Introduction

Welcome to the University of Zimbabwe Library Faculty of Computer Engineering, informatics and Communications Liaison Section. The Liaison page has been designed to assist students in the computer engineering sector as well as the academics with academic activities associated with teaching, learning, research, community service, innovation and industralisation. The Subject Information Specialist for the Faculty play a key role in liaison between the Faculty, replica rolex watches students and the library. Our fundamental task is to synchronize communication between the faculty with the library to ensure seamless support for faculty endeavours related to the universities mission and goals. Listed are e-books, e-journals, open access resources, training services, theses, and referencing and citation. You are welcome to navigate these via the tabs above

Discipline eBook Database eBook title
Analytics and Informatics Wiley Information systems security officer’s

https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393

ARDI Informatics for Materials Science and Engineering: Data-Driven Discovery for Accelerated Experimentation and Application

https://Informatics for materials science and engineering

ARDI Data analytics for intelligent transportation systems

https://data analytics for intelligent transport systems

ARDI Perspectives on data science for software engineering

https://perspectives on data science for software engineering

ARDI Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure

https://Applied cyber security and the smart grid

ARD Designing and Building Security Operations Centre

https://Designing and building Security operations centre

ARDI Implementing analytics : a blueprint for design, development, and adoption

https://Implementing analytics

DOAB Computer Vision Metrics: Survey, Taxonomy, and Analysis

https://Computer vision metrics

ARDI Data Insights: New Ways to Visualize and Make Sense of Data

https://Data insights

ARDI Big data application in power systems

https://Big data application in power systems

Computer Engineering ARDI e-design: computer-aided engineering design

e-design:computer-aided design

ARDI Product Design Modeling Using CAD/CAE: The Computer Aided Engineering Design Series

https://The Computer Aided Engineering Design Series

ARDI Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE

ARDI Software Engineering for Embedded Systems: Methods, Practical Techniques, and Applications

Software Engineering for Embedded Systems: Methods, Practical Techniques, and Applications

ARDI Visual Usability: Principles and Practices for Designing Digital Applications

Visual Usability: Principles and Practices for Designing Digital Applications

ARDI Fundamental Approaches to Software Engineering: 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software…

https://Fundamental approaches to software engineering

ARDI The Essence of Software Engineering

https://The essence of software engineering

ARDI Computer Vision Metrics: Survey, Taxonomy, and Analysis

Https://Computer Vision Metrics: Survey, Taxonomy, and Analysis

Computer Science ARDI Geometric Algebra for Computer Science

https://geometric algebra for computer science                                                    

ARDI Advances in Computational Science and Engineering Research

https://Advances in computational science and engineering

ARDI Systems Analysis and Synthesis: Bridging Computer Science and Information Technology

https://Systems Analysis and Synthesis: Bridging Computer Science and Information Technology

ARDI Current Trends in Computer Science and Mechanical Automation. Selected Papers from CSMA2016 -.

https://current trends in computer science and mechanical automation

ARDI Software Defined Networks: A Comprehensive Approach

https://software defined networks

ARDI Embedded Computing for High Performance: Efficient Mapping of Computations Using Customization…

https://embedded computing for high performance

ARDI Computer Science and Engineering Education for Pre-collegiate Students and Teachers

https://Computer science and engineering education

ARDI Mobile Cloud Computing: Foundations and Service Models

https://Mobile cloud computing

ARDI Object-Oriented Analysis and Design for Information Systems: Modelling with UML, OCL, and IFML

https://Object-oriented analysis and design for information

ARDI Computer Arithmetic and Formal Proofs: Verifying Floating-Point Algorithms with the Coq System

https://Computer arithmetic and formal proofs

ARDI Adaptive Mobile Computing: Advances in Processing Mobile Data Sets

https://Adaptive mobile computing

ARDI Shared Memory Application Programming: Concepts and Strategies in Multicore Application Programming

https://Shared memory application programming

ARDI Editorial Adaptive and reconfigurable software systems and architectures

https://Editorial adaptive and reconfigurable software systems

Electronics and Telecommunications ARDI Telecommunication Economics: Selected Results of the COST Action ISO605 Econ@Tel>

https://Telecommunication economics

ARDI Telecommunications Demystified

https://Telecommunications demystified

ARDI Bio-Inspired Computation in Telecommunications

https://Bio-inspired computation in telecommunications

ARDI Cooperative and Cognitive Satellite Systems

https://Cooperative and cognitive satellite systems

ARDI Innovations in Telecommunications.: Academic Press Inc.u.s

https://Innovations in telecommunications

Wiley Broadband Telecommunications Technologies and Management

https://onlinelibrary.wiley.com/doi/book/10.1002/9781119114956

Faculty of Computer Engineering Informatics and Communications Core Textbooks 

 Cloud computing: Principles and Paradigms

 

2011

 

The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications. We expect the book to serve as a reference for larger audience such as systems architects, practitioners, developers, new researchers and graduate level students. This area of research is relatively recent, and as such has no existing reference book that addresses it.

Guide to computer network security

2017

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.

Software Engineering

 

2015

 

Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world’s major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner.

Data Mining: Practical Machine Learning Tools and Techniques

 

2011

Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches.

 

Fundamentals of Database Systems

2014

This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation techniques. The book is meant to be used as a textbook for a one- or two-semester course in database systems at the junior, senior, or graduate level, and as a reference book

 

Computer Organisation and Design

 

2006

Computer Organization and Design: The Hardware/Software Interface, Sixth Edition, the leading, award-winning textbook from Patterson and Hennessy used by more than 40,000 students per year, continues to present the most comprehensive and readable introduction to this core computer science topic. Improvements to this new release include new sections in each chapter on Domain Specific Architectures (DSA) and updates on all real-world examples that keep it fresh and relevant for a new generation of students.

 

Rethinking IT in Construction and Engineering

 

2007

Based on the author’s twenty years research experience, this book provides a holistic picture of the factors that enable architecture, construction and engineering organisations to explore the potential of IT to improve their businesses and achieve a sustainable competitive advantage.

 

 

Cloud computing : concepts, technology, & architecture

2013

Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services

 

Guide to Computer Network security

 

2017

 

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.

 

Intelligence and Security Informatics: Techniques and Applications

2008

This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research

Open Access resources

1. Directory of Open Access Journals (DOAJ)

2. Sage Open

3. SpringerOpen

4. Wiley Open Access

 

The following training services are offered by the library:

 

  1. Reference Management-referencing, citation and use of electronic reference management software Mendeley and discipline specific citation styles.
  2. Literature discovery– identifying research topics; planning and performing a literature review; running effective searches using e-resources and staying up to date with chosen research topic.
  3. Tools for research Collaboration– using writing collaborative tools such as Google Docs, literature searching collaborative tools like Mendeley, ResearchGate and Academia and using tools for connecting with other researchers.
  4. Research Impact tracking– Use of citations and alternative metrics to track research impact using tools such as Google Citations and Social Media metrics
  5. Strategies to increase research visibility and discoverability– how to increase the visibility of research outputs through the use of institutional repositories; sharing preprints, establishing online researcher profiles and using social media for research.
  6. Publishing in reputable journals– selecting a book publisher and selecting a journal, differentiating predatory, accredited journals, and Open Access routes to getting research output more visible and citable.
  1. Research Communication-the training equips researchers on how to communicate their research to a broader audience so as to achieve optimum impact of research findings. It also explores the various ways in which research can be shared.

 

Available trainings can be booked here: https://forms.gle/zkeJRkE1JphNG92f7

How to find Computer Engineering, Informatics and Communications thesis and dissertations in UZ Libraries.

Master’s and Doctoral theses from the Faculty of Computer Engineering, Informatics and Communications that have been submitted to UZ Library are for most part, available electronically through the UZescholar Institutional Repository

Faculty of Computer Engineering, Informatics and Communications thesis can be located by searching the institutional repository using this link:

https://ir.uz.ac.zw

Other UZ theses can also be found through searching the repository by issue date, author, title and subject. Alternatively use a community search including the title of the community for example “Faculty of the Faculty of Computer Engineering, Informatics and Communications “.

In general, UZ Libraries does not keep Undergraduate theses although departments often keep their own copies but these are not reflected in the Libraries’ catalogue.

The procedure utilised to acknowledge the sources you have used in writing up your assignments or projects is referred to as referencing (also known as citation). You can incorporate the work of others in your references or borrowings without being accused of plagiarizing. The act of using someone else’s creative efforts, such as research, writings, and ideas, and passing them off as your own is known as plagiarism. The University of Zimbabwe views this as a serious offense and a dishonest act. It’s critical to properly cite and reference the sources used in scholarly work in order to prevent plagiarism.

Referencing and citation consists of two elements:

  • In-text citations in the body of the paper with the last name of the author(s) and the year of publication
  • An alphabetically arranged reference list at the end of the paper giving full bibliographic details for the in-text citations of the sources you have used in your write up.

 

The Faculty of Computer Engineering, informatics and Communications uses the Harvard citation style. This refers to the standards and practices established for scholarly writing and crediting the sources utilised in a task or academic project.

View the Harvard reference management guide by clicking this link:

https://www.open.ac.uk/library/referencing-and-plagiarism/quick-guide-to-harvard-referencing-cite-them-right

 

For individual or group sessions on using the citation style, book an appointment with your Faculty Subject Information Specialist on this email: smlalazi@uzlib.uz.ac.zw

 Online Reference Management

Faculty Subject Information Specialists also teach students how to manage their referencing and citations using the free reference management program Mendeley. This citation management and academic social network may also assist with a wide range of tasks, including creating and managing citations, organizing your research, collaborating online, finding pertinent papers based on what you are reading, and learning about the most recent research. For training you can book an appointment on this email smlalazu”uzlib.uz.ac.zw

 

Featured books in our Print collection

 

Principles of Information Systems by Ralph Stair and George Reynolds

Call Number: T.56.6 STAR

Management Information Systems: Managing the Digital Firm by Kenneth Laudon and Jane P. Laudon

Call Number: T58.6LAU


Mechanics of Materials by R. C. Hibbler

Call Number: TA 405.538 HIB

Cloud Computing: Principles and Paradigms by Rajikuma Buyya

Call Number: QA76.585 CLO

Concrete Technology: Theory and Practice by M. S Shetty

Call Number: TA 439 SHE

 

Introduction to Computer Theory by Daniel L. A. Cohen

Call Number: QA 76.32 COH

 


Operating Systems: Design and Implementation by Andrew S. Tanenbaum

Call Number: QA76.76 TAN

Interactive Computer graphics: A top down approach with WebGL by Edward Angel and Dave Shreine

Call Number: T385 ANG

 

Faculty of Computer Engineering, Informatics and Communications electronic resources

The UZ website provides access to pertinent e-books and e-journals in the fields of computer engineering, informatics, and communications. When you go to the website (http://.library.uz.ac.zw), you should click on Campus Access or Off Campus Access if you are not on the university campus or connected to the university internet. You will get access to the university’s collection of e-books and e-journals. The databases listed below are some of the best for research in computer engineering, informatics, and communications. To begin using any of the databases to access e-books and e-journals, simply click on it.

 

E-journal Databases E-book Databases
 

HINARI

Access To Research for Development and Innovation(ARDI)

Wiley Online Library

Project Muse

JSTOR

Taylor & Francis

World Bank eLibrary

 

 

Wiley Online Library

Project Muse

JSTOR

Ebsco e-Books

Gale Research Complete

Proquest e-Book Central

 

For remote access please click here: https://uz.remotexs.co

 

 

 

Faculty of Computer Engineering Informatics and Communications Core Textbooks

Cloud computing : concepts, technology, & architecture

2013

Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services

 

Cloud computing: Principles and Paradigms

 

2011

 

The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications. We expect the book to serve as a reference for larger audience such as systems architects, practitioners, developers, new researchers and graduate level students. This area of research is relatively recent, and as such has no existing reference book that addresses it.

 

Computer Organisation and Design

 

2006

 

Computer Organization and Design: The Hardware/Software Interface, Sixth Edition, the leading, award-winning textbook from Patterson and Hennessy used by more than 40,000 students per year, continues to present the most comprehensive and readable introduction to this core computer science topic. Improvements to this new release include new sections in each chapter on Domain Specific Architectures (DSA) and updates on all real-world examples that keep it fresh and relevant for a new generation of students.

 

Data Mining: Practical Machine Learning Tools and Techniques

 

2011

 

Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches.

 

Fundamentals of Database Systems

 

2014

 

This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation techniques. The book is meant to be used as a textbook for a one- or two-semester course in database systems at the junior, senior, or graduate level, and as a reference book

 

Guide to computer network security

 

2017

 

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.

 

Guide to Computer Network security

 

2017

 

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.

 

Intelligence and Security Informatics: Techniques and Applications

2008

This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research

Rethinking IT in Construction and Engineering

 

2007

 

Based on the author’s twenty years research experience, this book provides a holistic picture of the factors that enable architecture, construction and engineering organisations to explore the potential of IT to improve their businesses and achieve a sustainable competitive advantage.

 

 

Software Engineering

 

2015

 

Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world’s major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner.