Browse Results What Format Should I Choose?

Showing 1,776 through 1,800 of 10,895 results

Computer Resources for People with Disabilities

by Alliance for Technology Access

A resource for people with disabilities who want to improve their lives through the use of technology.

Computer Science

by Edward K. Blum Alfred V Aho

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain classical theoretical computer science topics such as Unsolvability (e.g. the halting problem) and Undecidability (e.g. Godel's incompleteness theorem) that treat problems that exist under the Church-Turing thesis of computation. These problem topics explain inherent limits lying at the heart of software, and in effect define boundaries beyond which computer science professionals cannot go beyond. Newer topics such as Cloud Computing are also covered in this book. After a survey of traditional programming languages (e.g. Fortran and C++), a new kind of computer Programming for parallel/distributed computing is presented using the message-passing paradigm which is at the heart of large clusters of computers. This leads to descriptions of current hardware platforms for large-scale computing, such as clusters of as many as one thousand which are the new generation of supercomputers. This also leads to a consideration of future quantum computers and a possible escape from the Church-Turing thesis to a new computation paradigm. Computer Science: The Hardware, Software and Heart of It is designed as a professional book for practitioners and researchers working in the related fields of Quantum Computing, Cloud Computing, Computer Networking, as well as non-scientist readers. Advanced-level and undergraduate students concentrating on computer science, engineering and mathematics will also find this book useful.

Computer Science and Artificial Intelligence

by Panel on Computer Science Artificial Intelligence

The National Academies Press (NAP)--publisher for the National Academies--publishes more than 200 books a year offering the most authoritative views, definitive information, and groundbreaking recommendations on a wide range of topics in science, engineering, and health. Our books are unique in that they are authored by the nation's leading experts in every scientific field.

Computer Science Illuminated (Fifth Edition)

by John Lewis Nell Dale

Revised and updated with the latest information in the field, the Fifth Edition of best-selling Computer Science Illuminated continues to provide students with an engaging breadth-first overview of computer science principles and provides a solid foundation for those continuing their study in this dynamic and exciting discipline. Authored by two of today's most respected computer science educators, Nell Dale and John Lewis, the text carefully unfolds the many layers of computing from a language-neutral perspective, beginning with the information layer, progressing through the hardware, programming, operating systems, application, and communication layers, and ending with a discussion on the limitations of computing. Separate program language chapters are available as bundle items for instructors who would like to explore a particular programming language with their students. Ideal for introductory computing and computer science courses, the fifth edition's thorough presentation of computing systems provides computer science majors with a solid foundation for further study, and offers non-majors a comprehensive and complete introduction to computing. New Features of the Fifth Edition:- A new chapter on computer security provides readers with the latest information on preventing unauthorized access; types of malware and anti-virus software; protecting online information, including data collection issues with Facebook, Google, etc. ; security issues with mobile and portable devices; and more. - A NEW section on cloud computing offers readers an overview of the latest way in which businesses and users interact with computers and mobile devices. - The section on social networks has been rewritten to include up-to-date information, including new data on Google+ and Facebook. - The sections covering HTML have been updated to include HTML5. - Revised and updated Did You Know callouts are included in the chapter margins. - The updated Ethical Issues at the end of each chapter have been revised to tie the content to the tenth strand recommended by the ACM, which stresses the importance of computer ethics. Accompanied by a comprehensive suite of instructor resources including answers to the end of chapter exercises, answers to the optional lab exercises, PowerPoint Lecture Outlines, Image Bank, and a complete Test Bank. Every new copy is packaged with full student access code to the robust Companion Website featuring:Animated Flashcards; Relevant Web Links; Crossword Puzzles; Interactive Glossary; Digital Lab Manual; R. Mark Meyer's labs, Explorations in Computer Science; Additional programming chapters, including Alice, C++, Java, JavaScript, Pascal, Perl, Python, Ruby, SQL, and VB. NET; C++ Language Essentials labs; Java Language Essentials labs; Link to Download Pep/8

Computer Science Made Simple

by V. Anton Spraul

Be smarter than your computer. If you don't understand computers, you can quickly be left behind in today's fast-paced, machine-dependent society. Computer Science Made Simple offers a straightforward resource for technology novices and advanced techies alike. It clarifies all you need to know, from the basic components of today's computers to using advanced applications. The perfect primer, it explains how it all comes together to make computers work. Topics covered include: * hardware* software* programming * networks * the internet * computer graphics * advanced computer concepts * computers in society.

Computer Science & Perl Programming

by O'Reilly Media

In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development. Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl. Here's a sample of what you'll find inside: Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memorization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl. Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl *for*. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.

Computer Science & Perl Programming

by Jon Orwant

In its first five years of existence, The Perl Journal ran 247 articles by over 120 authors. Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical topics such as regular expressions, databases, and object-oriented programming, and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. The magazine gave birth to both the Obfuscated Perl Contest and the Perl Poetry contest, and remains a proud and timeless achievement of Perl during one of its most exciting periods of development. Computer Science and Perl Programming is the first volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its 5 years of publication and immortalized them into three volumes. This volume has 70 articles devoted to hard-core computer science, advanced programming techniques, and the underlying mechanics of Perl. Here's a sample of what you'll find inside:Jeffrey Friedl on Understanding Regexes Mark Jason Dominus on optimizing your Perl programs with Memoization Damian Conway on Parsing Tim Meadowcroft on integrating Perl with Microsoft Office Larry Wall on the culture of Perl Written by 41 of the most prominent and prolific members of the closely-knit Perl community, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl. Other books tell you how to use Perl, but this book goes far beyond that: it shows you not only how to use Perl, but what you could use Perl for. This is more than just The Best of the Perl Journal -- in many ways, this is the best of Perl.

Computer Science Programming Basics in Ruby

by David Grossman Gideon Frieder Ophir Frieder

If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you'll quickly understand the difference between computer science and computer programming, and you'll learn how algorithms help you solve computing problems. Each chapter builds on material introduced earlier in the book, so you can master one core building block before moving on to the next. You'll explore fundamental topics such as loops, arrays, objects, and classes, using the easy-to-learn Ruby programming language. Then you'll put everything together in the last chapter by programming a simple game of tic-tac-toe. Learn how to write algorithms to solve real-world problems Understand the basics of computer architecture Examine the basic tools of a programming language Explore sequential, conditional, and loop programming structures Understand how the array data structure organizes storage Use searching techniques and comparison-based sorting algorithms Learn about objects, including how to build your own Discover how objects can be created from other objects Manipulate files and use their data in your software

Computer Science: Reflections on the Field, Reflections from the Field

by Opportunities Committee on the Fundamentals of Computer Science:Challenges

Computer Science: Reflections on the Field, Reflections from the Fieldprovides a concise characterization of key ideas that lie at the core of computer science (CS) research. The book offers a description of CS research recognizing the richness and diversity of the field. It brings together two dozen essays on diverse aspects of CS research, their motivation and results. By describing in accessible form computer science's intellectual character, and by conveying a sense of its vibrancy through a set of examples, the book aims to prepare readers for what the future might hold and help to inspire CS researchers in its creation.

Computer Science: A Structured Programming Approach Using C (2nd edition)

by Behrouz A. Forouzan Richard F. Gilberg

This textbook introduces the basic principles of programming as outlined in the ACM curriculum for a CS1 class, and the basic concepts of the C language. The second edition adds new exercises, projects and problems to the end of chapter material.

Computer Science: A Structured Programming Approach Using C (3rd edition)

by Behrouz A. Forouzan Richard F. Gilberg

The third edition of Computer Science: A Structured Programming Approach Using C continues to present both computer science theory and C-language syntax with a principle-before-implementation approach. Forouzan and Gilberg employ a clear organizational structure, supplemented by easy-to-follow figures, charts, and tables. The new edition has been thoroughly updated to reflect the new C99 standard, and includes a revised chapter sequence to better aid student learning.

Computer Security Basics, 2nd Edition

by Rick Lehtinen

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST

Computer Security Basics, 2nd Edition

by Rick Lehtinen G. T. Gangemi

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST

Computer Security Basics, 2nd Edition

by Rick Lehtinen G. T. Gangemi Sr.

<p>The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, <i>Computer Security Basics</i> 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. </p>

Computer Service and Repair: A Guide to Upgrading, Configuring, Troubleshooting, and Networking Personal Computers

by Richard M. Roberts

Teaches the practices and principles needed to pass the A+ Certification Exams, as well as to build, upgrade, and troubleshoot your PC.

Computer-Supported Collaborative Learning at the Workplace

by Volker Wulf Isa Jahnke Sean P. Goggins

This book is an edited volume of case studies exploring the uptake and use of computer supported collaborative learning in work settings. This book fills a significant gap in the literature. A number of existing works provide empirical research on collaborative work practices (Lave & Wenger, 1987; Davenport, 2005), the sharing of information at work (Brown & Duguid, 2000), and the development of communities of practice in workplace settings (Wenger, 1998). Others examine the munificent variation of information and communication technology use in the work place, including studies of informal social networks, formal information distribution and other socio-technical combinations found in work settings (Gibson & Cohen, 2003). Another significant thread of prior work is focused on computer supported collaborative learning, much of it investigating the application of computer support for learning in the context of traditional educational institutions, like public schools, private schools, colleges and tutoring organizations. Exciting new theories of how knowledge is constructed by groups (Stahl, 2006), how teachers contribute to collaborative learning (reference to another book in the series) and the application of socio-technical scripts for learning is explicated in book length works on CSCL. Book length empirical work on CSCW is widespread, and CSCL book length works are beginning to emerge with greater frequency. We distinguish CSCL at Work from prior books written under the aegis of training and development, or human resources more broadly. The book aims to fill a void between existing works in CSCW and CSCL, and will open with a chapter characterizing the emerging application of collaborative learning theories and practices to workplace learning. CSCL and CSCW research each make distinct and important contributions to the construction of collaborative workplace learning.

Computer System Design

by Wayne Luk Michael J. Flynn

The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optimize the cost, performance and other attributes to meet application requirements. This book provides a new treatment of computer system design, particularly for System-on-Chip (SOC), which addresses the issues mentioned above. It begins with a global introduction, from the high-level view to the lowest common denominator (the chip itself), then moves on to the three main building blocks of an SOC (processor, memory, and interconnect). Next is an overview of what makes SOC unique (its customization ability and the applications that drive it). The final chapter presents future challenges for system design and SOC possibilities.

The Computer Teacher From The Black Lagoon

by Mike Thaler Jared Lee

A boy contemplates all the horrible stories he has heard about the computer teacher, Miss Pluggins, and the ordeals she forces her students to endure.

The Computer User’s Survival Guide

by Joan Stigliani

<p>The bad news: You <i>can</i> be hurt by working at a computer. The good news: Many of the factors that pose a risk are within your control. This book looks squarely at all the factors that affect your health on the job, including positioning, equipment, work habits, lighting, stress, radiation, and general health.</p>

Computer Viruses For Dummies

by Peter H. Gregory

Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:Understand the risks and analyze your PC's current conditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it's already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and when you're surfing the NetWritten by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Computer Vision for Visual Effects

by Richard J. Radke

Modern blockbuster movies seamlessly introduce impossible characters and action into real-world settings using digital visual effects. These effects are made possible by research from the field of computer vision, the study of how to automatically understand images. Computer Vision for Visual Effects will educate students, engineers, and researchers about the fundamental computer vision principles and state-of-the-art algorithms used to create cutting-edge visual effects for movies and television. The author describes classical computer vision algorithms used on a regular basis in Hollywood (such as blue screen matting, structure from motion, optical flow, and feature tracking) and exciting recent developments that form the basis for future effects (such as natural image matting, multi-image compositing, image retargeting, and view synthesis). He also discusses the technologies behind motion capture and three-dimensional data acquisition. More than 200 original images demonstrating principles, algorithms, and results, along with in-depth interviews with Hollywood visual effects artists, tie the mathematical concepts to real-world filmmaking.

Computer Vision-Guided Virtual Craniofacial Surgery

by Ananda S. Chowdhury Suchendra M. Bhandarkar

This unique text/reference discusses in depth the two integral components of reconstructive surgery; fracture detection, and reconstruction from broken bone fragments. In addition to supporting its application-oriented viewpoint with detailed coverage of theoretical issues, the work incorporates useful algorithms and relevant concepts from both graph theory and statistics. Topics and features: presents practical solutions for virtual craniofacial reconstruction and computer-aided fracture detection; discusses issues of image registration, object reconstruction, combinatorial pattern matching, and detection of salient points and regions in an image; investigates the concepts of maximum-weight graph matching, maximum-cardinality minimum-weight matching for a bipartite graph, determination of minimum cut in a flow network, and construction of automorphs of a cycle graph; examines the techniques of Markov random fields, hierarchical Bayesian restoration, Gibbs sampling, and Bayesian inference.

Computer Vision: Models, Learning, and Inference

by Simon J. D. Prince

This modern treatment of computer vision focuses on learning and inference in probabilistic models as a unifying theme. It shows how to use training data to learn the relationships between the observed image data and the aspects of the world that we wish to estimate, such as the 3D structure or the object class, and how to exploit these relationships to make new inferences about the world from new image data. With minimal prerequisites, the book starts from the basics of probability and model fitting and works up to real examples that the reader can implement and modify to build useful vision systems. Primarily meant for advanced undergraduate and graduate students, the detailed methodological presentation will also be useful for practitioners of computer vision. * Covers cutting-edge techniques, including graph cuts, machine learning, and multiple view geometry. * A unified approach shows the common basis for solutions of important computer vision problems, such as camera calibration, face recognition, and object tracking. * More than 70 algorithms are described in sufficient detail to implement. * More than 350 full-color illustrations amplify the text. * The treatment is self-contained, including all of the background mathematics. * Additional resources at www. computervisionmodels. com.

Computer Vision Using Local Binary Patterns

by Guoying Zhao Matti Pietikäinen Timo Ahonen Abdenour Hadid

The recent emergence of Local Binary Patterns (LBP) has led to significant progress in applying texture methods to various computer vision problems and applications. The focus of this research has broadened from 2D textures to 3D textures and spatiotemporal (dynamic) textures. Also, where texture was once utilized for applications such as remote sensing, industrial inspection and biomedical image analysis, the introduction of LBP-based approaches have provided outstanding results in problems relating to face and activity analysis, with future scope for face and facial expression recognition, biometrics, visual surveillance and video analysis. Computer Vision Using Local Binary Patterns provides a detailed description of the LBP methods and their variants both in spatial and spatiotemporal domains. This comprehensive reference also provides an excellent overview as to how texture methods can be utilized for solving different kinds of computer vision and image analysis problems. Source codes of the basic LBP algorithms, demonstrations, some databases and a comprehensive LBP bibliography can be found from an accompanying web site. Topics include: local binary patterns and their variants in spatial and spatiotemporal domains, texture classification and segmentation, description of interest regions, applications in image retrieval and 3D recognition - Recognition and segmentation of dynamic textures, background subtraction, recognition of actions, face analysis using still images and image sequences, visual speech recognition and LBP in various applications. Written by pioneers of LBP, this book is an essential resource for researchers, professional engineers and graduate students in computer vision, image analysis and pattern recognition. The book will also be of interest to all those who work with specific applications of machine vision.

Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace

by Robert Dunne

Computers and the Law provides readers with an introduction to the legal issues associated with computing - particularly in the massively networked context of the Internet. Assuming no previous knowledge of the law or any special knowledge of programming or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and an awareness of the peculiarities associated with legal issues in cyberspace. This book introduces readers to the fundamental workings of the law in physical space and suggests the opportunity to create new types of laws with nontraditional goals.

Showing 1,776 through 1,800 of 10,895 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.