Skip to main content

Computer Science

overrideTextColor= overrideCardAlternateTextColor= overrideDisableBackgroundImage= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overrideCardShowButton= overridebuttonBgColor= overrideButtonText=

Sensors and the Internet of Things: Acquisition and Use of Big Data

October 06, 2025 04:50 PM
The Internet of Things (IoT) has revolutionized the way we live, work, and interact with our surroundings. Sensor systems play a crucial role in these technological advancements, and their integration with IoT has revolutionized the way data is acquired, processed, and utilized. This book offers a structured understanding of sensor technologies, principles, applications, and their integration into IoT systems, thereby bridging the gap between sensors and IoT applications.

Uploaded October 2025

The Cybersecurity Handbook: A Guide for Board Members and C-Suite Executives

September 09, 2025 05:17 PM
'The Cybersecurity: A Handbook for Board Members and C-Suite Executives'seeks to empower Board members and C-Suite executives to understand, prioritize, and manage cybersecurity risks effectively. The central theme of the book is that cybersecurity is not just an IT issue but a critical business imperative that requires involvement and oversight at the highest levels of an organization.

Uploaded September 2025

Attacks on Artificial Intelligence: The New Facets of Cyber Ecospace

September 09, 2025 04:49 PM
Defensive measures to address cyber attacks are not sufficient for artificial intelligence-based architectures, which present a new range of challenges. This new volume takes these concerns into consideration and examines recent developments and issues in attacks that target AI based systems and cyber infrastructures while also presenting research on using AI technologies to prevent attacks.

Uploaded September 2025

Simplicity: Sustainable, Humane, and Effective Software Development

September 09, 2025 04:30 PM
Software development is inherently complex, but it needn't be as complicated as we make it. Learn to recognize and deal with the gnarly stuff, and your job is simpler, your code is easier to create and to work with, and you are more effective. You won't find a bunch of rules, practices, and clever acronyms here.

Uploaded September 2025

Navigating the Future: Global Challenges and the Role of AI

September 09, 2025 04:28 PM
In this book, author Paraschos Maniatis embarks on a thought-provoking exploration of how artificial intelligence intersects with some of humanity's most pressing challenges. This insightful book tackles the dual role of AI as a solution provider and a potential risk in areas such as climate change, conflict resolution, human rights, and poverty alleviation.

Uploaded September 2025

Cloud Computing's Transformative Power in Computing Environments

September 09, 2025 04:27 PM
This book provides a deep understanding of the transforming ability of cloud computing technologies in computing environments. It focuses on understanding the principles, practical implementations, and future trends in cloud computing. It covers the fundamental concepts, service models, and deployment architectures of cloud computing.

Uploaded September 2025

Artificial Intelligence for Natural Language Processing

September 09, 2025 04:22 PM
Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how advanced computational methods are transforming the way machines understand human language. This book delves into the core principles of Natural Language Processing through an engaging progression – from fundamental word‑level analysis to complex discourse and pragmatic analysis – integrating linguistic theory with cutting‑edge Artificial Intelligence methodologies.

Uploaded September 2025

Vulnerabilities Assessment and Risk Management in Cyber Security

July 07, 2025 12:59 PM
Vulnerabilities Assessment and Risk Management in Cyber Security explores the use of cyber technology in threat detection and risk mitigation. It offers various solutions to detect cyber-attacks, create robust risk management strategies, and secure organizational and individual data.

Uploaded July 2025

Revolutionizing Cybersecurity with Deep Learning and Large Language Models

July 07, 2025 12:58 PM
Revolutionizing Cybersecurity With Deep Learning and Large Language Models explores the intersection of AI, cybersecurity, deep learning, and LLMs, and the potential of these technologies in safeguarding the digital world. It examines real-world applications, ethical challenges, and new technological advancements.

Uploaded July 2025

Navigating Cyber Threats and Cybersecurity in the Software Industry

July 07, 2025 12:55 PM
Navigating Cyber Threats and Cybersecurity in the Software Industry discusses the use of emerging technologies, such as GAI and ML, for creating software that is more resilient towards security threats.

Uploaded July 2025

Dan Broadbent

Physical & Computer Sciences Librarian
dan_broadbent@byu.edu