Computing & Information Technology Books

Sidebar Sidebar Sidebar
  • Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
    Add to Cart The item has been added

    Multivariate Public Key Cryptosystems

    Overview.- Matsumoto-Imai Cryptosystems.- Oil-Vinegar Signature Schemes.- Hidden Field Equations.- Internal Perturbation.- Triangular Schemes.- Direct Attacks.- Future Research.
    $216.00

    Add to Cart The item has been added
  • Privacy-Respecting Intrusion Detection Privacy-Respecting Intrusion Detection
    Add to Cart The item has been added

    Privacy-Respecting Intrusion Detection

    and Background.- Authorizations.- An Architectural Model for Secure Authorizations.- Traditional Security Objectives.- Personal Data Protection Objectives.- The Challenge: Technical Enforcement of Multilateral Security.- Pseudonyms - A Technical Point of...
    $311.00

    Add to Cart The item has been added
  • Challenges in Ad Hoc Networking Challenges in Ad Hoc Networking
    Add to Cart The item has been added

    Challenges in Ad Hoc Networking

    Wireless Transmissions with Combined Gain Relays over Fading Channels.- Adaptive Probabilistic NAV to Increase Fairness in Ad HOC 802.11 MAC Layer.- A Link Layer Protocol for Self-Organizing Ultra Wide Band Impulse Radio Networks.- Power Control and...
    $268.00

    Add to Cart The item has been added
  • CMOS Current-Mode Circuits for Data Communications CMOS Current-Mode Circuits for Data Communications
    Add to Cart The item has been added

    CMOS Current-Mode Circuits for Data Communications

    Voltage-Mode Versus Current-Mode: A Critical Comparison.- Design Techniques for Current-Mode Circuits.- Wire Channels.- Electrical Signaling for High-Speed Data Links.- Current-Mode Transmitters.- Current-Mode Receivers.- Switching Noise and Grounding of...
    $294.00

    Add to Cart The item has been added
  • Computer Viruses and Malware Computer Viruses and Malware
    Add to Cart The item has been added

    Computer Viruses and Malware

    We've Got Problems.- Definitions and Timeline.- Viruses.- Anti-Virus Techniques.- Anti-Anti-Virus Techniques.- Weaknesses Exploited.- Worms.- Deworming.- "Applications".- People and Communities.- What Should we do?.
    $216.00

    Add to Cart The item has been added
  • Mobile Information Systems II Mobile Information Systems II
    Add to Cart The item has been added

    Mobile Information Systems II

    Take Risks into Consideration while Job Dispatching.- Support of Smart Work Processes in Context Rich Environments.- The Difference is in Messaging.- Understanding the User Within the Innovation Spiral.- The European Mobile Data Service Dilemma.- On the...
    $216.00

    Add to Cart The item has been added
  • Telecommunications Planning Telecommunications Planning
    Add to Cart The item has been added

    Telecommunications Planning

    Pricing and Resource Allocation for Point-to-Point Telecommunication Services in a Competitive Market: A Bilevel Optimization Approach.- Pricing Analysis in International Interconnected Networks.- Modeling Competition among Wireless Service Providers.- A...
    $238.00

    Add to Cart The item has been added
  • CryptoGraphics CryptoGraphics
    Add to Cart The item has been added

    CryptoGraphics

    Graphical Processing Units.- Motivation.- Encryption in GPUs.- Remotely Keyed Cryptographics.- Related Issues.- Extensions.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • Synchronizing Internet Protocol Security (SIPSec) Synchronizing Internet Protocol Security (SIPSec)
    Add to Cart The item has been added

    Synchronizing Internet Protocol Security (SIPSec)

    Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC).- Internet communication Protocols.- Internet Protocol Versions 4 (IPV4) and 6 (IPV6).- Implementations and Limitations of the IPSEC.- Synchronising Internet Protocol...
    $298.00

    Add to Cart The item has been added
  • Understanding Intrusion Detection through Visualization Understanding Intrusion Detection through Visualization
    Add to Cart The item has been added

    Understanding Intrusion Detection through Visualization

    An Introduction to Intrusion Detection.- The Base-Rate Fallacy and the Difficulty of Intrusion Detection.- Visualizing Intrusions: Watching the Webserver.- Combining a Bayesian Classifier with Visualization: Understanding the IDS.- Visualizing the Inner...
    $238.00

    Add to Cart The item has been added
  • Semantic Management of Middleware Semantic Management of Middleware
    Add to Cart The item has been added

    Semantic Management of Middleware

    Fundamentals.- Middleware.- Ontologies.- Towards Semantic Management.- Design of a Management Ontology.- Analysis of Existing Ontologies.- The Appropriate Foundational Ontology.- An Ontological Formalization of Software Components and Web Services.-...
    $249.00

    Add to Cart The item has been added
  • Designing Ubiquitous Information Environments Designing Ubiquitous Information Environments
    Add to Cart The item has been added

    Designing Ubiquitous Information Environments

    Preface1 Socio-Technical Studies of Mobility and Ubiquity Carsten Sørensen and Youngjin Yoo Part 1: Keynotes 2 The Future of Work Thomas W. Malone 3 It's the Experience, Not the Price Lee Green 4 The Culture of Information: Ubiquitous Computing and...
    $259.00

    Add to Cart The item has been added
  • Biometric User Authentication for IT Security Biometric User Authentication for IT Security
    Add to Cart The item has been added

    Biometric User Authentication for IT Security

    Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of...
    $202.00

    Add to Cart The item has been added
  • Handbook of Mathematical Models in Computer Vision Handbook of Mathematical Models in Computer Vision
    Add to Cart The item has been added

    Handbook of Mathematical Models in Computer Vision

    Abstract Biological vision is a rather fascinating domain of research. Scientists of various origins like biology, medicine, neurophysiology, engineering, math­ ematics, etc. aim to understand the processes leading to visual...
    $154.00

    Add to Cart The item has been added
  • From Specification to Embedded Systems Application From Specification to Embedded Systems Application
    Add to Cart The item has been added

    From Specification to Embedded Systems Application

    As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering.  New functions and improvements of already existing functions, as well as the compliance with traffic...
    $178.00

    Add to Cart The item has been added
  • Privacy Preserving Data Mining Privacy Preserving Data Mining
    Add to Cart The item has been added

    Privacy Preserving Data Mining

    Privacy and Data Mining.- What is Privacy?.- Solution Approaches / Problems.- Predictive Modeling for Classification.- Predictive Modeling for Regression.- Finding Patterns and Rules (Association Rules).- Descriptive Modeling (Clustering, Outlier...
    $238.00

    Add to Cart The item has been added
  • Knowledge Management and Management Learning Knowledge Management and Management Learning
    Add to Cart The item has been added

    Knowledge Management and Management Learning

    Knowledge Management and Management Learning: Extending the Horizons of Knowledge-Based Management examines a range of topical considerations in the field by utilizing dynamic and non-linear systems behavior or the complexity...
    $280.00

    Add to Cart The item has been added
  • Unconstrained Face Recognition Unconstrained Face Recognition
    Add to Cart The item has been added

    Unconstrained Face Recognition

    Fundamentals, Preliminaries and Reviews.- Fundamentals.- Preliminaries and Reviews.- Face Recognition Under Variations.- Symmetric Shape from Shading.- Generalized Photometric Stereo.- Illuminating Light Field.- Facial Aging.- Face Recognition Via Kernel...
    $298.00

    Add to Cart The item has been added
  • UML for SOC Design UML for SOC Design
    Add to Cart The item has been added

    UML for SOC Design

    1. When worlds collide (Martin, Müller) 2. Why SoC needs more UML (Mellor, Wolfe, McCausland) 3. UML as a framework for combining different models of computation (Green) 4. A Generic Model Execution Platform for the Design of Hardware and...
    $268.00

    Add to Cart The item has been added
  • Business Agility and Information Technology Diffusion Business Agility and Information Technology Diffusion
    Add to Cart The item has been added

    Business Agility and Information Technology Diffusion

    Why Agility Now?.- Agility in Fours: IT Diffusion, IT Infrastructures, IT Development, and Business.- Information Technology Diffusion Research: An Interim Balance.- Agility in Information Systems Development: A Three-Tiered Framework.- Agile IT...
    $238.00

    Add to Cart The item has been added
  • Perspectives and Policies on ICT in Society Perspectives and Policies on ICT in Society
    Add to Cart The item has been added

    Perspectives and Policies on ICT in Society

    Policies on Information and Communication Technology in Society.- Perspectives and Policies on ICT in Africa.- ICT in China: A strong Force to Boost Economic and Social development.- ICT Policies of the European Union: From an Information Society to...
    $294.00

    Add to Cart The item has been added
  • Survivable Optical WDM Networks Survivable Optical WDM Networks
    Add to Cart The item has been added

    Survivable Optical WDM Networks

    Shared-Path Protection for Resource Efficiency.- Sub-Path Protection for Scalability and Fast Recovery.- Segment Protection for Bandwidth Efficiency and Differentiated Quality of Protection.- Survivable Traffic Grooming-Dedicated Protection.- Survivable...
    $285.00

    Add to Cart The item has been added
  • Human Identification Based on Gait Human Identification Based on Gait
    Add to Cart The item has been added

    Human Identification Based on Gait

    Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives. This is especially true of "gait", which is one of the most...
    $242.00

    Add to Cart The item has been added
  • Evolvable Hardware Evolvable Hardware
    Add to Cart The item has been added

    Evolvable Hardware

    to Evolvable Hardware.- EHW Applied to Image Data Compression.- A GA Hardware Engine and Its Applications.- Post-Fabrication Clock-Timing Adjustment Using Genetic Algorithms.- Bio-Inspired Computing Machines with Artificial Division and Differentiation.-...
    $308.00

    Add to Cart The item has been added
  • Designing Human Interface in Speech Technology Designing Human Interface in Speech Technology
    Add to Cart The item has been added

    Designing Human Interface in Speech Technology

    Basic Neuropsychology.- Attention, Workload and Stress.- Design Analysis.- Usability Design and Evaluation.- Human Factors in Speech Interface Design.- The Usability of Spoken Dialogue System Design.- In-Vehicle Communication System Design.- Speech...
    $268.00

    Add to Cart The item has been added
  • Next Generation Transport Networks Next Generation Transport Networks
    Add to Cart The item has been added

    Next Generation Transport Networks

    to Transport Networks.- Switching.- SONET and SDH.- Next Generation Transport Technologies.- Management Architectures.- Management Information Models.- Management Technologies.- Transport Network Survivability.- Control Plane.
    $238.00

    Add to Cart The item has been added
  • Optical Burst Switched Networks Optical Burst Switched Networks
    Add to Cart The item has been added

    Optical Burst Switched Networks

    Dedication List of Figures List of Tables Preface 1. Introduction 1.1 Optical Circuit Switching 1.2 Optical Packet Switching 1.3 Optical Burst Switching References 2. Technology And Architecture 2.1 OBS Network Architecture 2.2 Enabling Technology 2.3...
    $294.00

    Add to Cart The item has been added
  • Soft Real-Time Systems Soft Real-Time Systems
    Add to Cart The item has been added

    Soft Real-Time Systems

    Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to cope with worst-case scenarios, so they often waste resources. Soft...
    $250.00

    Add to Cart The item has been added
  • Stream Data Management Stream Data Management
    Add to Cart The item has been added

    Stream Data Management

    to Stream Data Management.- Query Execution and Optimization.- Filtering, Punctuation, Windows and Synopses.- XML & Data Streams.- CAPE: A Constraint-Aware Adaptive Stream Processing Engine.- Efficient Support for Time Series Queries in Data Stream...
    $238.00

    Add to Cart The item has been added
  • Image and Video Encryption Image and Video Encryption
    Add to Cart The item has been added

    Image and Video Encryption

    Visual Data Formats.- Cryptography Primer.- Application Scenarios for the Encryption of Visual Data.- Image and Video Encryption.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • Intrusion Detection and Correlation Intrusion Detection and Correlation
    Add to Cart The item has been added

    Intrusion Detection and Correlation

    Computer Security and Intrusion Detection.- Alert Correlation.- Alert Collection.- Alert Aggregation and Verification.- High-Level Alert Structures.- Large-Scale Correlation.- Evaluation.- Open Issues.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • QoS in Packet Networks QoS in Packet Networks
    Add to Cart The item has been added

    QoS in Packet Networks

    Basic Mathematics for QoS.- QoS Metrics.- IP QoS Generic Functional Requirements.- IP Integrated Services and Differentiated Services.- QoS in ATM Networks.- MPLS.- References.
    $308.00

    Add to Cart The item has been added
  • Alternative Breast Imaging Alternative Breast Imaging
    Add to Cart The item has been added

    Alternative Breast Imaging

    Four Alternative Breast Imaging Modalities.- Computational Framework.- Magnetic Resonance Elastography: Theory.- Magnetic Resonance Elastrography: Experimental Validation and Performance Optimazation.- Electrical Impedance Spectroscopy: Theory.-...
    $308.00

    Add to Cart The item has been added
  • Event-Triggered and Time-Triggered Control Paradigms Event-Triggered and Time-Triggered Control Paradigms
    Add to Cart The item has been added

    Event-Triggered and Time-Triggered Control Paradigms

    ForewordPreface1: INTRODUCTION1.1 Goal of this book1.2 Overview2: BASIC CONCEPTS AND RELATED WORK2.1 Distributed Real-Time Systems2.2 Concepts of Dependability2.3 Degrees of Synchrony2.4 Communication System Paradigms2.5 Computational Models2.6 System...
    $238.00

    Add to Cart The item has been added
  • Nearest Neighbor Search Nearest Neighbor Search
    Add to Cart The item has been added

    Nearest Neighbor Search

    Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) and nontraditional data sets (images, text, geometric objects, time-series)...
    $250.00

    Add to Cart The item has been added
  • Handbook of Multibiometrics Handbook of Multibiometrics
    Add to Cart The item has been added

    Handbook of Multibiometrics

    Biometrics: When Identity Matters.- Information Fusion in Biometrics.- Levels of Fusion in Biometrics.- Score Level Fusion.- Fusion Incorporating Ancillary Information.
    $294.00

    Add to Cart The item has been added

Computing & Information Technology Books | Programming, Cybersecurity & Data Science

Computing & IT Books for Every Level

The world of technology is evolving faster than ever, and at BookLoop we bring you a rich and diverse range of computing and IT books that help you learn, create, and innovate. Whether you are exploring applied computing for practical problem solving, diving into business applications to streamline operations, or preparing for an IT certification, our collection has been curated to support learners, professionals, and tech enthusiasts alike.

If your interests lie in computer hardware, you will discover detailed guides on building, maintaining, and upgrading systems. For those keen on computer networking and communications, our books cover everything from foundational networking principles to advanced network security and cloud-based systems. If coding is your passion, our computer programming and software engineering titles include resources for Python, Java, JavaScript, and C++, blending theory with hands-on projects.

Discover the foundations of technology in computer science, or strengthen your skills in computer security and ethical hacking to protect data and networks. If you work with information management, our databases section offers everything from beginner SQL to advanced database architecture.

For those navigating everyday technology, our digital lifestyle and online world guides help you use technology with confidence, while graphical and digital media applications titles inspire creativity with design, editing, and multimedia production. Broader topics can be explored in information technology: general topics, while more technical areas include operating systems and practical applications of information technology.

Whether you are aiming to earn a professional qualification, improve workplace productivity, master coding, or simply keep up with the digital world, BookLoop’s computing and IT collection is your gateway to knowledge and skills in the modern tech landscape.

FAQs About Computing and IT Books

Which books are best for learning programming from scratch?

We recommend starting with our computer programming and software engineering section, which includes beginner-friendly guides for Python, Java, JavaScript, and more, complete with practical exercises.

Do you have resources for IT certifications?

Yes, our computer certification collection features study guides for CompTIA, Cisco, Microsoft, AWS, and other professional exams.

Can I find books on security and ethical hacking?

Absolutely. The computer security section includes practical resources on penetration testing, threat analysis, and safeguarding data.

Are there books for creative professionals?

Yes, our graphical and digital media applications section covers design software, video editing, animation, and more for creative work.

What if I want a broad introduction to IT?

You can explore information technology: general topics for an overview of systems, trends, and innovations across the industry.