Results 1 to 10 of 112 | next »
- Computer science : a very short introduction / by Dasgupta, Subrata.;
- Includes bibliographical references (pages 133-138) and index.The "stuff" of computing -- Computational artefacts -- Algorithmic thinking -- The art, science, and engineering of programming -- The discipline of computer architecture -- Heuristic computing -- Computational thinking -- Epilogue: is computer science a universal science?
- Subjects: Computer science.;
- Available copies: 1 / Total copies: 1
-
unAPI
- The computer : a very short introduction / by Ince, D.(Darrel);
- Includes bibliographical references (p. 131-133) and index.The naked computer -- The small computer -- The ubiquitous computer -- The global computer -- The insecure computer -- The disruptive computer -- The cloud computer -- The next computer.Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this introduction, the author looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA.
- Subjects: Computers.; Computers; Computer science.; Computer science;
- © 2011., Oxford University Press,
- Available copies: 1 / Total copies: 1
-
unAPI
- Secret history : the story of cryptology / by Bauer, Craig P.;
- "Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--Includes bibliographical references and index.
- Subjects: Data encryption (Computer science); Computer security.; Cryptography; Ciphers.;
- Available copies: 1 / Total copies: 1
-
unAPI
- A New History of Modern Computing. by Haigh, Thomas.; Ceruzzi, Paul E.;
- Intro -- Contents -- Acknowledgments -- Becoming Universal: Introducing A New History of Computing -- 1. Inventing the Computer -- ENIAC -- The EDVAC Approach -- The Commercialization of Computing -- 2. The Computer Becomes a Scientific Supertool -- The First Scientific Computers -- Scientific Programming Tools -- Toward the Supercomputer -- 3. The Computer Becomes a Data Processing Device -- The First Administrative Computers -- Data Processing in Practice -- IBM's System/360 Sets the Standard -- Dreams of a Management Revolution -- Creation of the Software Industry -- 4. The Computer Becomes a Real-Time Control System -- Real-Time Systems -- Miniaturization: Missiles and Minicomputers -- Integrated Circuits -- Building Reliable Systems -- 5. The Computer Becomes an Interactive Tool -- The Origins of Interactive Computing -- Scaling Up Timesharing -- Software Engineering -- Unix and DEC Take Timesharing Mainstream -- 6. The Computer Becomes a Communications Platform -- Communication and Collaborating on Timesharing Systems -- Laying The Internet's Foundations -- Commercial Networks -- Internet Commercialization -- 7. The Computer Becomes a Personal Plaything -- New Electronic Devices -- Personal Computing -- Video Games -- Computers Come Home -- 8. The Computer Becomes Office Equipment -- Personal Computers for Business -- The IBM Personal Computer Family -- The IBM PC Becomes an Industry -- The PC at the End of the 1980s -- 9. The Computer Becomes a Graphical Tool -- Xerox Invents Graphical Computing -- Bringing the Graphical Interface to Personal Computers -- 10. The Pc Becomes a Minicomputer -- Moving Beyond DOS -- Inventing the Wintel PC -- The RISC Challenge to Wintel -- 11. The Computer Becomes a Universal Media Device -- Origins of Digital Media -- Digitizing Music -- Digitizing Images -- Downloading Music -- 3D Graphics and Games.Digital Media Triumphant -- 12. The Computer Becomes a Publishing Platform -- The World Wide Web -- Web Publishing -- The Browser Wars -- The Triumph of Open Source -- 13. The Computer Becomes a Network -- Data Centers and the Cloud -- Social Media -- Applications Head for the Web -- 14. The Computer is Everywhere and Nowhere -- Specialized Mobile Devices -- Enter the iPhone -- Smartphones Evolve -- 15. Epilogue: A Tesla in the Valley -- Into the Valley -- A One-Way Trip to an Uncertain Future -- Technology and Pandemic -- Notes -- Becoming Universal -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Bibliography -- Index -- Series Editor.Over the past fifty years, the computer has been transformed from a hulking scientific supertool and data processing workhorse, remote from the experiences of ordinary people, to a diverse family of devices that billions rely on to play games, shop, stream music and movies, communicate, and count their steps. In A New History of Modern Computing, Thomas Haigh and Paul Ceruzzi trace these changes. A comprehensive reimagining of Ceruzzi's A History of Modern Computing, this new volume uses each chapter to recount one such transformation, describing how a particular community of users and producers remade the computer into something new.Haigh and Ceruzzi ground their accounts of these computing revolutions in the longer and deeper history of computing technology. They begin with the story of the 1945 ENIAC computer, which introduced the vocabulary of "programs" and "programming," and proceed through email, pocket calculators, personal computers, the World Wide Web, videogames, smart phones, and our current world of computers everywhere--in phones, cars, appliances, watches, and more. Finally, they consider the Tesla Model S as an object that simultaneously embodies many strands of computing. -- provided by Amazon.com.Description based on publisher supplied metadata and other sources.Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
- Subjects: Electronic books.; Computer science-History.; Electronic digital computers-History.;
- On-line resources: https://ebookcentral.proquest.com/lib/kirtland-ebooks/detail.action?docID=6730689 -- Available online. Click here to access.;
-
unAPI
- Fancy Bear goes phishing : [electronic resource] : The dark history of the information age, in five extraordinary hacks. by Shapiro, Scott J.; Ross, Jonathan Todd.;
- Narrator: Jonathan Todd Ross.It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G ö del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.Requires the Libby app or a modern web browser.
- Subjects: Electronic books.; Nonfiction.; Computer Technology.; Politics.; Science.;
- © 2023., Macmillan Audio,
- On-line resources: http://link.overdrive.com/?websiteID=130119&titleID=9215470 -- Click to access digital title in OverDrive.;
-
unAPI
- Using SPSS : an interactive hands-on approach / by Cunningham, James B.,1938-; Aldrich, James O.;
- Includes bibliographical references and index.First encounters -- Navigating in SPSS -- Getting data in and our of SPSS -- Levels of measurement -- Entering variables and data and validating data -- Working with data and variables -- Using the SPSS help menu -- Creating basic graphs and charts -- Editing and embellishing graphs -- Printing data view, variable view, and output viewer screens -- Basic descriptive statistics -- One-sample t test and a binomial test of equality -- Independent-samples t test and Mann-Whitney U test -- Paired-samples t test and Wilcoxon test -- One-way ANOVA and Kruskal-Wallis test -- Two-way (factorial) ANOVA -- One-way ANOVA repeated measures test and Friedman test -- Analysis of covariance (ANCOVA) -- Pearson's correlation and Spearman's correlation -- Single linear regression -- Multiple linear regression -- Chi-square goodness of fit -- Chi-square test of independence.
- Subjects: SPSS (Computer file); Social sciences;
- © c2012., SAGE,
- Available copies: 1 / Total copies: 1
-
unAPI
- Listening in : cybersecurity in an insecure age / by Landau, Susan Eva.;
- Includes bibliographical references (pages 173-207) and index.Racing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back."New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket.
- Subjects: Data encryption (Computer science); Computer networks; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Cybersecurity and information security analysts : a practical career guide / by Endsley, Kezia,1968-author.;
- Includes bibliographical references.Introduction - Why choose a career in Infosec? - Forming a career plan - Pursuing the education path - Writing your resume and interviewingWelcome to the cybersecurity (also called information security or InfoSec) field! If you are interested in a career in cybersecurity, you've come to the right book. So what exactly do these people do on the job, day in and day out? What kind of skills and educational background do you need to succeed in this field? How much can you expect to make, and what are the pros and cons of these various professions? Is this even the right career path for you? How do you avoid burnout and deal with stress? This book can help you answer these questions and more. Cybersecurity and Information Security Analysts: A Practical Career Guide, which includes interviews with professionals in the field, covers the following areas of this field that have proven to be stable, lucrative, and growing professions: Security Analysts/Engineers -- Security Architects -- Security Administrators -- Security Software Developers -- Cryptographers/Cryptologists/Cryptanalysts. -- Provided by publisher.
- Subjects: Computer networks; Data protection; Computer crimes; Computer science;
- Available copies: 1 / Total copies: 1
-
unAPI
- Planning cloud-based disaster recovery for digital assets : the innovative librarian's guide / by Hastings, Robin,1973-;
- "For the purposes of this book, cloud-based technology will be loosely defined as "server space or application services that are not based in your organization". The essence of the cloud is that no one should care much about where the information and applications used actually live. It's just "out there" somewhere. Of course, for truly comprehensive disaster planning, you do want to know where your data and applications are being stored so that you can choose multiple locations across the country for their storage. If a hurricane hits Florida and all your data was in a server farm in Miami, you might have a problem. Multiple data farms in use in multiple areas of the country keep your data safe - sort of a large-scale LOCKSS (Lots Of Copies Keep Stuff Safe) solution. For the most part, though, and for the purposes of this book unless indicated otherwise - cloud-based means not in your building or office space"--Includes bibliographical references and index.What is a disaster? -- What are cloud-based tools -- Determining needs and the planning process -- What to backup and how often -- Preventing a disaster -- Creating a disaster plan -- What is a successful disaster plan? -- Wrapping it all up.
- Subjects: Digital preservation.; Cloud computing.; Data protection; Data recovery (Computer science); Emergency management;
- Available copies: 1 / Total copies: 1
-
unAPI
- Total recall : how the E-memory revolution will change everything / by Bell, C. Gordon.; Gemmell, Jim,1965-;
- Includes bibliographical references (p. 227-268) and index.The vision -- Mylifebits -- The meeting of E-memory and bio-memory -- Work -- Health -- Learning -- Everyday life and afterlife -- Living through the revolution -- Getting started -- The future.Total Recall provides a glimpse of the near future. Imagine heart monitors woven into your clothes and tiny wearable audio and visual recorders automatically capturing what you see and hear. Imagine being able to summon up the e-memories of your great grandfather and his avatar giving you advice about whether or not to go to college, accept that job offer, or get married. The range of potential insights is truly awesome. But Bell and Gemmell also show how you can begin to take better advantage of this new technology right now. From how to navigate the serious question of privacy and serious problem of application compatibility to what kind of startups Bell is willing to invest in and which scanner he prefers, this is a book about a turning point in human knowledge as well as an immediate practical guide.. -- Publisher description.
- Subjects: Information society.; Memory.; Neural networks (Computer science); Information resources management; Telematics; Computers and civilization;
- © c2009., Dutton,
- Available copies: 1 / Total copies: 1
-
unAPI
Results 1 to 10 of 112 | next »