Browse Results What Format Should I Choose?

Showing 1,726 through 1,750 of 10,646 results

Computer Literacy Basics: A Comprehensive Guide to IC3

by Dolores Wells Connie Morrison

COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 covers Computing Fundamentals, Key Applications, and Living Online - everything your students need to pass the IC3 exam, and finish the course as confident computer users.

Computer Literacy BASICS: A Comprehensive Guide to IC3

by Dolores Wells Connie Morrison

Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Computing Core Certification (IC3) standards. Designed with new learners in mind, this text covers Computing Fundamentals, Key Applications, and Living Online - everything your students need to ace the IC3 exam, and finish the course as confident computer users.

Computer Literacy Basics: Microsoft Office 2007 Companion

by Jennifer T. Campbell

Computer Literacy BASICS: Microsoft Office 2007 Companion is designed to accompany Computer Literacy BASICS, Second Edition, providing updated coverage on Office 2007. Step-by-step instructions provide students with an overview of the Office 2007 software and will help them gain the skills necessary to pass the IC3 certification exam.

Computer Networking: A Top-down Approach (5th Edition)

by James F. Kurose Keith W. Ross

Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors-and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.

Computer Networking: A Top-Down Approach (Sixth Edition)

by James F. Kurose Keith W. Ross

Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers. This book has become the dominant book for this course because of the authors' reputations, the precision of explanation, the quality of the art program, and the value of their own supplements.

Computer Networks & Communications (NetCom)

by Nabendu Chaki Natarajan Meghanathan Dhinaharan Nagamalai

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

The Computer Nut

by Betsy Byars

Ten-year-old Kate begins a communication exchange on a computer with someone purporting to be from outer space, who says he is going to pay a visit to Earth soon.

Computer Privacy Annoyances

by Dan Tynan

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.

Computer Resources for People with Disabilities

by Alliance for Technology Access

A resource for people with disabilities who want to improve their lives through the use of technology.

Computer Science

by Edward K. Blum Alfred V Aho

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain classical theoretical computer science topics such as Unsolvability (e.g. the halting problem) and Undecidability (e.g. Godel's incompleteness theorem) that treat problems that exist under the Church-Turing thesis of computation. These problem topics explain inherent limits lying at the heart of software, and in effect define boundaries beyond which computer science professionals cannot go beyond. Newer topics such as Cloud Computing are also covered in this book. After a survey of traditional programming languages (e.g. Fortran and C++), a new kind of computer Programming for parallel/distributed computing is presented using the message-passing paradigm which is at the heart of large clusters of computers. This leads to descriptions of current hardware platforms for large-scale computing, such as clusters of as many as one thousand which are the new generation of supercomputers. This also leads to a consideration of future quantum computers and a possible escape from the Church-Turing thesis to a new computation paradigm. Computer Science: The Hardware, Software and Heart of It is designed as a professional book for practitioners and researchers working in the related fields of Quantum Computing, Cloud Computing, Computer Networking, as well as non-scientist readers. Advanced-level and undergraduate students concentrating on computer science, engineering and mathematics will also find this book useful.

Computer Science and Artificial Intelligence

by Panel on Computer Science Artificial Intelligence

The National Academies Press (NAP)--publisher for the National Academies--publishes more than 200 books a year offering the most authoritative views, definitive information, and groundbreaking recommendations on a wide range of topics in science, engineering, and health. Our books are unique in that they are authored by the nation's leading experts in every scientific field.

Computer Science Illuminated (Fifth Edition)

by John Lewis Nell Dale

Revised and updated with the latest information in the field, the Fifth Edition of best-selling Computer Science Illuminated continues to provide students with an engaging breadth-first overview of computer science principles and provides a solid foundation for those continuing their study in this dynamic and exciting discipline. Authored by two of today's most respected computer science educators, Nell Dale and John Lewis, the text carefully unfolds the many layers of computing from a language-neutral perspective, beginning with the information layer, progressing through the hardware, programming, operating systems, application, and communication layers, and ending with a discussion on the limitations of computing. Separate program language chapters are available as bundle items for instructors who would like to explore a particular programming language with their students. Ideal for introductory computing and computer science courses, the fifth edition's thorough presentation of computing systems provides computer science majors with a solid foundation for further study, and offers non-majors a comprehensive and complete introduction to computing. New Features of the Fifth Edition:- A new chapter on computer security provides readers with the latest information on preventing unauthorized access; types of malware and anti-virus software; protecting online information, including data collection issues with Facebook, Google, etc. ; security issues with mobile and portable devices; and more. - A NEW section on cloud computing offers readers an overview of the latest way in which businesses and users interact with computers and mobile devices. - The section on social networks has been rewritten to include up-to-date information, including new data on Google+ and Facebook. - The sections covering HTML have been updated to include HTML5. - Revised and updated Did You Know callouts are included in the chapter margins. - The updated Ethical Issues at the end of each chapter have been revised to tie the content to the tenth strand recommended by the ACM, which stresses the importance of computer ethics. Accompanied by a comprehensive suite of instructor resources including answers to the end of chapter exercises, answers to the optional lab exercises, PowerPoint Lecture Outlines, Image Bank, and a complete Test Bank. Every new copy is packaged with full student access code to the robust Companion Website featuring:Animated Flashcards; Relevant Web Links; Crossword Puzzles; Interactive Glossary; Digital Lab Manual; R. Mark Meyer's labs, Explorations in Computer Science; Additional programming chapters, including Alice, C++, Java, JavaScript, Pascal, Perl, Python, Ruby, SQL, and VB. NET; C++ Language Essentials labs; Java Language Essentials labs; Link to Download Pep/8

Computer Science Made Simple

by V. Anton Spraul

Be smarter than your computer. If you don't understand computers, you can quickly be left behind in today's fast-paced, machine-dependent society. Computer Science Made Simple offers a straightforward resource for technology novices and advanced techies alike. It clarifies all you need to know, from the basic components of today's computers to using advanced applications. The perfect primer, it explains how it all comes together to make computers work. Topics covered include: * hardware* software* programming * networks * the internet * computer graphics * advanced computer concepts * computers in society.

Computer Science & Perl Programming

by O'Reilly Media

In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development. Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl. Here's a sample of what you'll find inside: Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memorization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl. Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl *for*. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.

Computer Science & Perl Programming

by Jon Orwant

In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development. Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl. Here's a sample of what you'll find inside:Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memoization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl. Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl for. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.

Computer Science Programming Basics in Ruby

by David Grossman Gideon Frieder Ophir Frieder

If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you'll quickly understand the difference between computer science and computer programming, and you'll learn how algorithms help you solve computing problems. Each chapter builds on material introduced earlier in the book, so you can master one core building block before moving on to the next. You'll explore fundamental topics such as loops, arrays, objects, and classes, using the easy-to-learn Ruby programming language. Then you'll put everything together in the last chapter by programming a simple game of tic-tac-toe. Learn how to write algorithms to solve real-world problems Understand the basics of computer architecture Examine the basic tools of a programming language Explore sequential, conditional, and loop programming structures Understand how the array data structure organizes storage Use searching techniques and comparison-based sorting algorithms Learn about objects, including how to build your own Discover how objects can be created from other objects Manipulate files and use their data in your software

Computer Science: Reflections on the Field, Reflections from the Field

by Opportunities Committee on the Fundamentals of Computer Science:Challenges

Computer Science: Reflections on the Field, Reflections from the Fieldprovides a concise characterization of key ideas that lie at the core of computer science (CS) research. The book offers a description of CS research recognizing the richness and diversity of the field. It brings together two dozen essays on diverse aspects of CS research, their motivation and results. By describing in accessible form computer science's intellectual character, and by conveying a sense of its vibrancy through a set of examples, the book aims to prepare readers for what the future might hold and help to inspire CS researchers in its creation.

Computer Science: A Structured Programming Approach Using C (2nd edition)

by Behrouz A. Forouzan Richard F. Gilberg

This textbook introduces the basic principles of programming as outlined in the ACM curriculum for a CS1 class, and the basic concepts of the C language. The second edition adds new exercises, projects and problems to the end of chapter material.

Computer Science: A Structured Programming Approach Using C (3rd edition)

by Behrouz A. Forouzan Richard F. Gilberg

The third edition of Computer Science: A Structured Programming Approach Using C continues to present both computer science theory and C-language syntax with a principle-before-implementation approach. Forouzan and Gilberg employ a clear organizational structure, supplemented by easy-to-follow figures, charts, and tables. The new edition has been thoroughly updated to reflect the new C99 standard, and includes a revised chapter sequence to better aid student learning.

Computer Security Basics, 2nd Edition

by Rick Lehtinen

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST

Computer Security Basics, 2nd Edition

by Rick Lehtinen G. T. Gangemi

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST

Computer Security Basics, 2nd Edition

by Rick Lehtinen G. T. Gangemi Sr.

<p>The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, <i>Computer Security Basics</i> 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. </p>

Computer Service and Repair: A Guide to Upgrading, Configuring, Troubleshooting, and Networking Personal Computers

by Richard M. Roberts

Teaches the practices and principles needed to pass the A+ Certification Exams, as well as to build, upgrade, and troubleshoot your PC.

Computer-Supported Collaborative Learning at the Workplace

by Volker Wulf Isa Jahnke Sean P. Goggins

This book is an edited volume of case studies exploring the uptake and use of computer supported collaborative learning in work settings. This book fills a significant gap in the literature. A number of existing works provide empirical research on collaborative work practices (Lave & Wenger, 1987; Davenport, 2005), the sharing of information at work (Brown & Duguid, 2000), and the development of communities of practice in workplace settings (Wenger, 1998). Others examine the munificent variation of information and communication technology use in the work place, including studies of informal social networks, formal information distribution and other socio-technical combinations found in work settings (Gibson & Cohen, 2003). Another significant thread of prior work is focused on computer supported collaborative learning, much of it investigating the application of computer support for learning in the context of traditional educational institutions, like public schools, private schools, colleges and tutoring organizations. Exciting new theories of how knowledge is constructed by groups (Stahl, 2006), how teachers contribute to collaborative learning (reference to another book in the series) and the application of socio-technical scripts for learning is explicated in book length works on CSCL. Book length empirical work on CSCW is widespread, and CSCL book length works are beginning to emerge with greater frequency. We distinguish CSCL at Work from prior books written under the aegis of training and development, or human resources more broadly. The book aims to fill a void between existing works in CSCW and CSCL, and will open with a chapter characterizing the emerging application of collaborative learning theories and practices to workplace learning. CSCL and CSCW research each make distinct and important contributions to the construction of collaborative workplace learning.

Computer System Design

by Wayne Luk Michael J. Flynn

The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optimize the cost, performance and other attributes to meet application requirements. This book provides a new treatment of computer system design, particularly for System-on-Chip (SOC), which addresses the issues mentioned above. It begins with a global introduction, from the high-level view to the lowest common denominator (the chip itself), then moves on to the three main building blocks of an SOC (processor, memory, and interconnect). Next is an overview of what makes SOC unique (its customization ability and the applications that drive it). The final chapter presents future challenges for system design and SOC possibilities.

Showing 1,726 through 1,750 of 10,646 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.