Suggested Books (and NOT) CPSC Senior Seminar

Suggested Books (and NOT) CPSC Senior Seminar Bart Childs July 11, 2006 This applies to books for the book report and by implication also applies to ...
Author: Russell Douglas
2 downloads 0 Views 112KB Size
Suggested Books (and NOT) CPSC Senior Seminar Bart Childs July 11, 2006

This applies to books for the book report and by implication also applies to the research paper. The bibliography is now required on all book reports and must include at least one \bibitem to be complete. Beware of the age of some of these, they may be in a new edition or now hopelessly out of date. A number of these are in a format that is too incomplete for a current paper. However, the author and title may be a help to you. Corrections are welcome!

1

Not Acceptable

The writing on these books/topics in recent semesters has been quite shallow. It will take a lot of work for you to make a reasonable CS/CE review.

References [1] Everything with dummy or dummies in the title is below the level that you should read. [2] Everything Y2K is now gone, probably.

1

[3] Scott Mueller. Upgrading and Repairing PCs, Que Corporation, Carmel, Indiana, 1998. This may be handy but it is not the proper challenge, same for the next one. [4] Petzold, Charles; Programming Windows; [5] Real World Interfacing With Your PC Just too low level. Many of us can learn a lot, but this is too low. [6] Harris Jr., Charles E.; Pritchard, Michael S.; and Rabins, Michael J. Engineering Ethics: Concepts and Cases Wadsworth Publishing, Reading, 1995. Not acceptable because it is the text of a required course. Many other standard textbooks for most of your courses will not meet the requirements. That is certainly true for all the CPSC and ELEN courses required of both Computer Science and Computer Engineering (CS/CE) curriculums. [7] Covey, Stephen, Seven Habits of Highly Effective People . . . This is a good and popular book but it is not about the computing professions. There are books about computing that address similar themes, find one of them.

2

Possible but . . .

Books on broad generalities can be used, but it will require some real writing and thought on your part to make an argument that this is really CS/CE related.

References [1] Rama Dev Jager and Rafael Ortiz, In the Company of Giants, McGraw-Hill 1997.

2

[2] Kawasaki, Guy. Rules for Revolutionaries, Harper Business, Reading, 1999. [3] Harvey Mackay, Beware the Naked Man Who Offers You His Shirt [4] Harvey Mackay, Swim With the Sharks Without Getting Eaten Alive [5] Patrick Volkerding, Devin Reichard, and Eric Froster-Johnson. The Linux Configuration and Installation, A Division of Henry Holt and Company, Inc, New York, 1997.

3

Acceptable

3.1

Specific and Deep

References [1] Dijkstra, Edsger; Selected Writings on Computing: A Personal Perspective; Springer; 1982; QA 76.24 D54 ISBN 0-387-90652-5 [2] Friedhoff, Mark and Benzon, William; Visualization; 1991; T.385 F695 [3] Thro, Ellen; The Artificial Intelligence Dictionary; Microtrend Books; 1991; ISBN 0-915391-36-8; Q334.2.T48 I was skeptical of this one when I saw the title. The student did a lot of good writing to flesh out what he thought was missing from his 320 course.

3.2

Documents, Cognitive Psychology, etc.

References [1] Burckmyer, Becky, Why Does My Boss Hate My Writing?, (Adams Media Corporation: Holbrook, MA) 1999.

3

[2] Donald E. Knuth, et.al., MAA Notes, Number 14, “Mathematical Writing”, Mathematical Association of America, 1989. [3] Donald E. Knuth, Digital Typography, Center for the Study of Language and Information, Stanford University, Stanford, Calif., 1999. Your reading of this should convince you that the computational tasks in producing graphic excellence in literary works is not trivial. [4] Norman, Donald A.; The Psychology of Everyday Things [5] Richard Rubinstein, Digital Typography: An Introduction to Type and Composition for Computer System Design, (Reading, MA: Addison Wesley) 1988. [6] Suchman, Lucy; Plans and Situated Actions [7] Tufte, Edward; The Visual Display of Quantative Information; Graphics Press; 1983 The books by Tufte are the definitive reference for the quality of graphics. The bad examples in chapter 11 of Zobel are elucidated in great detail here. [8] Tufte, Edward; Envisioning Information; Graphics Press; 1990 [9] Wiklund, Michael E. ed.; Usability In Practice: How Companies Develop User-Friendly Products; Academic Press; 1994

3.3

Software Engineering

References [1] Benyon, David Conceptual Modeling for User Interface Development Springer-Verlag London Limited, 1999. [2] Borenstein, Nathaniel; Programming as if People Mattered; Princeton Univ Press; 1991

4

[3] Brooks, Frederick P. Jr. The Mythical Man-Month, 20th Anniversary Ed., Addison Wesley Longman, Inc., 1995. [4] Glass, Robert L. Software Runaways, Prentice Hall PTR, New Jersey, 1998. [5] GNU; This is incomplete. http://www.ns.utk.edu/gnu/autoconf/standards_toc.html [6] Grimm, Susan J; How to Write Computer Documentation for Users; 1987; QA 76.165 G75 [7] Allen I. Holub, Enough Rope to Shoot Yourself in the Foot: Rules for C and C++ Programming [8] Kohanski, Daniel. The Philosophical Programmer. Reflections on the Moth in the Machine, St. Martin’s Press, New York, NY, 1998. [9] Lammers, Susan; Programmers at Work; MicroSoft Press; 1987; QA 76.6 P751345 [10] MaGuire, Steve; Writing Solid Code; Microsoft [11] MaGuire, Steve; Debugging the Development Process; Microsoft [12] Miller, Howard Reengineering Legacy Sofware Systems,, (Boston MA: Digital Press) 1998. [13] Smith, M.F.; Software Prototyping: Adoption, Practice, and Management; McGraw-Hill; 1991; QA 76.76 D47 S58 [14] Straker, David; C Style: Standards and Guidelines: Defining Programming Standards for Professional C Programmers [15] Utz, Walter; Software Technology Transitions; Prentice Hall; 1992 [16] Okechukwu Uwechue and Abhijit Pandya, Human Face Recognition Using Third-Order Synthetic Neural Networks, Kluwer Academic Publishers 1997; Evans call: TA.1650.U88 1997. [17] Yourdon, Edward; Decline & Fall of the American Programmer; Prentice Hall; ISBN 0-13-203670-3 5

[18] Edward Yourdon, Rise and Resurrection of the American Programmer, (Upper Saddle River, New Jersey: Yourdon Press), 1996.

3.4

Ethics, Philosophy, Psychology, . . .

References [1] Asimov, Isaac; The Roving Mind; Prometheus Books; 1983 [2] Asimov, Isaac; I, Robot [3] Baran, Nicholas; Inside the Information Superhighway; [4] Brin, David. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?, Addison-Wesly, Reading, 1998. [5] Bynum, Terrell Ward, and Moor, James H. The Digital Phoenix: How Computers are Changing Philosophy, Blackwell, Oxford, 1998. [6] Clough, Bryan and Mungo, Paul. Approaching Zero, Random House, Inc., New York, 1992. [7] Richard Crandall and Marvin Levich, A Network Orange: Logic and Responsibility in the Computer Age. A Network Orange was written by Richard Crandall and Marvin Levich of the Center for Advanced Computation at Reed College in Portland, Oregon. It was published in 1998 by Copernicus, an imprint of Springer-Verlag New York, Inc. It can be found in Evans Library using the call number QA76.9.C66 C73 1998. [8] Robert X. Cringely. Accidental Empires, Harper Collins Publishers, Inc., 1996. [9] Edgar, Stacey L. Morality And Machines, Jones and Bartlett Publishers, Sudbury, Massachusetts, 1997. [10] Emmeche, Claus. The Garden in the Machine, Princeton University Press, Princeton, 1994. 6

[11] Forester, Tom and Morrison, Perry. Computer Ethics, The MIT Press, Cambridge, 1990. [12] Forester, Tom and Morrison, Perry; Computer Ethics Cautionary Tales and Ethical Dilemmas in Computing; MIT Press; 1994; QA76.9 M65 F67 [13] Gelernter, David. The Muse In The Machine. Macmillan, New York 1994. [14] Kiesler, Sara and Sproull, Lee. Connections, The MIT Press, 1991. [15] Kurzweil, Ray. The Age of Spiritual Machines, Viking, New York, 1999. This book can be found in the McNaughton Lease Book Collection in Sterling Evans Library. Mr. Kurzweil’s previous book, The Age of Intelligent Machines is also at Evans Library. Kurzweil makes frequent reference to his previous works in Spiritual. [16] Newquist, H. P. Music and Technology, Billboard Books: New York, 1989. This book is available at the Sterling C. Evans library. [17] Nicholas Negroponte, Being Digital TK5103.7.N43 1995. [18] Parker, Donn B., Swope, Susan, and Baker, Bruce N.; Ethical Conflicts in Information and Computer Science; > 1987 [19] Poole, David; Mackworth, Alan; Goebel, Randy. Computational Intelligence, A Logical Approach, Oxford University Press, 1998. [20] Rawlins, Gregory J.E. Moths to the Flame. MIT Press, Reading, 1996. [21] Rawlins, Gregory. Slaves of the Machine : The Quickening of Computer Technology, MIT Press, 1997. [22] Roszak, Theodore. The Cult of Information, Pantheon Books: New York, 1986.

7

[23] Steinhary, Eric Digital Metaphysics, Blackwell Publishers, Oxford, 1998. [24] Thagard, Paul Computation and the Philosophy of Science, Blackwell Publishers, Oxford, 1998. [25] Turkle, Sherry; Second Self [26] Ullman, Ellen. Close to the Machine : Technophilia and Its Discontents, City Lights Books, San Fransisco, 1997.

3.5

Formatters, Markup Languages, etc.

References [1] von Bechtolsheim, Stephan TEX In Practice, Volume I: The Basics, Springer-Verlag, New York, 1993. [2] Michael Goosens, Frank Mittelbach, and Alexander Samarin. The LATEX Companion, (Reading, MA: Addison Wesley) 1994. Most TEX/LATEX books are available in the MSC under the MATH 696 course. The Lamport book would not be appropriate for a book report but this one could. [3] Michael Goosens, Seastian Rahtz, et al, The LATEX Web Companion, (Reading, MA: Addison Wesley) 1999 This serves the obvious need of assisting in putting decent documents on the web (in a typegraphical sense) because that is difficult. It also includes excellent introductions to html, xml, pdf, . . . [4] Michael Goosens, Seastian Rahtz, The LATEX Graphics Companion, (Reading, MA: Addison Wesley) 1999 [5] Donald E. Knuth, The TEXbook, (Reading, MA: Addison-Wesley Longman) 1986. A classic that shows a large number of design decisions. It is full of humor. A careful reader will realize that a document should be carefully constructed. 8

[6] Donald E. Knuth, The previous book is one of a five volume set of books on Computers and Typesetting. Each one is worthy. [7] Donald E. Knuth, Literate Programming, Center for the Study of Language and Information, Stanford University, Stanford, Calif., 1992. A collection of articles by the author about the subject and why?

3.6

Unix, C, and Tools

References [1] Abrahamson, Paul and Larson, Bruce R.; Unix for the Impatient; Addison-Wesley; 1996; ISBN 0-201-82376-4 [2] Gilly, Daniel et.al.; UNIX in a Nutshell; O’Reilly and Assoc; 1992 Maybe this is updated? [3] Koenig, Andrew; C Traps and Pitfalls ; Addison-Wesley; 1989 [4] Oualline, Steve; Practical C Programming; O’Reilly & Assoc.; 1991 [5] Ousterhout, John; Tcl and the Tk toolkit; Addison Wesley; 1994 [6] Stevens, Richard W.Advanced Programming in the Unix Environment, Addison-Wesley Longman, Inc. Reading,1993. [7] ?; Practical Unix Security; O’Reilly and Assoc.

3.7

Security, Viruses, etc.

References [1] Anonymous, Maximum Security, Sams Publishing, New York, 1998. [2] Bashir, Imran; Serafini, Enrico; and Wall, Kevin. Communications of the ACM, “Securing Network Software Applications”, February, 2001, pp 29-30. 9

[3] William R. Cheswick and Steven M. Bellovin, Firewalls and Internet Security: [4] Devargas, Mario. Network Security, NCC Blackwell Ltd., Oxford, 1993. [5] Dalton, Chris; Choo, Tse Huong. Communications of the ACM , “An Operating System Approach to Securing E-Services”, February, 2001, pp 58-64. [6] Garfinkel, Simson and Spafford, Gene. Practical UNIX & Internet Security, O’Reilly, Sebastopol, second edition, 1996. [7] Husker, Jan; Computer Viruses and Anti-virus Warfare; Ellis Horwood Ltd,; 1990 [8] Joshi, James; Aref, Walid; Ghafoor, Arif; Spafford, Eugene. Communications of the ACM , “Security Models for Web-Based Applications”, February, 2001, pp 38-44. [9] Martin, David; Smith, Richard; Brittain, Michael; Fetch, Ivan; Wu, Hailin. Communications of the ACM , “The Privacy Practices of Web Browser Extensions”, February, 2001, pp 45-50. [10] Schneier, Bruce; Applied Cryptography; 1994; QA76.9 A25 S35 [11] Schwartau, Winn. CyberShock: surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption, Thunder’s Mouth Press, New York, 2000. [12] Skardhamar, Rune Virus Detection and Elimination, Academic Press, Reading, 1996. [13] Spafford, Eugene; The Internet Worm Incident; Tech Report of Purdue Univ; [email protected] [14] Stoll, Clifford; The Cuckoo’s Egg: Tracking a Spy Through The Maze of Computer Espionage; Doubleday; 1989; UB271.R92 H477 [15] Viega, John; Kohno, Tadayoshi; Potter, Bruce. Communications of the ACM, “Trust (and Mistrust) in Secure Applications”, February, 2001, pp 31-36. 10

3.8

Networking

Also, see the earlier section on security, viruses, . . .

References [1] Scott, Wolfe, and Erwin. Virtual Private Networks, O’Reilly and Associates, Inc., 101 Morris Street, Sebastopol, CA, March 1998.

3.9

Non-Technical Networking, Tutorial, and Web/Internet

References [1] Competing on Internet Time. Cusumano, Michael A. and Yoffie, David B. The Free Press. 1998. I have checked on NOTIS and the book is not available at Evans Library. A discussion of the management techniques used by Microsoft and Netscape during the “Browser Wars”. [2] Kehoe, Brendan; Zen and the Art of the Internet: A Beginner’s Guide to the Internet; 3rd ed; 1994; TK 5105.875 I57 K44 [3] Krol, Ed; The Whole Internet: User’s Guide and Catalog; O’Reilly and Assoc.; 1994 [4] Paul Singh, Rick Fairweather, Dan Ladermann, Connecting Netware to the Internet 1995, Evans Stack, TK5105.9.S46. [5] Schnaidt, Patricia; LAN Tutorial; Miller Freeman; 1990

3.10

OOP ?

References [1] Andrews, Mark; C++ Windows NT Programming; M&T Books; 1994 11

[2] David Flanagan, Java in a Nutshell: A Desktop Quick Reference, (Cambridge: O’Reilly) 2nd ed., 1997. Evans call # : QA76.73.J38. Java is not forbidden, but you have to make something out of it. [3] LaLonda, Wilf and Pugh, John; Inside Smalltalk, Volume I; Prentice Hall; 1990 [4] Nahouraii, E and Petry, F; Object Oriented Databases; IEEE Computer Society Press; 1991 [5] Doris Smith, Java for the World Wide Web, Peachpit Press

3.11

VR and pot pourri

References [1] Ashenhurst, Robert and Graham, Susan (eds); ACM Turing Award Lectures: The First Twenty Years, 1966-85; ACM Press with Addison Wesley; 1987 [2] Barwise, Jon, and Etchemendy, John Computers, Visualization, and the Nature of Reasoning, Blackwell Publishers, Oxford, 1998. [3] Friedhoff, Richard and Benzon, William. Visualization: The Second Computer Revolution. New York: Abrams. 1989. [4] Kidder, Tracy. Soul of a New Machine, Avon, New York, 1981. (This book is available in Evans Library under call number TK7885.4.K53 1981.) [5] Rheingold, Howard; The Virtual Community

3.12

Specialized

References [1] Selected Papers on Medical Data Visualization The next three papers were part of one report. 12

[2] M. S. Atkins; M. S. T. Carpendale; and J. E. van der Heyden. IEEE Visualization 1998, “Visual Presentation of Magnetic Resonance Images”, ACM Press, New York, 1998. [3] H. J. W. Spoelder and F. M. Vos. IEEE Visualization 1998, “Visual in Corneal Topography”, ACM Press, New York, 1998. [4] Kevin Montgomery; Stephen Schendel; Michael Stephanides; and Muriel Ross. IEEE Visualization 1998, “A Case Study Using the Virtual Environment for Reconstructive Surgery”, ACM Press, New York, 1998. [5] Enrico Gobbetti; Massimiliano Tuveri, M. D. ; Piero Pili; and Antonio Zorcolo. IEEE Visualization 1998, “Interactive Virtual Angioscopy”, ACM Press, New York, 1998. [6] I need to put those papers on computers in schools here. [7] ? Computer Resources for People with Disabilities: A Guide to Exploring Today’s Assistive Technology; Hunter House; [8] Starfield, Anthony, Smith, Karl, and Bleloch, Andrew; How to Model It; Problem Solving for the Computer Age; McGraw-Hill; 1990 [9] Stoll, Clifford; High Tech Heretic; 1999.

3.13

Fuzzy, Neural Nets, Chaos, etc.

References [1] Gleick, James. Chaos: Making a New Science. Penguin Books, New York, 1988. Available at Evans library. [2] Khanna, Tarun. Foundations of Neural Networks, Addison-Wesley Publishing company, 1990. [3] McNeil, Daniel and Freiberger, Paul. Fuzzy Logic, Simon & Schuster, New York, 1993. (Availible in Evans Library TJ213.M353 1993)

13

[4] Prezemyslaw Prunsinkiewicz and Aristid Lindenmayer. The Algorithimic Beauty of Plants, Springer-Verlag New York Inc, 1990. [5] Rojas, R. (1996) Neural Networks: A Systematic Introduction, Springer-Verlag, Berlin, Germany. Call Number: QA76.87.R65 1996. ISBN: 3-540-60505-3.

3.14

Where should these be?

References [1] Trimberger, Stephen M. Field-Programmable Gate Array Technology, Kluwer Academic Publishers, Boston, 1994.

14

Suggest Documents