Free Computer Science Books


Intel Xeon Phi Coprocessor Architecture and Tools

Intel Xeon Phi Coprocessor Architecture and Tools

ApressOpen book Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in technical computing applications.


Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s security and management engine, with details on the security features and the steps for configuring and invoking them. It’s written for security professionals and researchers; embedded-system engineers; and software engineers and vendors.


Rethinking the Internet of Things

Rethinking the Internet of Things: A Scalable Approach to Connecting Everything

In the coming decade, billions of simple devices must be connected to the emerging Internet of Things. Today’s networking protocols are too expensive and inefficient for this task. Rethinking the Internet of Things: A Scalable Approach to Connecting Everything describes a simpler and scalable architecture that will be used to create “big data” from billions of “small data” points in the Internet of Things.


Sensor Technologies

Sensor Technologies

An ApressOpen book Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness, and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains.


Intel Trusted Execution Technology for Server Platforms

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

This ApressOpen book Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that can be used to customize the server’s boot process to fit the datacenter’s requirements.


Social Media Mining

Social Media Mining

Social Media Mining integrates social media, social network analysis, and data mining to provide a convenient and coherent platform for students, practitioners, researchers, and project managers to understand the basics and potentials of social media mining. It introduces the unique problems arising from social media data and presents fundamental concepts, emerging issues, and effective algorithms for network analysis and data mining.


Bioinformatics Data Skills

Bioinformatics Data Skills

Bioinformatics Data Skills demsonstrates the practice of bioinformatics through data skills. Rigorous assessment of data quality and of the effectiveness of tools is the foundation of reproducible and robust bioinformatics analysis. Through open source and freely available tools, you’ll learn not only how to do bioinformatics, but how to approach problems as a bioinformatician.


Operating Systems: Three Easy Pieces [PDF]

Operating Systems: Three Easy Pieces

Operating Systems: Three Easy Pieces covers the fundamentals of operating systems, including virtualization of the CPU and memory, threads and concurrency, and file and storage systems. You will also learn the practical, including how an operating system does things like schedule the CPU, manage memory, and store files persistently.


Computer Science from the Bottom Up

Computer Science from the Bottom Up

Computer Science from the Bottom Up, by Ian Wienand, covers binary and binary logic, operating systems internals, toolchain fundamentals and system library fundamentals.


Data Compression Explained

Data Compression Explained

Data Compression Explained, by Matt Mahoney, is for the reader who wants to understand how data compression works, or who wants to write data compression software.