Computer Science

Computing functionality is ubiquitous. Today this logic is built into almost any machine you can think of, from home electronics and appliances to motor vehicles, and it governs the infrastructures we depend on daily — telecommunication, public utilities, transportation. Maintaining it all and driving it forward are professionals and researchers in computer science, across disciplines including:

  • Computer Architecture and Computer Organization and Design
  • Data Management, Big Data, Data Warehousing, Data Mining, and Business Intelligence (BI)
  • Human Computer Interaction (HCI), User Experience (UX), User Interface (UI), Interaction Design and Usability
  • Artificial intelligence (AI)
Morgan Kaufmann companion resources can be found here You can also access companion materials and instructor’s resources for all our new books on the Elsevier Store. Search by author, title or ISBN, then look for the “Resources” tab on any book page. Looking for companion materials or instructor’s resources for these titles? Connect below:

Computer Science

Get Packing

I have frequently made the observation that a key difference between embedded and desktop system programming is variability:... Read more

Computer Science; Engineering

Announcing the 2017 Texty Award Winners!

Elsevier is proud to announce our books received Texty Awards this year. All of the awards are listed... Read more

Computer Science

Embedded Tools – The Third Way

A significant factor in getting any job done properly is having the right tools. This is true whether... Read more

Computer Science; Computer Security

How Computer Hacking is Becoming Russia’s Weapon of Choice

In his 2007 address to the Annual Security Conference in Munich, Vladimir Putin threw down a gauntlet to... Read more

Computer Science; Computer Security

Know When to Fold ‘em: AI Beats World’s Top Poker Players

  If you were about to start playing a game of online poker, you might want to think... Read more

Computer Science; Computer Security

Why You Might Want to Think Twice About Surrendering Online Privacy for the Sake of Convenience

It is inconvenient to guard one’s privacy, and the better one protects it, the more inconvenience one must... Read more

Computer Science; Computer Security

Cybersecurity’s Next Phase: Cyber-Deterrence

Cyberattackers pose many threats to a wide range of targets. Russia, for example, was accused of hacking Democratic... Read more

Computer Science

OS Migration

I have often talked about the process that might be applied to the selection of an embedded operating... Read more

Connect with us on social media and stay up to date on new articles

Social Media Auto Publish Powered By : XYZScripts.com