- Table View
- List View
If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you'll quickly understand the difference between computer science and computer programming, and you'll learn how algorithms help you solve computing problems. Each chapter builds on material introduced earlier in the book, so you can master one core building block before moving on to the next. You'll explore fundamental topics such as loops, arrays, objects, and classes, using the easy-to-learn Ruby programming language. Then you'll put everything together in the last chapter by programming a simple game of tic-tac-toe. Learn how to write algorithms to solve real-world problems Understand the basics of computer architecture Examine the basic tools of a programming language Explore sequential, conditional, and loop programming structures Understand how the array data structure organizes storage Use searching techniques and comparison-based sorting algorithms Learn about objects, including how to build your own Discover how objects can be created from other objects Manipulate files and use their data in your software
Computer Science: Reflections on the Field, Reflections from the Fieldprovides a concise characterization of key ideas that lie at the core of computer science (CS) research. The book offers a description of CS research recognizing the richness and diversity of the field. It brings together two dozen essays on diverse aspects of CS research, their motivation and results. By describing in accessible form computer science's intellectual character, and by conveying a sense of its vibrancy through a set of examples, the book aims to prepare readers for what the future might hold and help to inspire CS researchers in its creation.
This textbook introduces the basic principles of programming as outlined in the ACM curriculum for a CS1 class, and the basic concepts of the C language. The second edition adds new exercises, projects and problems to the end of chapter material.
The third edition of Computer Science: A Structured Programming Approach Using C continues to present both computer science theory and C-language syntax with a principle-before-implementation approach. Forouzan and Gilberg employ a clear organizational structure, supplemented by easy-to-follow figures, charts, and tables. The new edition has been thoroughly updated to reflect the new C99 standard, and includes a revised chapter sequence to better aid student learning.
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optimize the cost, performance and other attributes to meet application requirements. This book provides a new treatment of computer system design, particularly for System-on-Chip (SOC), which addresses the issues mentioned above. It begins with a global introduction, from the high-level view to the lowest common denominator (the chip itself), then moves on to the three main building blocks of an SOC (processor, memory, and interconnect). Next is an overview of what makes SOC unique (its customization ability and the applications that drive it). The final chapter presents future challenges for system design and SOC possibilities.
<p>The bad news: You <i>can</i> be hurt by working at a computer. The good news: Many of the factors that pose a risk are within your control. This book looks squarely at all the factors that affect your health on the job, including positioning, equipment, work habits, lighting, stress, radiation, and general health.</p>
This unique text/reference discusses in depth the two integral components of reconstructive surgery; fracture detection, and reconstruction from broken bone fragments. In addition to supporting its application-oriented viewpoint with detailed coverage of theoretical issues, the work incorporates useful algorithms and relevant concepts from both graph theory and statistics. Topics and features: presents practical solutions for virtual craniofacial reconstruction and computer-aided fracture detection; discusses issues of image registration, object reconstruction, combinatorial pattern matching, and detection of salient points and regions in an image; investigates the concepts of maximum-weight graph matching, maximum-cardinality minimum-weight matching for a bipartite graph, determination of minimum cut in a flow network, and construction of automorphs of a cycle graph; examines the techniques of Markov random fields, hierarchical Bayesian restoration, Gibbs sampling, and Bayesian inference.
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspaceby Robert Dunne
Computers and the Law provides readers with an introduction to the legal issues associated with computing - particularly in the massively networked context of the Internet. Assuming no previous knowledge of the law or any special knowledge of programming or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and an awareness of the peculiarities associated with legal issues in cyberspace. This book introduces readers to the fundamental workings of the law in physical space and suggests the opportunity to create new types of laws with nontraditional goals.
The bestselling guide to choosing a computer and getting online, fully updated for Windows 8! Whether you use your computer for bookkeeping, making travel plans, socializing, shopping, or just plain fun, computers are now an essential part of daily life. But it can be overwhelming to keep up with the technology as it continually evolves. This clear, friendly guide not only gets you up to speed on computer basics, it also covers the very latest information, like the changes you?ll see with Windows 8. You'll learn to use the keyboard and mouse, navigate the Windows 8 operating system, access the Internet, create documents, keep safe online, and more. Packed with screenshots and illustrations, the new edition of this popular book is easy to follow, never intimidating, and always helpful. Starts with the basics and assumes no prior knowledge of computers Updates your current skills for the latest technology changes, such as the Windows 8 operating system Explains how to connect to the Internet, keep up with family and friends via e-mail and social media, find recipes and health information, book travel, manage your budget, and much more Shows you how to organize documents, work with files and folders, manage pictures and videos, and customize your desktop and system Offers tips and advice to help you avoid common pitfalls Take on technology with confidence and take advantage of all your computer can do with Computers for Seniors For Dummies, 3rd Edition!
Explains the different parts of a computer and how they work.
This booklet guides a scout through many aspects of computers. It includes historical info, technical info, and usage info. It is intended to be used for a scout to obtain his computer meritbadge.
The depiction of computers on the various "Star Trek" series has ranged from lame to breathtakingly imaginative. This book covers the gamut, and makes lucid and entertaining comparison of these fictional computers with those that now exist or are likely to inhabit our future. Throughout its history, "Star Trek" has been an accurate reflection of contemporary ideas about computers and their role in our lives. Affectionately but without illusions, The Computers of Star Trek shows how those ideas compare with what we now know we can and will do with computers.
The book introduces students to the key information technology concepts and the vital technical skills that can help improve their personal and professional lives. Studying this book will help prepare students for the workplace of today--and tomorrow--in which some level of computer skills is often an essential requirement for employment.
The history of computing could be told as the story of hardware and software, or the story of the Internet, or the story of "smart" hand-held devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development: digitization--the coding of information, computation, and control in binary form, ones and zeros; the convergence of multiple streams of techniques, devices, and machines, yielding more than the sum of their parts; the steady advance of electronic technology, as characterized famously by "Moore's Law"; and the human-machine interface. Ceruzzi guides us through computing history, telling how a Bell Labs mathematician coined the word "digital" in 1942 (to describe a high-speed method of calculating used in anti-aircraft devices), and recounting the development of the punch card (for use in the 1890 U. S. Census). He describes the ENIAC, built for scientific and military applications; the UNIVAC, the first general purpose computer; and ARPANET, the Internet's precursor. Ceruzzi's account traces the world-changing evolution of the computer from a room-size ensemble of machinery to a "minicomputer" to a desktop computer to a pocket-sized smart phone. He describes the development of the silicon chip, which could store ever-increasing amounts of data and enabled ever-decreasing device size. He visits that hotbed of innovation, Silicon Valley, and brings the story up to the present with the Internet, the World Wide Web, and social networking.
Computing Essentials 2013 allows you to Make IT Work for You through relevant Explorations, Ethics and Environment themes throughout each chapter.
Computing is revolutionizing the practice of biology. This book, which assumes no prior computing experience, provides students with the tools to write their own Python programs and to understand fundamental concepts in computational biology and bioinformatics. Each major part of the book begins with a compelling biological question, followed by the algorithmic ideas and programming tools necessary to explore it: the origins of pathogenicity are examined using gene finding, the evolutionary history of sex determination systems is studied using sequence alignment, and the origin of modern humans is addressed using phylogenetic methods. In addition to providing general programming skills, this book explores the design of efficient algorithms, simulation, NP-hardness, and the maximum likelihood method, among other key concepts and methods. Easy-to-read and designed to equip students with the skills to write programs for solving a range of biological problems, the book is accompanied by numerous programming exercises, available at www. cs. hmc. edu/CFB.
Computers now impact almost every aspect of our lives, from our social interactions to the safety and performance of our cars. How did this happen in such a short time? And this is just the beginning. . . . In this book, Tony Hey and Gyuri Pápay lead us on a journey from the early days of computers in the 1930s to the cutting-edge research of the present day that will shape computing in the coming decades. Along the way, they explain the ideas behind hardware, software, algorithms, Moore's Law, the birth of the personal computer, the Internet and the Web, the Turing Test, Jeopardy's Watson, World of Warcraft, spyware, Google, Facebook, and quantum computing. This book also introduces the fascinating cast of dreamers and inventors who brought these great technological developments into every corner of the modern world. This exciting and accessible introduction will open up the universe of computing to anyone who has ever wondered where his or her smartphone came from.
Computing with Windows® 7 for the Older & Wiser is a user friendly guide that takes you step-by-step through the basics of using a computer. Written in an easy-to-understand, jargon free language, it is aimed at complete beginners using PCs running on Microsoft Windows® 7. Inside, you will find step-by-step guidance on:Using the keyboard & the mouseNavigating files and foldersCustomising your desktopUsing Email and the InternetWord processingOrganising your digital photosSafely downloading files from the InternetFinding useful websites and much more
Trapped at a desk job, Charlie Muffin uncovers a deadly KGB plotCharlie Muffin is too good an agent to be working a desk, but after a bust-up with his new director, he has been relegated to clerk work. Among the heaps of papers, though, Charlie stumbles upon the clues to a last-gasp plot from the collapsing Soviet Union. The signs point to a new Soviet Star Wars system--and to the involvement of a British traitor. Or do they? After all, the KGB wants one more chance to eliminate their old adversary Charlie. When the agency discovers his involvement, it sets a nasty trap. As the Soviet regime crumbles, it could take Charlie down with it. This ebook features an illustrated biography of Brian Freemantle including rare photos from the author's personal collection.
This is the story of a man who killed more than 50 people in Russia between 1978 and 1990.
In old Japan, sexual love among the samurai was permissible, and often matured into lifelong companionships. Comrade Loves of the Samurai touches the subject of both normal and abnormal love with honesty and tenderness.
In 1986, Harrold accepted a job as the language adviser for English translations of speeches by Kim Il Sung, causing him to become the first Briton to live in North Korea. In this memoir of his seven-year sojourn, he describes his experiences meeting North Koreans from high state officials to farmers working in paddy fields. Even though he eventually got into trouble with state authorities, he still defended the country against the threat of US aggression. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)
It was just a godforsaken mountainside, but no place on earth was richer in silver. For a bustling, enterprising America, this was the great bonanza. The dreamers, the restless, the builders, the vultures--they were lured by the glittering promise of instant riches and survived the brutal hardships of a mining camp to raise a legendary boom town. But some sought more than wealth. Val Trevallion, a loner haunted by a violent past. Grita Redaway, a radiantly beautiful actress driven by an unfulfilled need. Two fiercely independent spirits, together they rose above the challenges of the Comstock to stake a bold claim on the future.From the Paperback edition.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.