabilitation of elbow/knee, handshake detection, emotion recognition systems

    Wearable Systems and Body Sensor Networks: from modeling to implementation is a great reference for systems architects, practitioners, and product developers.

    Giancarlo Fortino is currently an Associate Professor of Computer Engineering (since 2006) at the Department of Electronics, Informatics and Systems (DEIS) of the University of Calabria (Unical), Rende (CS), Italy. He was recently nominated Guest Professor in Computer Engineering of Wuhan University of Technology on April, 18 2012 (the term of appointment is three years). His research interests include distributed computing and networks, wireless sensor networks, wireless body sensor networks, agent systems, agent oriented software engineering, streaming content distribution networks, distributed multimedia systems, GRID computing.

    Raffaele Gravina received the B.Sc. and M.S. degrees both in computer engineering from the University of Calabria, Rende, Italy, in 2004 and 2007, respectively. Here he also received the Ph.D. degree in computer engineering. He's now a Postdoctoral research fellow at University of Calabria. His research interests are focused on high-level programming methods for WSNs, specifically Wireless Body Sensor Networks. He wrote almost 30 scientific/technical articles in the area of the proposed Book. He is co-founder of SenSysCal S.r.l., a spin-off company of the University of Calabria, and CTO of the wearable computing area of the company.

    Stefano Galzarano received the B.S. and M.S. degrees both in computer engineering from the University of Calabria, Rende, Italy, in 2006 and 2009, respectively. He is currently pursuing a joint Ph.D. degree in computer engineering with University of Calabria and Technical University of Eindhoven (The Netherlands). His research interests are focused on high-level programming methods for wireless sensor networks and, specifically, novel methods and frameworks for autonomic wireless body sensor networks.


  • Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, The University of Electro-Communications, Japan, Yu Sasaki, NTT Secure Platform Laboratories, Japan, Yang Li, Nanjing University of Aeronautics and Astronautics, China
    QA 76.9 A25S256 2015eb
    A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis Written by authors known within the academic cryptography community, this book presents the latest developments in current research Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation - covers security from start to completion Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

  • Wearable computing : from modeling to implementation of wearable systems based on body sensor networks / Giancarlo Fortino, Raffaele Gravina, Stefano Galzarano
    QA 76.592 F67 2018eb
    This book provides the most up-to-date research and development on wearable computing, wireless body sensor networks, wearable systems integrated with mobile computing, wireless networking and cloud computing

    This book has a specific focus on advanced methods for programming Body Sensor Networks (BSNs) based on the reference SPINE project. It features an on-line website (http://spine.deis.unical.it) to support readers in developing their own BSN application/systems and covers new emerging topics on BSNs such as collaborative BSNs, BSN design methods, autonomic BSNs, integration of BSNs and pervasive environments, and integration of BSNs with cloud computing. The book provides a description of real BSN prototypes with the possibility to see on-line demos and download the software to test them on specific sensor platforms and includes case studies for more practical applications.

    * Provides a future roadmap by learning advanced technology and open research issues

    * Gathers the background knowledge to tackle key problems, for which solutions will enhance the evolution of next-generation wearable systems

    * References the SPINE web site (http://spine.deis.unical.it) that accompanies the text

    * Includes SPINE case studies and span topics like human activity recognition, rehabilitation of elbow/knee, handshake detection, emotion recognition systems

    Wearable Systems and Body Sensor Networks: from modeling to implementation is a great reference for systems architects, practitioners, and product developers.

    Giancarlo Fortino is currently an Associate Professor of Computer Engineering (since 2006) at the Department of Electronics, Informatics and Systems (DEIS) of the University of Calabria (Unical), Rende (CS), Italy. He was recently nominated Guest Professor in Computer Engineering of Wuhan University of Technology on April, 18 2012 (the term of appointment is three years). His research interests include distributed computing and networks, wireless sensor networks, wireless body sensor networks, agent systems, agent oriented software engineering, streaming content distribution networks, distributed multimedia systems, GRID computing.

    Raffaele Gravina received the B.Sc. and M.S. degrees both in computer engineering from the University of Calabria, Rende, Italy, in 2004 and 2007, respectively. Here he also received the Ph.D. degree in computer engineering. He's now a Postdoctoral research fellow at University of Calabria. His research interests are focused on high-level programming methods for WSNs, specifically Wireless Body Sensor Networks. He wrote almost 30 scientific/technical articles in the area of the proposed Book. He is co-founder of SenSysCal S.r.l., a spin-off company of the University of Calabria, and CTO of the wearable computing area of the company.

    Stefano Galzarano received the B.S. and M.S. degrees both in computer engineering from the University of Calabria, Rende, Italy, in 2006 and 2009, respectively. He is currently pursuing a joint Ph.D. degree in computer engineering with University of Calabria and Technical University of Eindhoven (The Netherlands). His research interests are focused on high-level programming methods for wireless sensor networks and, specifically, novel methods and frameworks for autonomic wireless body sensor networks.


  • Software quality : concepts and practice / by Daniel Galin
    QA 76.76 Q35G35 2017eb

    The book presents a comprehensive discussion on software quality issues and software quality assurance (SQA) principles and practices, and lays special emphasis on implementing and managing SQA. Primarily designed to serve three audiences; universities and college students, vocational training participants, and software engineers and software development managers, the book may be applicable to all personnel engaged in a software projects

    Features:

    A broad view of SQA. The book delves into SQA issues, going beyond the classic boundaries of custom-made software development to also cover in-house software development, subcontractors, and readymade software. An up-to-date wide-range coverage of SQA and SQA related topics. Providing comprehensive coverage on multifarious SQA subjects, including topics, hardly explored till in SQA texts. A systematic presentation of the SQA function and its tasks: establishing the SQA processes, planning, coordinating, follow-up, review and evaluation of SQA processes. Focus on SQA implementation issues. Specialized chapter sections, examples, implementation tips, and topics for discussion. Pedagogical support : Each chapter includes a real-life mini case study, examples, a summary, selected bibliography, review questions and topics for discussion. The book is also supported by an Instructor's Guide.

  • Software quality assurance / by Claude Y. Laporte, Alain April
    QA 76.76 Q35L42 2018eb

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace.

    Includes supplementary website with an instructor's guide and solutions Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  • Machine learning for data streams : with practical examples in MOA / Albert Bifet, Ricard Gavaldà, Geoff Holmes, Bernhard Pfahringer
    QA 76.9 D343B54 2018eb

    A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework.

    Today many information sources--including sensor networks, financial markets, social networks, and healthcare monitoring--are so-called data streams, arriving sequentially and at high speed. Analysis must take place in real time, with partial data and without the capacity to store the entire data set. This book presents algorithms and techniques used in data stream mining and real-time analytics. Taking a hands-on approach, the book demonstrates the techniques using MOA (Massive Online Analysis), a popular, freely available open-source software framework, allowing readers to try out the techniques after reading the explanations.

    The book first offers a brief introduction to the topic, covering big data mining, basic methodologies for mining data streams, and a simple example of MOA. More detailed discussions follow, with chapters on sketching techniques, change, classification, ensemble methods, regression, clustering, and frequent pattern mining. Most of these chapters include exercises, an MOA-based lab session, or both. Finally, the book discusses the MOA software, covering the MOA graphical user interface, the command line, use of its API, and the development of new methods within MOA. The book will be an essential reference for readers who want to use data stream mining as a tool, researchers in innovation or data stream mining, and programmers who want to create new algorithms for MOA.


  • The materiality of interaction : notes on the materials of interaction design / Mikael Wiberg
    QA 76.9 H85W486 2017eb
    A new approach to interaction design that moves beyond representation and metaphor to focus on the material manifestations of interaction.Smart watches, smart cars, the Internet of things, 3D printing: all signal a trend toward combining digital and analog materials in design. Interaction with these new hybrid forms is increasingly mediated through physical materials, and therefore interaction design is increasingly a material concern. In this book, Mikael Wiberg describes the shift in interaction design toward material interactions. He argues that the "material turn" in human-computer interaction has moved beyond a representation-driven paradigm, and he proposes "material-centered interaction design" as a new approach to interaction design and its materials. He calls for interaction design to abandon its narrow focus on what the computer can do and embrace a broader view of interaction design as a practice of imagining and designing interaction through material manifestations. A material-centered approach to interaction design enables a fundamental design method for working across digital, physical, and even immaterial materials in interaction design projects.Wiberg looks at the history of material configurations in computing and traces the shift from metaphors in the design of graphical user interfaces to materiality in tangible user interfaces. He examines interaction through a material lens; suggests a new method and foundation for interaction design that accepts the digital as a design material and focuses on interaction itself as the form being designed; considers design across substrates; introduces the idea of "interactive compositions"; and argues that the focus on materiality transcends any distinction between the physical and digital.

  • Data visualisation : a handbook for data driven design / Andy Kirk
    QA 76.9 I52 K575 2016
    Voted one of the "six best books for data geeks" by The Financial Times. Read the review here. Never has it been more essential to work in the world of data. Scholars and students need to be able to analyze, design, and curate information into useful tools of communication, insight, and understanding. Data Visualisation: A Handbook for Data Driven Design is the starting point in learning the process and skills of data visualization, teaching the concepts and skills of how to present data, and inspiring effective visual design.

  • C++17 quick syntax reference : a pocket guide to the language, APIs and library / Mikael Olsson
    QA76.736.C153

  • New frontiers in mining complex patterns : 6th International Workshop, NFMCP 2017, held in conjunction with ECML-PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Revised selected papers / Annalisa Appice, Corrado Loglisci, Giuseppe Manco, Elio Masciari, Zbigniew W. Ras (eds.)
    QA76.9.D343

  • Soft computing applications / Kanad Ray, Millie Pant, Anirban Bandyopadhyay, editors
    QA76.9.S63

  • The student supercomputer challenge guide : from supercomputing competition to the next HPC generation / by ASC Community
    QA76.88

  • Beginning DAX with Power BI : the SQL pro's guide to better business intelligence / Philip Seamark
    QA76.7

  • Modeling companion for software practitioners / Egon Börger, Alexander Raschke
    QA76.754

  • Advanced data analytics using Python : with machine learning, deep learning and NLP examples / Sayan Mukhopadhyay
    QA76.73.P98

  • Fault tolerant architectures for cryptography and hardware security / Sikhar Patranabis, Debdeep Mukhopadhyay, editors
    QA76.9.F38
    This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

  • 5th International Symposium on Data Mining Applications / Mamdouh Alenezi, Basit Qureshi, editors
    QA76.9.D343

  • Security with intelligent computing and big-data services / Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editor
    QA76.9.A25

  • Essential PowerShell for Office 365 : managing and automating skills for improved productivity / Vlad Catrinescu
    QA76.73.W56

  • Beginning C++17 : from novice to professional / Ivor Horton, Peter Van Weert
    QA76.73.C153

  • Cloud computing : concepts and practices / Naresh Kumar Sehgal, Pramod Chandra P. Bhatt
    QA76.585

  • Objective-C for absolute beginners : iPhone, iPad and Mac programming made easy / Stefan Kaczmarek, Brad Lees, Gary Bennett, Mitch Fisher
    QA76.73.O115

  • Deep neural networks in a mathematical framework / Anthony L. Caterini, Dong Eui Chang
    QA76.87

  • Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers / Howon Kim, Dong-Chan Kim (eds.)
    QA76.9.A25

  • Artificial evolution : 13th International Conference, Évolution Artificielle, EA 2017, Paris, France, October 25-27, 2017, Revised selected papers / Evelyne Lutton, Pierrick Legrand, Pierre Parrend, Nicolas Monmarché, Marc Schoenauer (eds.)
    QA76.618

  • Parallel processing and applied mathematics : 12th International Conference, PPAM 2017, Lublin, Poland, September 10-13, 2017, Revised selected papers. Roman Wyrzykowski, Jack Dongarra, Ewa Deelman, Konrad Karczewski (eds.)
    QA76.58

  • Parallel processing and applied mathematics : 12th International Conference, PPAM 2017, Lublin, Poland, September 10-13, 2017, Revised selected papers. Roman Wyrzykowski, Jack Dongarra, Ewa Deelman, Konrad Karczewski (eds.)
    QA76.58

  • Genetic programming : 21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018, Proceedings / Mauro Castelli, Lukas Sekanina, Mengjie Zhang, Stefano Cagnoni, Pablo García-Sánchez (eds.)
    QA76.623

  • Evolutionary computation in combinatorial optimization : 18th European Conference, EvoCOP 2018, Parma, Italy, April 4-6, 2018, Proceedings / Arnaud Liefooghe, Manuel López-Ibáñez (eds.)
    QA76.618

  • Computational intelligence in music, sound, art and design : 7th International Conference, EvoMUSART 2018, Parma, Italy, April 4-6, 2018, Proceedings / Antonios Liapis, Juan Jesús Romero Cardalda, Anikó Ekárt (eds.)
    QA76.618

  • Supercomputing frontiers : 4th Asian Conference, SCFA 2018, Singapore, March 26-29, 2018, Proceedings / Rio Yokota, Weigang Wu (eds.)
    QA76.88

  • Job scheduling strategies for parallel processing : 21st International Workshop, JSSPP 2017, Orlando, FL, USA, June 2, 2017, Revised selected papers / Dalibor Klusáček, Walfredo Cirne, Narayan Desai (eds.)
    QA76.58

  • Beginning Rust : from novice to professional / Carlo Milanesi
    QA76.6

  • Computational linguistics and intelligent text processing : 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers. Alexander Gelbukh (ed.)
    QA76.9.T48

  • Computational linguistics and intelligent text processing : 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers. Alexander Gelbukh (ed.)
    QA76.9.T48

  • Energy efficient high performance processors : recent approaches for designing green high performance computing / Jawad Haj-Yahya, Avi Mendelson, Yosi Ben Asher, Anupam Chattopadhyay
    QA76.88

  • Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats / Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
    QA76.9.A25

  • Thinking-driven testing : the most reasonable approach to quality control / Adam Roman
    QA76.758

  • Modelling and verification of secure exams / Rosario Giustolisi
    QA76.9.A25

  • Beginning PostgreSQL on the cloud : simplifying database as a service on cloud platforms / Baji Shaik, Avinash Vallarapu
    QA76.9.D3

  • Traffic mining applied to police activities : proceedings of the 1st Italian Conference for the Traffic Police (TRAP- 2017) / Fabio Leuzzi, Stefano Ferilli, editors
    QA76.9.D343

  • Intelligent systems design and applications : 17th International Conference on Intelligent Systems Design and Applications (ISDA 2017) held in Delhi, India, December 14-16, 2017 / Ajith Abraham, Pranab Kr. Muhuri, Azah Kamilah Muda, Niketa Gandhi, editors
    QA76.76.E95

  • Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers / edited by Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała
    QA76.9.A25

  • Linked Data Storing, Querying, and Reasoning / by Sherif Sakr, Marcin Wylot, Raghava Mutharaju, Danh Le Phuoc, Irini Fundulaki
    QA75.5

  • Context-Aware Systems and Applications, and Nature of Computation and Communication : 6th International Conference, ICCASA 2017, and 3rd International Conference, ICTCC 2017, Tam Ky, Vietnam, November 23-24, 2017, Proceedings / Phan Cong Vinh, Nguyen Ha Huy Cuong, Emil Vassev (eds.)
    QA76.5915

  • Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometrics / edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
    QA76.9.A25

  • Applications of Evolutionary Computation 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings / edited by Kevin Sim, Paul Kaufmann
    QA76.9.A43

  • A Beginner's Guide to Scala, Object Orientation and Functional Programming by John Hunt
    QA76.6

  • Group recommender systems : an introduction / Alexander Felfernig, Ludovico Boratto, Martin Stettinger, Marko Tkalčič
    QA76.9.I58 F45 2018eb

  • Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
    QA76.758

  • Inductive logic programming : 27th International Conference, ILP 2017, Orléans, France, September 4-6, 2017, Revised selected papers / Nicolas Lachiche, Christel Vrain (eds.)
    QA76.63 .I47 2017eb

  • Advances in natural language processing, intelligent informatics and smart technology : selected revised papers from the eleventh International Symposium on Natural Language Processing (SNLP-2016) and the first Workshop in Intelligent Informatics and Smart Technology, 10-12 February 2016, Phranakhon, Si Ayutthaya, Thailand / Thanaruk Theeramunkong, Rachada Kongkachandra, Thepchai Supnithi, editors
    QA76.9.N38

  • The definitive guide to AdonisJs : building Node.js applications with JavaScript / Christopher Pitt
    QA76.73.J39

  • Good habits for great coding : improving programming skills with examples in Python / Michael Stueben
    QA76.73.P98

  • Modelling and simulation for autonomous systems : 4th International Conference, MESAS 2017, Rome, Italy, October 24-26, 2017, Revised selected papers / Jan Mazal (eds.)
    QA76.9.C65

  • Theory and applications of formal argumentation : 4th International Workshop, TAFA 2017, Melbourne, VIC, Australia, August 19-20, 2017, Revised selected papers / Elizabeth Black, Sanjay Modgil, Nir Oren (eds.)
    QA76.9.F67

  • Proceedings of the ninth International Conference of Soft Computing and Pattern Recognition (SoCPaR 2017) / Ajith Abraham, Abdelkrim Haqiq, Azah Kamilah Muda, Niketa Gandhi, editors
    QA76.9.S63

  • Innovations in bio-inspired computing and applications : proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017) held in Marrakech, Morocco, December 11-13, 2017 / Ajith Abraham, Abdelkrim Haqiq, Azah Kamilah Muda, Niketa Gandhi, editors
    QA76.9.N37

  • Practical app development with Aurelia : leverage the power of Aurelia to build personal and business applications / Matthew Duffield
    QA76.76.A65

  • Modern API design with ASP.NET Core 2 : building cross-platform back-end systems / Fanie Reynders
    QA76.76.A63

  • Learn JavaScript with p5.js : coding for visual learners / Engin Arslan
    QA76.73.J39

  • Building intelligent systems : a guide to machine learning engineering / Geoff Hulten
    QA76.76.I58

  • Information systems design and intelligent applications : proceedings of Fourth International Conference INDIA 2017 / Vikrant Bhateja, Bao Le Nguyen, Nhu Gia Nguyen, Suresh Chandra Satapathy, Dac-Nhuong Le, editors
    QA76.9.S88

  • Data science landscape : towards research standards and protocols / Usha Mujoo Munshi, Neeta Verma, editors
    QA76.9.B45

  • Public-key cryptography -- PKC 2018 : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings. Michel Abdalla, Ricardo Dahab (eds.)
    QA76.9.A25

  • Public-key cryptography -- PKC 2018 : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings. Michel Abdalla, Ricardo Dahab (eds.)
    QA76.9.A25

  • Advances in computer entertainment technology : 14th International Conference, ACE 2017, London, UK, December 14-16, 2017, Proceedings / Adrian David Cheok, Masahiko Inami, Teresa Romão (eds.)
    QA76.9.E57

  • Reactive design patterns / Roland Kuhn, with Brian Hanafee and Jamie Allen ; foreword by Jonas Bonér
    QA 76.9 S88 K84 2017

    Summary

    Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly designs. All patterns include concrete examples using Scala and Akka. Foreword by Jonas Bonér.

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the Technology

    Modern web applications serve potentially vast numbers of users - and they need to keep working as servers fail and new ones come online, users overwhelm limited resources, and information is distributed globally. A Reactive application adjusts to partial failures and varying loads, remaining responsive in an ever-changing distributed environment. The secret is message-driven architecture - and design patterns to organize it.

    About the Book

    Reactive Design Patterns presents the principles, patterns, and best practices of Reactive application design. You'll learn how to keep one slow component from bogging down others with the Circuit Breaker pattern, how to shepherd a many-staged transaction to completion with the Saga pattern, how to divide datasets by Sharding, and more. You'll even see how to keep your source code readable and the system testable despite many potential interactions and points of failure.

    What's Inside

    The definitive guide to the Reactive Manifesto Patterns for flow control, delimited consistency, fault tolerance, and much more Hard-won lessons about what doesn't work Architectures that scale under tremendous load

    About the Reader

    Most examples use Scala, Java, and Akka. Readers should be familiar with distributed systems.

    About the Author

    Dr. Roland Kuhn led the Akka team at Lightbend and coauthored the Reactive Manifesto. Brian Hanafee and Jamie Allen are experienced distributed systems architects.

    Table of Contents

    PART 1 - INTRODUCTION Why Reactive? A walk-through of the Reactive Manifesto Tools of the trade PART 2 - THE PHILOSOPHY IN A NUTSHELL Message passing Location transparency Divide and conquer Principled failure handling Delimited consistency Nondeterminism by need Message flow PART 3 - PATTERNS Testing reactive applications Fault tolerance and recovery patterns Replication patterns Resource-management patterns Message flow patterns Flow control patterns State management and persistence patterns

  • Digital media and the politics of transformation in the Arab world and Asia / Carola Richter, Anna Antonakis, Cilja Harders, editors
    QA76.575

  • Guide to scientific computing in C++ / Joe Pitt-Francis, Jonathan Whiteley
    QA76.73.C153

  • Algorithmic and experimental methods in algebra, geometry, and number theory / Gebhard Böckle, Wolfram Decker, Gunter Malle, editors
    QA76.9.A43

  • Multiscale models in mechano and tumor biology : modeling, homogenization, and applications / Alf Gerisch, Raimondo Penta, Jens Lang, editors
    QA76.9.C65

  • Sliding window algorithm for mobile communication networks / Nuka Mallikharjuna Rao, Mannava Muniratnam Naidu
    QA76.59

  • Context-aware collaborative prediction / Shu Wu, Qiang Liu, Liang Wang, Tieniu Tan
    QA76.5915

  • Creating and capturing value through crowdsourcing / edited by Christopher L. Tucci, Allan Afuah, and Gianluigi Viscusi
    QA 76.9 H84 C74 2018eb

  • Information Security : foundations, technologies and applications / edited by Ali Ismail Awad and Michael Fairhurst
    QA 76.9 A25 I56 2018eb

    The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

    Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.


  • Distributed computing pearls / Gadi Taubenfeld
    QA 76.9 D5T283 2018eb

    Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce. One of the most challenging problems in computer science for the 21st century is to improve the design of distributed systems where computing devices have to work together as a team to achieve common goals.

    In this book, I have tried to gently introduce the general reader to some of the most fundamental issues and classical results of computer science underlying the design of algorithms for distributed systems, so that the reader can get a feel of the nature of this exciting and fascinating field called distributed computing. The book will appeal to the educated layperson and requires no computer-related background. I strongly suspect that also most computer knowledgeable readers will be able to learn something new.


  • Using OpenMP - the next step : affinity, accelerators, tasking, and SIMD / Ruud van der Pas, Eric Stotzer, and Christian Terboven
    QA 76.642 P427 2017

    A guide to the most recent, advanced features of the widely used OpenMP parallel programming model, with coverage of major features in OpenMP 4.5.

    This book offers an up-to-date, practical tutorial on advanced features in the widely used OpenMP parallel programming model. Building on the previous volume, Using OpenMP: Portable Shared Memory Parallel Programming (MIT Press), this book goes beyond the fundamentals to focus on what has been changed and added to OpenMP since the 2.5 specifications. It emphasizes four major and advanced areas: thread affinity (keeping threads close to their data), accelerators (special hardware to speed up certain operations), tasking (to parallelize algorithms with a less regular execution flow), and SIMD (hardware assisted operations on vectors).

    As in the earlier volume, the focus is on practical usage, with major new features primarily introduced by example. Examples are restricted to C and C++, but are straightforward enough to be understood by Fortran programmers. After a brief recap of OpenMP 2.5, the book reviews enhancements introduced since 2.5. It then discusses in detail tasking, a major functionality enhancement; Non-Uniform Memory Access (NUMA) architectures, supported by OpenMP; SIMD, or Single Instruction Multiple Data; heterogeneous systems, a new parallel programming model to offload computation to accelerators; and the expected further development of OpenMP.


  • Computer security literacy : staying safe in a digital world / Douglas Jacobson and Joseph Idziorek
    QA 76.9 A25 J224 2013

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital Worldfocuses on practical security topics that users are likely to encounter on a regular basis.

    Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware.

    While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world.

page last updated on: Friday 20 July 2018
Back to top Back to top