Search:

Computer science : a very short introduction / by Dasgupta, Subrata.;
Includes bibliographical references (pages 133-138) and index.The "stuff" of computing -- Computational artefacts -- Algorithmic thinking -- The art, science, and engineering of programming -- The discipline of computer architecture -- Heuristic computing -- Computational thinking -- Epilogue: is computer science a universal science?
Subjects: Computer science.;
Available copies: 1 / Total copies: 1
unAPI

The computer : a very short introduction / by Ince, D.(Darrel);
Includes bibliographical references (p. 131-133) and index.The naked computer -- The small computer -- The ubiquitous computer -- The global computer -- The insecure computer -- The disruptive computer -- The cloud computer -- The next computer.Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this introduction, the author looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA.
Subjects: Computers.; Computers; Computer science.; Computer science;
© 2011., Oxford University Press,
Available copies: 1 / Total copies: 1
unAPI

Secret history : the story of cryptology / by Bauer, Craig P.;
"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--Includes bibliographical references and index.
Subjects: Data encryption (Computer science); Computer security.; Cryptography; Ciphers.;
Available copies: 1 / Total copies: 1
unAPI

A New History of Modern Computing. by Haigh, Thomas.; Ceruzzi, Paul E.;
Intro -- Contents -- Acknowledgments -- Becoming Universal: Introducing A New History of Computing -- 1. Inventing the Computer -- ENIAC -- The EDVAC Approach -- The Commercialization of Computing -- 2. The Computer Becomes a Scientific Supertool -- The First Scientific Computers -- Scientific Programming Tools -- Toward the Supercomputer -- 3. The Computer Becomes a Data Processing Device -- The First Administrative Computers -- Data Processing in Practice -- IBM's System/360 Sets the Standard -- Dreams of a Management Revolution -- Creation of the Software Industry -- 4. The Computer Becomes a Real-Time Control System -- Real-Time Systems -- Miniaturization: Missiles and Minicomputers -- Integrated Circuits -- Building Reliable Systems -- 5. The Computer Becomes an Interactive Tool -- The Origins of Interactive Computing -- Scaling Up Timesharing -- Software Engineering -- Unix and DEC Take Timesharing Mainstream -- 6. The Computer Becomes a Communications Platform -- Communication and Collaborating on Timesharing Systems -- Laying The Internet's Foundations -- Commercial Networks -- Internet Commercialization -- 7. The Computer Becomes a Personal Plaything -- New Electronic Devices -- Personal Computing -- Video Games -- Computers Come Home -- 8. The Computer Becomes Office Equipment -- Personal Computers for Business -- The IBM Personal Computer Family -- The IBM PC Becomes an Industry -- The PC at the End of the 1980s -- 9. The Computer Becomes a Graphical Tool -- Xerox Invents Graphical Computing -- Bringing the Graphical Interface to Personal Computers -- 10. The Pc Becomes a Minicomputer -- Moving Beyond DOS -- Inventing the Wintel PC -- The RISC Challenge to Wintel -- 11. The Computer Becomes a Universal Media Device -- Origins of Digital Media -- Digitizing Music -- Digitizing Images -- Downloading Music -- 3D Graphics and Games.Digital Media Triumphant -- 12. The Computer Becomes a Publishing Platform -- The World Wide Web -- Web Publishing -- The Browser Wars -- The Triumph of Open Source -- 13. The Computer Becomes a Network -- Data Centers and the Cloud -- Social Media -- Applications Head for the Web -- 14. The Computer is Everywhere and Nowhere -- Specialized Mobile Devices -- Enter the iPhone -- Smartphones Evolve -- 15. Epilogue: A Tesla in the Valley -- Into the Valley -- A One-Way Trip to an Uncertain Future -- Technology and Pandemic -- Notes -- Becoming Universal -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Bibliography -- Index -- Series Editor.Over the past fifty years, the computer has been transformed from a hulking scientific supertool and data processing workhorse, remote from the experiences of ordinary people, to a diverse family of devices that billions rely on to play games, shop, stream music and movies, communicate, and count their steps. In A New History of Modern Computing, Thomas Haigh and Paul Ceruzzi trace these changes. A comprehensive reimagining of Ceruzzi's A History of Modern Computing, this new volume uses each chapter to recount one such transformation, describing how a particular community of users and producers remade the computer into something new.Haigh and Ceruzzi ground their accounts of these computing revolutions in the longer and deeper history of computing technology. They begin with the story of the 1945 ENIAC computer, which introduced the vocabulary of "programs" and "programming," and proceed through email, pocket calculators, personal computers, the World Wide Web, videogames, smart phones, and our current world of computers everywhere--in phones, cars, appliances, watches, and more. Finally, they consider the Tesla Model S as an object that simultaneously embodies many strands of computing. -- provided by Amazon.com.Description based on publisher supplied metadata and other sources.Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Subjects: Electronic books.; Computer science-History.; Electronic digital computers-History.;
On-line resources: https://ebookcentral.proquest.com/lib/kirtland-ebooks/detail.action?docID=6730689 -- Available online. Click here to access.;
unAPI

The singularity is nearer : [electronic resource] : When we merge with AI. by Kurzweil, Ray.; Barr, Adam.;
Narrator: Adam Barr.The noted inventor and futurist’s successor to his landmark book The Singularity Is Near explores how technology will transform the human race in the decades to come Since it was first published in 2005, Ray Kurzweil’s The Singularity Is Near and its vision of an exponential future have spawned a worldwide movement. Kurzweil's predictions about technological advancements have largely come true, with concepts like AI, intelligent machines, and biotechnology now widely familiar to the public. In this entirely new book Ray Kurzweil brings a fresh perspective to advances toward the Singularity—assessing his 1999 prediction that AI will reach human level intelligence by 2029 and examining the exponential growth of technology—that, in the near future, will expand human intelligence a millionfold and change human life forever. Among the topics he discusses are rebuilding the world, atom by atom with devices like nanobots; radical life extension beyond the current age limit of 120; reinventing intelligence by connecting our brains to the cloud; how exponential technologies are propelling innovation forward in all industries and improving all aspects of our well-being such as declining poverty and violence; and the growth of renewable energy and 3-D printing. He also considers the potential perils of biotechnology, nanotechnology, and artificial intelligence, including such topics of current controversy as how AI will impact employment and the safety of autonomous cars, and "After Life" technology, which aims to virtually revive deceased individuals through a combination of their data and DNA. The culmination of six decades of research on artificial intelligence, The Singularity Is Nearer is Ray Kurzweil’s crowning contribution to the story of this science and the revolution that is to come. * This audiobook edition includes a downloadable PDF with illustrations and graphs from the book.Requires the Libby app or a modern web browser.
Subjects: Electronic books.; Nonfiction.; Computer Technology.; Science.; Sociology.;
© 2024., Penguin Audio,
On-line resources: http://link.overdrive.com/?websiteID=130119&titleID=6104040 -- Click to access digital title in OverDrive.;
unAPI

Fancy Bear goes phishing : [electronic resource] : The dark history of the information age, in five extraordinary hacks. by Shapiro, Scott J.; Ross, Jonathan Todd.;
Narrator: Jonathan Todd Ross.It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G ö del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.Requires the Libby app or a modern web browser.
Subjects: Electronic books.; Nonfiction.; Computer Technology.; Politics.; Science.;
© 2023., Macmillan Audio,
On-line resources: http://link.overdrive.com/?websiteID=130119&titleID=9215470 -- Click to access digital title in OverDrive.;
unAPI

How AI works : from sorcery to science / by Kneusel, Ronald T.,author.https://id.oclc.org/worldcat/entity/E39PCjDpXgc8gVfbKvjKWvCCwC;
Includes bibliographical references (pages 167-169) and index."An accessible, straightforward guide that demystifies Artificial Intelligence for a general audience without the use of complex math or technical jargon. Covers the fundamentals, from classical models and neural networks to the large language models leading today's AI revolution"--Preface -- And away we go : an AI overview -- Why now? A history of AI -- Classical models : old-school machine learning -- Neural networks : brain-like AI -- Convolutional neural networks : AI learns to see -- Generative AI : AI gets creative -- Large language models : true AI at last? -- Musings : the implications of AI -- Glossary.
Subjects: Artificial intelligence; Neural networks (Computer science);
Available copies: 1 / Total copies: 1
unAPI

Using SPSS : an interactive hands-on approach / by Cunningham, James B.,1938-; Aldrich, James O.;
Includes bibliographical references and index.First encounters -- Navigating in SPSS -- Getting data in and our of SPSS -- Levels of measurement -- Entering variables and data and validating data -- Working with data and variables -- Using the SPSS help menu -- Creating basic graphs and charts -- Editing and embellishing graphs -- Printing data view, variable view, and output viewer screens -- Basic descriptive statistics -- One-sample t test and a binomial test of equality -- Independent-samples t test and Mann-Whitney U test -- Paired-samples t test and Wilcoxon test -- One-way ANOVA and Kruskal-Wallis test -- Two-way (factorial) ANOVA -- One-way ANOVA repeated measures test and Friedman test -- Analysis of covariance (ANCOVA) -- Pearson's correlation and Spearman's correlation -- Single linear regression -- Multiple linear regression -- Chi-square goodness of fit -- Chi-square test of independence.
Subjects: SPSS (Computer file); Social sciences;
© c2012., SAGE,
Available copies: 1 / Total copies: 1
unAPI

Listening in : cybersecurity in an insecure age / by Landau, Susan Eva.;
Includes bibliographical references (pages 173-207) and index.Racing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back."New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket.
Subjects: Data encryption (Computer science); Computer networks; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Cybersecurity and information security analysts : a practical career guide / by Endsley, Kezia,1968-author.;
Includes bibliographical references.Introduction - Why choose a career in Infosec? - Forming a career plan - Pursuing the education path - Writing your resume and interviewingWelcome to the cybersecurity (also called information security or InfoSec) field! If you are interested in a career in cybersecurity, you've come to the right book. So what exactly do these people do on the job, day in and day out? What kind of skills and educational background do you need to succeed in this field? How much can you expect to make, and what are the pros and cons of these various professions? Is this even the right career path for you? How do you avoid burnout and deal with stress? This book can help you answer these questions and more. Cybersecurity and Information Security Analysts: A Practical Career Guide, which includes interviews with professionals in the field, covers the following areas of this field that have proven to be stable, lucrative, and growing professions: Security Analysts/Engineers -- Security Architects -- Security Administrators -- Security Software Developers -- Cryptographers/Cryptologists/Cryptanalysts. -- Provided by publisher.
Subjects: Computer networks; Data protection; Computer crimes; Computer science;
Available copies: 1 / Total copies: 1
unAPI