Computing & Engineering Studies

Computing & Engineering Studies

Recent Submissions

  • Muller, Andreas C.; Guido, Sarah (O'Reilly, 2017)
    Machine learning is an integral part of many commercial applications and research projects today, in areas ranging from medical diagnosis and treatment to finding your friends on social networks. Many people think that ...
  • Galin, Daniel (IEEE Press, 2018)
    The book presents a comprehensive discussion on software quality issues and software quality assurance (SQA) principles and practices, and lays special emphasis on implementing and managing SQA. Primarily designed to serve ...
  • Stallings, William (Pearson, 2018)
    Now in its 9th Edition, Operating Systems: Internals and Design Principles provides a comprehensive, unified introduction to operating systems topics aimed at computer science, computer engineering, and electrical engineering ...
  • Stallings, William; Brown, Lawrie (Pearson, 2018)
    Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate—and is essential ...
  • Larsen, Richard J.; Marx, Morris L. (Pearson, 2018)
    Introduction to Mathematical Statistics and Its Applications , 6th Edition is a high-level calculus student’s first exposure to mathematical statistics. This book provides students who have already taken three or more ...
  • Jones, Capers (CRC Press, 2018)
    This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many ...
  • Kimball, Ralph; Ross, Margy (John Wiley & Sons, 2013)
    The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative guides in this space. This new third edition is a ...
  • Nelson, Bill; Phillips, Amelia; Steuart, Christopher (Cengage Learning, 2016)
    Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage, authoritative information from seasoned experts, and real-world ...
  • Goralski, Walter (Morgan Kaufmann, 2017)
    The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, ...
  • Vacca, John R. (Morgan Kaufmann, 2017)
    Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues ...
  • Stallings, William (Pearson, 2017)
    Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, ...
  • Comer, Douglas E. (Pearson, 2015)
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today’s Internet to support applications ranging from web browsing to telephony ...
  • Alpaydin, Ethem (MIT, 2016)
  • Stamp, Mark (CRC Press, 2017)
    Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is ...
  • Datta, Dilip (Springer, 2017)
    This book presents direct and concise explanations and examples to many LaTeX syntax and structures, allowing students and researchers to quickly understand the basics that are required for writing and preparing book ...
  • Arnes, Andre (2018)
    Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal ...
  • Katz, Jonathan; Lindell, Yehuda (CRC Press, 2015)
    Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment ...
  • Laudon, Kenneth C.; Traver, Carol Guercio (Pearson Education, 2017)
    E-commerce. Business. Technology. Society. Global Edition 12E provides you with an indepth introduction to the field of global e-commerce. We focus on key concepts, and the latest empirical and financial data, that will ...
  • Dennis, Alan; Wixom, Barbara Haley; Tegarden, David (Wiley, 2015)
    Th is book captures the dynamic aspects of the fi eld by keeping students focused on doing SAD while presenting the core set of skills that we feel every systems analyst needs to know today and in the future. Th is book ...
  • Radovilsky, Zinovy (Cognella Academic Publishing, 2015)
    Business Models for E-Commerce provides a detailed description and analysis of e-commerce business models, including their components, classification, and performance results.

View more