« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 

Computer Science - Concordia University Libraries Recent Acquisitions

Titles in the call number range QA 75 - QA 76 (Computer Science) that were added to the Concordia University Libraries collection in the last 60 days.

  • Cloud computing basics / T.B. Rehman
    QA 76.585 R44 2019eb
    This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides a detailed understanding of the benefits of cloud computing that can encourage enterprises to switch to the cloud.


    - Provides a basic understanding of the computing paradigm of cloud computing
    - Gives a brief introduction to cloud computing, its architecture, and the Hadoop distributed file system
    - Deals with cloud management concepts like scalable, fault tolerance, resiliency, provisioning, asset management, cloud governance, high availability, disaster recovery, and multi-tenancy
    - Includes case studies on MS Azure, Google, Amazon Web Services, Aneka, etc.

  • Advances in information systems development : methods, tools and management / Nearchos Paspallis [and 5 others], editors

  • Applications of data management and analysis : case studies in social networks and beyond / Mohammad Moshirpour, Behrouz H. Far, Reda Alhajj, editors
    QA 76.9 D3 A67 2018eb

  • Advances in soft computing : 16th Mexican International Conference on Artificial Intelligence, MICAI 2017 Enseneda, Mexico, October 23-28, 2017, proceedings. Félix Castro, Sabino Miranda-Jiménez, Miguel González-Mendoza (eds.)

  • Advances in soft computing : 16th Mexican International Conference on Artificial Intelligence, MICAI 2017 Enseneda, Mexico, October 23-28, 2017, proceedings. Félix Castro, Sabino Miranda-Jiménez, Miguel González-Mendoza (eds.)

  • Analysis of images, social networks and texts : 7th International Conference, AIST 2018, Moscow, Russia, July 5-7, 2018, Revised selected papers / Wil M.P. van der Aalst [and 13 more] (eds.)

  • Security and privacy in communication networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings. edited by Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.)

  • Security and privacy in communication networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings. Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.)

  • Network and parallel computing : 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29-December 1, 2018, Proceedings / Feng Zhang, Jidong Zhai, Marc Snir, Hai Jin, Hironori Kasahara, Mateo Valero (eds.)

  • Algorithms and architectures for parallel processing : ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings / Ting Hu, Feng Wang, Hongwei Li, Qian Wang (eds.)
    QA 76.58 I528 2018eb

  • Advanced data mining and applications : 14th International Conference, ADMA 2018, Nanjing, China, November 16-18, 2018, Proceedings / Guojun Gan, Bohan Li, Xue Li, Shuliang Wang (eds.)

  • Privacy technologies and policy : 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised selected papers / Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas (eds.)

  • Mining intelligence and knowledge exploration : 6th International Conference, MIKE 2018, Cluj-Napoca, Romania, December 20-22, 2018, Proceedings / Adrian Groza, Rajendra Prasath (eds.)

  • Graph drawing and network visualization : 26th International Symposium, GD 2018, Barcelona, Spain, September 26-28, 2018, Proceedings / Therese Biedl, Andreas Kerren (eds.)

  • Network and system security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.)

  • Critical infrastructure protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised selected papers / Jason Staggs, Sujeet Shenoi (eds.)

  • Progress in cryptology - INDOCRYPT 2018 : 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings / Debrup Chakraborty, Tetsu Iwata (Eds.)
    QA 76.9 D335 P76 2018eb

  • Models of computation for big data / Rajendra Akerkar
    QA 76.9 A43 M63 2018eb

  • Combinatorial Optimization and Applications : 12th International Conference, COCOA 2018, Atlanta, GA, USA, December 15-17, 2018, Proceedings / edited by Donghyun Kim, R. N. Uma, Alexander Zelikovsky

  • Web and Internet Economics : 14th International Conference, WINE 2018, Oxford, UK, December 15-17, 2018, Proceedings / edited by George Christodoulou, Tobias Harks

  • PDE models for multi-agent phenomena / editors Pierre Cardaliaguet, Alessio Porretta and Francesco Salvarani

  • Modeling and simulation with Compose and Activate / Stephen L. Campbell, Ramine Nikoukhah

  • Python for data mining quick syntax reference / Valentina Porcu

  • Generic pipelines using Docker : the DevOps guide to building reusable, platform agnostic CI/CD frameworks / Brandon Atkinson and Dallas Edwards

  • Practical quantum computing for developers : programming quantum rigs in the cloud using Python, Quantum Assembly Language and IBM QExperience / Silva Vladimir
    QA 76.889 S55 2018

  • Reinventing ITIL® in the age of DevOps : innovative techniques to make processes agile and relevant / Abhinav Krishna Kaiser
    QA 76.76 A65 K75 2018eb

  • Trends and applications in knowledge discovery and data mining : PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised selected papers / Mohadeseh Ganji, Lida Rashidi, Benjamin C. M. Fung, Can Wang (eds.)

  • Big data analytics : 6th International Conference, BDA 2018, Warangal, India, December 18-21, 2018, Proceedings / Anirban Mondal, Himanshu Gupta, Jaideep Srivastava, P. Krishna Reddy, D.V.L.N. Somayajulu (eds.)

  • Software technologies : applications and foundations : STAF 2018 Collocated Workshops, Toulouse, France, June 25-29, 2018, Revised selected papers / Manuel Mazzara, Iulian Ober, Gwen Salaün (eds.)

  • Encyclopedia of database systems / M. Tamer Ozsu, Ling Liu, editors

  • Smart computing and communication : third International Conference, SmartCom 2018, Tokyo, Japan, December 10-12, 2018, Proceedings / Meikang Qiu (ed.)

  • Smart blockchain : first International Conference, SmartBlock 2018, Tokyo, Japan, December 10-12, 2018, Proceedings / Meikang Qiu (ed.)

  • Brain informatics : International Conference, BI 2018, Arlington, TX, USA, December 7-9, 2018, Proceedings / Shouyi Wang, Vicky Yamamoto, Jianzhong Su, Yang Yang, Erick Jones, Leon Iasemidis, Tom Mitchell (eds.)

  • Security, privacy, and anonymity in computation, communication, and storage : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.)

  • Algorithms and architectures for parallel processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings. Jaideep Vaidya, Jin Li (eds.)
    QA 76.58 I5284 2018eb

  • Algorithms and architectures for parallel processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings. Jaideep Vaidya, Jin Li (eds.)
    QA 76.58 I5283 2018eb

  • Information systems security : 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings / Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar (eds.)

  • Algorithms and architectures for parallel processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings. Jaideep Vaidya, Jin Li (eds.)
    QA 76.58 I5282 2018eb

  • Algorithms and architectures for parallel processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings. Jaideep Vaidya, Jin Li (eds.)
    QA 76.58 I5281 2018eb

  • Security, privacy, and applied cryptography engineering : 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings / Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom (eds.)

  • Theory and practice of natural computing : 7th International Conference, TPNC 2018, Dublin, Ireland, December 12-14, 2018, Proceedings / David Fagan, Carlos Martín-Vide, Michael O'Neill, Miguel A. Vega-Rodríguez (eds.)

  • Smart multimedia : first international conference, ICSM 2018, Toulon, France, August 24?26, 2018, Revised selected papers / Anup Basu, Stefano Berretti (eds.)

  • Modern X86 assembly language programming : covers X86 64-Bit, AVX, AVX2, and AVX-512 / Daniel Kusswurm
    QA 76.73 X16 K87 2018eb

  • Beginning Functional JavaScript : Uncover the Concepts of Functional Programming with EcmaScript 8 / Anto Aravinth, Srikanth Machiraju
    QA 76.73 J39 A73 2018eb

  • Practical Apache Spark : using the Scala API / Subhashini Chellappan and Dharanitharan Ganesan

  • The innovation in computing companion : a compendium of select, pivotal inventions / Gerard O'Regan
    QA 76.5 O74 2018eb

  • Dynamic Oracle performance analytics : using normalized metrics to improve database speed / Roger Cornejo

  • Java for absolute beginners : learn to program the fundamentals the Java 9+ way / Luliana Cosmina

  • JavaScript and open data / Robert Jeansoulin
    QA 76.73 J39 J43 2018eb

    This book will teach you how to take advantage of the JavaScript language to process data provided on the Internet.

    Much attention is given to the main JavaScript backbone: prototype based objects, and functional capabilities, while common features (loops, etc.) are summarized in a few cheat-sheets. Only operational features are detailed through the coding of several applications -the second and largest part of the book-, on free-access datasets (e.g. World Bank). It includes: cartography (SVG or API's based), data-sheets access (via Ajax or Jsonp), video data and post-synchronization, and animation examples.

  • Data analysis for omic sciences : methods and applications / edited by Joaquim Jaumot, Carmen Bedia, Romà Tauler
    QA 76.9 Q36 D38 2018eb

    Data Analysis for Omic Sciences: Methods and Applications, Volume 82, shows how these types of challenging datasets can be analyzed. Examples of applications in real environmental, clinical and food analysis cases help readers disseminate these approaches. Chapters of note include an Introduction to Data Analysis Relevance in the Omics Era, Omics Experimental Design and Data Acquisition, Microarrays Data, Analysis of High-Throughput RNA Sequencing Data, Analysis of High-Throughput DNA Bisulfite Sequencing Data, Data Quality Assessment in Untargeted LC-MS Metabolomic, Data Normalization and Scaling, Metabolomics Data Preprocessing, and more.

    Presents the best reference book for omics data analysis Provides a review of the latest trends in transcriptomics and metabolomics data analysis tools Includes examples of applications in research fields, such as environmental, biomedical and food analysis

  • Contingent computation : abstraction, experience, and indeterminacy in computational aesthetics / M. Beatrice Fazi
    QA 76.167 F39 2018eb

  • CISSP / by Lawrence C. Miller and Peter H. Gregory
    QA 76.3 M566 2018eb

    Secure your CISSP certification!

    If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a 60-day study plan, tips for exam day, and access to an online test bank of questions.

    CISSP For Dummies is fully updated and reorganized to reflect upcoming changes (ISC)2 has made to the Common Body of Knowledge. Complete with access to an online test bank this book is the secret weapon you need to pass the exam and gain certification.

    Get key information for all eight exam domains Find test-taking and exam-day tips and tricks Benefit from access to free online practice questions and flash cards Prepare for the CISSP certification in 2018 and beyond

    You've put in the time as a security professional--and now you can reach your long-term goal of CISSP certification.

  • Analytic methods in systems and software testing / edited by Ron S. Kenett, KPA, Israel and Neaman Institute, Technion, Israel, Fabrizio Ruggeri, CNR-IMATI, Italy, Frederick W. Faltin, the Faltin Group, and Virginia Tech, USA
    QA 76.76 T48 A52 2018eb

    A comprehensive treatment of systems and software testing using state of the art methods and tools

    This book provides valuable insights into state of the art software testing methods and explains, with examples, the statistical and analytic methods used in this field. Numerous examples are used to provide understanding in applying these methods to real-world problems. Leading authorities in applied statistics, computer science, and software engineering present state-of-the-art methods addressing challenges faced by practitioners and researchers involved in system and software testing. Methods include: machine learning, Bayesian methods, graphical models, experimental design, generalized regression, and reliability modeling.

    Analytic Methods in Systems and Software Testing presents its comprehensive collection of methods in four parts: Part I: Testing Concepts and Methods; Part II: Statistical Models; Part III: Testing Infrastructures; and Part IV: Testing Applications. It seeks to maintain a focus on analytic methods, while at the same time offering a contextual landscape of modern engineering, in order to introduce related statistical and probabilistic models used in this domain. This makes the book an incredibly useful tool, offering interesting insights on challenges in the field for researchers and practitioners alike.

    Compiles cutting-edge methods and examples of analytical approaches to systems and software testing from leading authorities in applied statistics, computer science, and software engineering Combines methods and examples focused on the analytic aspects of systems and software testing Covers logistic regression, machine learning, Bayesian methods, graphical models, experimental design, generalized regression, and reliability models Written by leading researchers and practitioners in the field, from diverse backgrounds including research, business, government, and consulting Stimulates research at the theoretical and practical level

    Analytic Methods in Systems and Software Testing is an excellent advanced reference directed toward industrial and academic readers whose work in systems and software development approaches or surpasses existing frontiers of testing and validation procedures. It will also be valuable to post-graduate students in computer science and mathematics.

  • The conquest of will : information processing in human affairs / Abbe Mowshowitz
    QA 76.9 C66 M68

  • Interactions in multiagent systems / Jianye Hao, Tianjin University, China, Ho-Fung Leung, the Chinese University of Hong Kong, China, editors
    QA 76.76 I58 H37 2019eb

  • Linux : the textbook / Syed Mansoor Sarwar and Robert M. Koretsky
    QA 76.774 L46 S37 2019eb

    Linux: The Textbook, Second Editionprovides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal commands and features that are critical to all Linux distributions.

    The second edition of the book includes extensive updates and new chapters on system administration for desktop, stand-alone PCs, and server-class computers; API for system programming, including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management.

    Brand new online content on the CRC Press website includes an instructor's workbook, test bank, and In-Chapter exercise solutions, as well as full downloadable chapters on Python Version 3.5 programming, ZFS, TC shell programming, advanced system programming, and more. An author-hosted GitHub website also features updates, further references, and errata.


    New or updated coverage of file system, sorting, regular expressions, directory and file searching, file compression and encryption, shell scripting, system programming, client-server-based network programming, thread programming with pthreads, and system administration Extensive in-text pedagogy, including chapter objectives, student projects, and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python, ZFS, TC shell scripting, advanced system programming, internetworking with Linux TCP/IP, and many more topics, all featured on the CRC Press website Downloadable test bank, work book, and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources, such as live links to further references, updates, and errata

  • Integrating a usable security protocol into user authentication services design process / by Christina Braz, Ahmed Seffah, Syed Naqvi
    QA 76.9 A25 S45336 2019eb

    There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

  • The everyday life of an algorithm / Daniel Neyland
    QA 76.9 A43 N49 2019
    This open access book begins with an algorithm-a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in a series of ever more demanding forms of experimentation. Here the algorithm must prove its ability to get a grip on everyday life if it is to become an ordinary feature of the settings where it is being put to work. Through investigating the everyday life of the algorithm, the book opens a conversation with existing social science research that tends to focus on the power and opacity of algorithms. In this book we have unique access to the algorithm's design, development and testing, but can also bear witness to its fragility and dependency on others.

  • Practical binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly / by Dennis Andriesse
    QA 76.76 D57 A53 2019
    Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics in an accessible way. After an introduction on the basics of binary formats, disassembly, and code injection, you'll dive into more complex topics such as binary instrumentation, dynamic taint analysis, and symbolic execution. By the end of the book, you'll be able to build your own binary analysis tools on Linux by following hands-on and practical examples.

  • Network data mining and analysis / by Ming Gao, East China Normal University, China, Ee-Peng Lim, Singapore Management University, Singapore, David Lo, Singapore Management University, Singapore
    QA 76.9 D343 G36 2019eb

  • Code generation, analysis tools, and testing for quality / [edited by] Ricardo Alexandre Peixoto de Queiros, Alberto Simoes, Mario Teixeira Pinto
    QA 76.76 T48 C63 2019eb
    Despite the advances that have been made in programming, there is still a lack of sufficient methods for quality control. While code standards try to force programmers to follow a specific set of rules, few tools exist that really deal with automatic refactoring of this code, and evaluation of the coverage of these tests is still a challenge. Code Generation, Analysis Tools, and Testing for Quality is an essential reference source that discusses the generation and writing of computer programming and methods of quality control such as analysis and testing. Featuring research on topics such as programming languages, quality assessment, and automated development, this book is ideally designed for academicians, practitioners, computer science teachers, enterprise developers, and researchers seeking coverage on code auditing strategies and methods.

  • Selected readings in cybersecurity / edited by Young B. Choi
    QA 76.9 A25 S45 2018eb

  • The beauty of mathematics in computer science / Jun Wu ; translated from the Chinese edition by Rachel Wu and Yuxi Candice Wang
    QA 76.9 M35 W84 2019eb

    The Beauty of Mathematics in Computer Scienceexplains the mathematical fundamentals of information technology products and services we use every day, from Google Web Search to GPS Navigation, and from speech recognition to CDMA mobile services. The book was published in Chinese in 2011 and has sold more than 600,000 copies. Readers were surprised to find that many daily-used IT technologies were so tightly tied to mathematical principles. For example, the automatic classification of news articles uses the cosine law taught in high school.

    The book covers many topics related to computer applications and applied mathematics including:

    Natural language processing

    Speech recognition and machine translation

    Statistical language modeling

    Quantitive measurement of information

    Graph theory and web crawler

    Pagerank for web search

    Matrix operation and document classification

    Mathematical background of big data

    Neural networks and Google's deep learning

    Jun Wu was a staff research scientist in Google who invented Google's Chinese, Japanese, and Korean Web Search Algorithms and was responsible for many Google machine learning projects. He wrote official blogs introducing Google technologies behind its products in very simple languages for Chinese Internet users from 2006-2010. The blogs had more than 2 million followers. Wu received PhD in computer science from Johns Hopkins University and has been working on speech recognition and natural language processing for more than 20 years. He was one of the earliest engineers of Google, managed many products of the company, and was awarded 19 US patents during his 10-year tenure there. Wu became a full-time VC investor and co-founded Amino Capital in Palo Alto in 2014 and is the author of eight books.

  • Cryptographic and information security : approaches for images and videos / edited by S. Ramakrishnan
    QA 76.9 A25 C843 2019eb

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.

  • Model checking / Edmund M Clarke Jr., Orna Grumberg, Daniel Kroening, Doron Peled, and Helmut Veith
    QA 76.76 V47 C553 2018

    Forthcoming from the MIT Press.

  • Advanced metaheuristic methods in big data retrieval and analytics / Hadj Ahmed Bouarara, Reda Mohamed Hamou, and Amine Rahmani, editors
    QA 76.9 B45 A34 2019eb
    The amount of data shared and stored on the web and other document repositories is steadily on the rise. Unfortunately, this growth increases inefficiencies and difficulties when trying to find the most relevant and up-to-date information due to unstructured data. Advanced Metaheuristic Methods in Big Data Retrieval and Analytics examines metaheuristic techniques as an important alternative model for solving complex problems that are not treatable by deterministic methods. Recent studies suggest that IR and biomimicry can be used together for several application problems in big data and internet of things, especially when conventional methods would be too expensive or difficult to implement. Featuring coverage on a broad range of topics such as ontology, plagiarism detection, and machine learning, this book is ideally designed for engineers, graduate students, IT professionals, and academicians seeking an overview of new trends in information retrieval in big data.

  • Angular development with TypeScript / Yakov Fain, Anton Moiseev
    QA 76.76 A54 F35 2019


    Angular Development with TypeScript, Second Edition is an intermediate-level tutorial that introduces Angular and TypeScript to developers comfortable with building web applications using other frameworks and tools.

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the Technology

    Whether you're building lightweight web clients or full-featured SPAs, Angular is a clear choice. The Angular framework is fast, efficient, and widely adopted. Add the benefits of developing in the statically typed, fully integrated TypeScript language, and you get a programming experience other JavaScript frameworks just can't match.

    About the Book

    Angular Development with TypeScript, Second Edition teaches you how to build web applications with Angular and TypeScript. Written in an accessible, lively style, this illuminating guide covers core concerns like state management, data, forms, and server communication as you build a full-featured online auction app. You'll get the skills you need to write type-aware classes, interfaces, and generics with TypeScript, and discover time-saving best practices to use in your own work.

    What's inside

    Code samples for Angular 5, 6, and 7 Dependency injection Reactive programming The Angular Forms API

    About the Reader

    Written for intermediate web developers familiar with HTML, CSS, and JavaScript.

    About the Author

    Yakov Fain and Anton Moiseev are experienced trainers and web application developers. They have coauthored several books on software development.

    Table of Contents

    Introducing Angular The main artifacts of an Angular app Router basics Router advanced Dependency injection in Angular Reactive programming in Angular Laying out pages with Flex Layout Implementing component communications Change detection and component lifecycle Introducing the Forms API Validating forms Interacting with servers using HTTP Interacting with servers using the WebSocket protocol Testing Angular applications Maintaining app state with ngrx

  • The Rust programming language / by Steve Klabnik and Carol Nichols ; with contributions from the Rust Community
    QA 76.73 R87 K53 2018
    The Rust Programming Language is the official, definitive guide to Rust, a hugely popular, community-supported programming language. The reader will learn all about Rust's ownership rules, which lie at the heart of Rust's reliability and crash-resistant compiling. The Rust Programming Language covers everything from basic concepts like variable bindings, control flow, functions, and error handling, to more advanced topics, such as crates, generics, concurrency, and the nitty gritty of Rust's type system.

  • Internet Daemons : Digital Communications Possessed / Fenwick McKelvey
    QA 76.625 M3825 2018eb

    A complete history and theory of internet daemons brings these little-known--but very consequential--programs into the spotlight

    We're used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net's infrastructure--as well as the devices we use to access it--daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives--including their role in hot-button issues like network neutrality.

    Going back to Victorian times and the popular thought experiment Maxwell's Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast's efforts to control peer-to-peer networking, and Pirate Bay's attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users.

    Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight.

  • Designing with the Body : Somaesthetic Interaction Design / Kristina Höök
    QA 76.9 U83 H64 2018eb

    Interaction design that entails a qualitative shift from a symbolic, language-oriented stance to an experiential stance that encompasses the entire design and use cycle.

    With the rise of ubiquitous technology, data-driven design, and the Internet of Things, our interactions and interfaces with technology are about to change dramatically, incorporating such emerging technologies as shape-changing interfaces, wearables, and movement-tracking apps. A successful interactive tool will allow the user to engage in a smooth, embodied, interaction, creating an intimate correspondence between users' actions and system response. And yet, as Kristina Höök points out, current design methods emphasize symbolic, language-oriented, and predominantly visual interactions. In Designing with the Body , Höök proposes a qualitative shift in interaction design to an experiential, felt, aesthetic stance that encompasses the entire design and use cycle.

    Höök calls this new approach soma design ; it is a process that reincorporates body and movement into a design regime that has long privileged language and logic. Soma design offers an alternative to the aggressive, rapid design processes that dominate commercial interaction design; it allows (and requires) a slow, thoughtful process that takes into account fundamental human values. She argues that this new approach will yield better products and create healthier, more sustainable companies.

    Höök outlines the theory underlying soma design and describes motivations, methods, and tools. She offers examples of soma design "encounters" and an account of her own design process. She concludes with "A Soma Design Manifesto," which challenges interaction designers to "restart" their field--to focus on bodies and perception rather than reasoning and intellect.

  • Refactoring for software design smells : managing technical debt / Girish Suryanarayana, Ganesh Samarthyam, Tushar Sharma
    QA 76.76 R42 S86 2015
    Awareness of design smells - indicators of common design problems - helps developers or software engineers understand mistakes made while designing, what design principles were overlooked or misapplied, and what principles need to be applied properly to address those smells through refactoring. Developers and software engineers may "know" principles and patterns, but are not aware of the "smells" that exist in their design because of wrong or mis-application of principles or patterns. These smells tend to contribute heavily to technical debt - further time owed to fix projects thought to be complete - and need to be addressed via proper refactoring.

    Refactoring for Software Design Smells presents 25 structural design smells, their role in identifying design issues, and potential refactoring solutions. Organized across common areas of software design, each smell is presented with diagrams and examples illustrating the poor design practices and the problems that result, creating a catalog of nuggets of readily usable information that developers or engineers can apply in their projects. The authors distill their research and experience as consultants and trainers, providing insights that have been used to improve refactoring and reduce the time and costs of managing software projects. Along the way they recount anecdotes from actual projects on which the relevant smell helped address a design issue.

  • Sentiment analysis in the bio-medical domain : techniques, tools, and applications / Ranjan Satapathy, Erik Cambria, Amir Hussain

  • Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers / Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyáš, editors

  • DataFlow supercomputing essentials : algorithms, applications and implementations / Veljko Milutinovic, Milos Kotlar, Marko Stojanovic, Igor Dundic, Nemanja Trifunovic, Zoran Babovic

  • Sustained simulation performance 2017 : proceedings of the joint Workshop on Sustained Simulation Performance, University of Stuttgart (HLRS) and Tohoku University, 2017 / Michael M. Resch, Wolfgang Bez, Erich Focht, Michael Gienger, Hiroaki Kobayashi, editors

  • From database to cyber security : essays dedicated to Sushil Jajodia on the occasion of his 70th birthday / Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.)

  • Program the Internet of Things with Swift for IOS : Learn How to Program Apps for the Internet of Things

  • Stylish F# : Crafting Elegant Functional Code for .NET and .NET Core / Kit Eason

    Why just get by in F# when you can program in style! This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code.

    Stylish F# covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales.

    What You'll Learn

    Know why, when, and how to code in immutable style Use collection functions, piping, and function composition to build working software quickly Be aware of the techniques available to bring error handling into the mainstream of program logic
    Optimize F# code for maximum performance
    Identify and implement opportunities to use function injection to improve program design
    Appreciate the methods available to handle unknown data values
    Understand asynchronous and parallel programming in F#, and how it differs from C# asynchronous programming

    Who This Book Is For

    Any developer who writes F# code and wants to write it better

  • Approximation and online algorithms : 16th international workshop, WAOA 2018, Helsinki, Finland, August 23-24, 2018, revised selected papers / Leah Epstein, Thomas Erlebach (eds.)
    QA 76.9 A43 W36 2018eb

  • Developing turn-based multiplayer games : with Gamemaker studio 2 and NodeJS / Yadu Rajiv
    QA 76.76 C672 D48 2018eb
page last updated on: Thursday 21 February 2019
Back to top Back to top