Search:

Networking A to Z / by Muller, Nathan J.;
A reference guide to networking multiple computers including security, firewalls, wireless LANS, and more.10-A.
Subjects: Microsoft Windows (Computer file); Business networks.; Computer networks.;
Available copies: 1 / Total copies: 1
unAPI

Comptia® Security+® Study Guide : exam sy0-601 / by Chapple, Mike,author.(CARDINAL)866726; Seidl, David,author.(CARDINAL)866704;
Includes index.Chapter 1. Today's Security Professional -- Chapter 2. Cybersecurity Threat Landscape -- Chapter 3. Malicious Code -- Chapter 4. Social Engineering, Physical, and Password Attacks -- Chapter 5. Security Assessment and Testing -- Chapter 6. Secure Coding -- Chapter 7. Cryptography and the Public Key Infrastructure -- Chapter 8. Identity and Access Management -- Chapter 9. Resilience and Physical Security -- Chapter 10. Cloud and Virtualization Security -- Chapter 11. Endpoint Security -- Chapter 12. Network Security -- Chapter 13. Wireless and Mobile Security -- Chapter 14. Incident Response -- Chapter 15. Digital Forensics -- Chapter 16. Security Policies, Standards, and Compliance -- Chapter 17. Risk Management and Privacy -- Answers to Review Questions."The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam: Attacks, Threats, and Vulnerabilities, Architecture and Design, Implementation, Operations and Incident Response, Governance, Risk, and Compliance. The study guide comes with the Sybex online, interactive learning environment that includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms."--Amazon
Subjects: Study guides.; Computer networks; Computer networks; Computer security; Electronic data processing personnel.;
Available copies: 1 / Total copies: 2
unAPI

CISSP / by Miller, Lawrence C.,author.(CARDINAL)673543; Gregory, Peter H.,author.(CARDINAL)658381;
"Fully revised for the April 2024 CBK, this book is your key to succeeding on the CISSP exam. You'll learn everything you need to know about the popular ISC2 certification test, so you can head into test day with confidence. Get comfortable with each of the 8 test domains, prepare with a 60-day study plan, and work through practice questions that will help you master the material. You'll get tips and advice for passing this milestone in your cybersecurity career, plus digital flashcards and practice questions online."--Part 1 : Getting started with CISSP certification. ISC2 and the CISSP certification ; Putting your certification to good use -- Part 2 : Certification domains. Security and risk management ; Asset security ; Security architecture and engineering ; Communication and network security ; Identity and access management ; Security assessment and testing ; Security operations ; Software development security -- Part 3 : The part of tens. Ten ways to prepare for the exam ; Ten test-day tips.
Subjects: Study guides.; Electronic data processing personnel; Computer networks; Computer security;
Available copies: 3 / Total copies: 3
unAPI

E-profit : high payoff strategies for capturing the e-commerce edge / by Cohan, Peter S.,1957-(CARDINAL)642397;
Includes bibliographical references and index.
Subjects: Business enterprises; Electronic commerce.; Information technology; Internet marketing.; Internet.;
Available copies: 1 / Total copies: 1
unAPI

City of bits : space, place, and the infobahn / by Mitchell, William J.(William John),1944-2010.(CARDINAL)182795;
Includes bibliographical references (pages 175-208) and index.Pulling Glass -- Electronic Agoras -- Cyborg Citizens -- Recombinant Architecture -- Soft Cities -- Bit Biz -- Getting to the Good Bits -- Notes -- Surf Sites -- Acknowledgements -- Index.This is an introduction to a new type of city, a largely invisible but increasingly important system of virtual spaces interconnected by the emerging information superhighway. Practical examples and illustrations are used to examine architecture and urbanism in the context of digital telecommunications revolution, the ongoing miniaturisation of electronics, the comodification of bits, and the growing domination of software over materialized form.
Subjects: Computer networks.; Information technology.; Virtual reality.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Principles of robotics & artificial intelligence / by Renneboog, Richard,editor.(CARDINAL)891845;
Includes bibliographical references (pages 429-467) and index.Extreme Value Theorem -- F -- Facial Recognition Technology in Surveillance -- Fuzzy Logic -- G -- Game Theory -- Geoinformatics -- Go -- Grammatology -- Graphene -- Graphics Technologies -- H -- Holographic Technology -- Human-Computer Interaction (HCI) -- Hypertext Markup Language (HTML) -- I -- Integral -- Internet of Things (IoT) -- Interoperability -- K -- Kinematics -- L -- Language Model for Dialogue Applications (LaMDA) -- Limit of a Function -- Linear Programming -- Linux -- Local Area Network (LAN) -- M -- Machine Code -- Machine Learning -- Machine Translation -- Magnetic Storage -- Mechatronics -- Microcomputer -- Microprocessor -- Motion (Physics) -- Multitasking -- N -- Nanotechnology -- Network Interface Controller (NIC) -- Network Topology -- Neural Engineering -- Nouvelle Artificial Intelligence -- Numerical Analysis -- O -- Object-Oriented Programming (OOP) -- Optical Storage -- P -- Parallel Computing -- Pattern Recognition -- Photogrammetry -- Pneumatics -- Probability and Statistics -- Programming Languages for Artificial Intelligence -- Proportionality -- Public-Key Cryptography -- Python -- Q -- Quantum Computing -- R -- R -- Replication -- Robotic Arms -- Robotic Process Automation (RPA) -- Robotics -- Robotics and Robotic Systems -- Ruby -- S -- Scale Model -- Scratch -- Self-Management -- Semantic Web -- Sequence -- Series -- Set Notation -- Siri -- Smart City -- Smart Homes -- Smart Label -- Smartphone -- Soft Robotics -- Solar Cell -- Space Drone -- Space Robotics -- Speech Recognition -- Stem-and-Leaf Plots -- Structured Query Language (SQL) -- Stuxnet -- Supercomputer -- T Tablet Computer -- Turing Test -- U -- UNIX -- V -- Video Game Design and Programming -- Virtual Reality -- Z -- Z3 -- Zombie -- Bibliography -- Glossary -- Organizations -- Index.Table of Contents -- Publisher's Note -- Introduction -- Contributors -- A -- Abstraction -- Advanced Encryption Standard (AES) -- Agile Robotics -- Algorithmic Bias -- Algorithms -- Analysis of Variance (ANOVA) -- Application Programming Interface (API) -- Artificial Consciousness -- Artificial Intelligence (AI) -- Artificial Intelligence and Terrorism -- Artificial Intelligence Cold War -- Artificial Intelligence in Cognitive Psychology -- Artificial Intelligence in Education -- Artificial Intelligence and Robotics in Cinema -- Artificial Intelligence and Robotics in Gaming -- Artificial Intelligence and Robotics in Literature -- Augmented Reality (AR) -- Automated Processes and Servomechanisms -- Automatons, Mechanical Creatures, and Artificial Intelligence in Mythology -- Autonomous Car -- Avatars and Simulation -- B -- Behavioral Neuroscience -- Binary Pattern -- Biomechanical Engineering -- Biomechanics -- Biomimetics -- Bionics and Biomedical Engineering -- C -- C -- C++ -- Charles Babbage's Difference and Analytical Engines -- Chatbot -- ChatGPT (software) -- Client-Server Architecture -- CNC Milling -- Cognitive Science -- Combinatorics -- Computed Tomography -- Computer Engineering -- Computer Languages, Compilers, and Tools -- Computer Memory -- Computer Networks -- Computer Simulation -- Computer Software -- Computer Viruses and Worms -- Computer-Aided Design and Manufacturing (CAD/CAM) -- Computing Devices in History -- Continuous Random Variable -- Cryptography and Encryption -- Cybernetics -- Cybersecurity -- Cyberspace -- D -- The Dark Side of Artificial Intelligence -- Data Analytics (DA) -- Deep Learning -- Deep Reinforcement Learning (deep RL) -- Deepfake -- Digital Fraud -- Digital Logic -- DNA Computing -- Domain-Specific Language (DSL) -- E -- Evaluating Expressions -- Existential Risk from Artificial General Intelligence -- Expert System."This volume provides readers with the important information they need to understand the basic concepts of artificial intelligence as well as ways that both AI and robotics can be successfully incorporated into manufacturing, transportation, education, and medicine. This new edition has been updated and expanded to include the latest developments in artificial intelligence, including ChatGPT and other chatbots, machine learning, and open-source AI. The text also discusses the role AI and robotics play in popular culture and modern society, recent calls to regulate the artificial intelligence industry and how the industry is expected to evolve in the future. More than 120 easy-to-understand entries, many with illustrations and photographs, cover: Augmented Reality; Machine Learning; Knowledge Acquisition; Pattern Recognition; Self-Management; Virtual Reality. These entries cover many important aspects of AI and robotics, including basic principles of robotic motion and engineering, neural engineering and human-computer interaction, programming languages and operating systems, and the mathematics that govern computation. The role of robotics and AI in war, fraud, and terrorism is also examined, as well as how these fields are portrayed in popular culture, which ultimately reflects how we perceive the line between human and machine. Entries begin by specifying related Fields of Study, followed by an Abstract and then a list of Key Concepts summarizing important points; all entries end with a helpful Further Reading section." -From publisher.
Subjects: Reference works.; Robotics.; Artificial intelligence.;
Available copies: 3 / Total copies: 3
unAPI

CCSP / by Deane, Arthur J.,author.(CARDINAL)850984;
Introduction -- Part 1: Starting your CCSP journey. Familiarizing yourself with (ISC)² and the CCSP Certification -- Identifying information security fundamentals -- Part 2: Exploring the CCSP Certification domains. Domain 1: Cloud concepts, architecture, and design, part 1 -- Domain 1: Cloud concepts, architecture, and design, part 2 -- Domain 2: Cloud data security, part 1 -- Domain 2: Cloud data security, part 2 -- Domain 3: Cloud platform and infrastructure security, part 1 -- Domain 3: Cloud platform and infrastructure security, part 2 -- Domain 4: Cloud application security, part 1 -- Domain 4: Cloud application security, part 2 -- Domain 5: Cloud security operation, part 1 -- Domain 5: Cloud security operation, part 2 -- Domain 6: Legal, risk, and compliance, part 1 -- Domain 6: Legal, risk, and compliance, part 2 -- Part 3: The part of tens. Ten (or so) tips to help you prepare for the CCSP exam -- Ten keys to success on exam day -- Part 4: Appendixes. Glossary -- Helpful resources."CCSP certification is one of the most sought-after credentials in IT security. It's also tough to achieve. This trusted resource gives you detailed, easy-to-follow explanations of each of the six knowledge domains you'll encounter on the CCSP exam. In classic Dummies fashion, this book is chock full of tips and hacks for succeeding on the exam. Plus, you'll get two practice tests and 100+ flashcards online, so you can sail through test day"--
Subjects: Examinations.; Study guides.; Cloud computing; Computer networks; Computer security; Electronic data processing personnel;
Available copies: 3 / Total copies: 3
unAPI

Digital literacy : skills & strategies / by Nicosia, Laura M.,editor.; Nicosia, James F.,editor.(CARDINAL)863220;
Includes bibliographical references (pages 669-730) and index.3D Printing -- Access to Communication Technology -- Algorithms -- Anchored Instruction -- Android OS -- Anonymity and Anonymizers -- Apple -- Apps/Applications -- Artificial Intelligence -- Assessing Digital Literacy -- Assistive and Adaptive Technology -- Assistive Technology in Education -- Audio Streaming -- Augmented Reality -- Avatars and Simulation -- Bandcamp -- Binary Hexadecimal Representations -- Blended Learning -- Bloom's Taxonomy -- Bots -- Boyd, Danah Michele -- Brain-Computer Interfacing (BCI) -- Browsers -- Catfishing -- Children's Online Privacy Protection Act -- Clickbait -- Cloud Computing -- Coding in the Curriculum -- Collaborative Software (Groupware) -- Community of Practice -- Computer Addiction -- Computer-Aided Design -- Computer-Aided Design in Education -- Computer-Assisted Instruction -- Computer Ethics -- Computer Fraud -- Computer Fraud and Abuse Act -- Computer Viruses and Worms -- Constructivism -- Creative Commons -- Cyberbullying -- Cybercrime -- The Cyber Intelligence Sharing and Protection Act -- Cyber Monday -- Cybersecurity -- Cyberstalking -- Cyberterrorism -- Dark Web -- Data Harvesting -- Data Literacy -- Data Management -- Data Protection -- Deepfake -- Desktop and E-publishing -- Digital Citizenship -- Digital Divide -- Digital Economy -- Digital Footprint -- Digital Forensics -- Digital Libraries and Artifacts -- Digital Natives and Digital Immigrants -- Digitial Storytelling -- Discord -- Doxing -- DVDs -- E-books and Education -- Encrypton -- Ethics of algorithms -- Ethics of Social Media: Free Speech -- Facebook -- File Transfer Protocol -- Firewalls -- Firmware -- Freedom of Information Act -- Game-Based Learning -- Gee, James Paul -- Gmail -- Google -- Google Slides -- Graphical User Interface -- Graphics Formats -- Graphics Technologies -- Green Computing -- Hacking -- Holographic Technology -- HTML -- Human-Computer Interaction -- Hypermedia in Education -- Identity Theft -- Image Editing -- IMGUR -- Information Ethics -- Information Technology -- Instagram -- Instructional Design -- Intellectual Property -- Intelligent Tutoring Systems -- Internet Privacy -- Internet Safety -- Intranet -- iOS -- iPads in the Classroom - iTunes -- Jenkins, Henry -- Keynote -- Light-Emitting Diodes -- LinkedIn -- Liquid Crystal Technology -- Mac OS -- Malware -- Media Literacy -- Microscale 3D Printing -- Microsoft Excel -- Microsoft PowerPoint -- Microsoft Word -- Mobile Operating Systems -- Music Editing -- Myspace -- Online Anonymity -- Online Communication -- Online Entertainment and Music Databases -- Online Games: Roles, Rules, and Etiquette -- Online Privacy -- Online Safety -- Open Source -- Optical Storage -- Peer-to-Peer Payment Apps -- Phishing -- Privacy Settings -- QR Codes -- Random-Access Memory -- Ransomware -- Reddit -- Scientific Literacy -- Search Engines -- Sexting -- Snapchat -- Social Impacts of Cybercrime -- Social Media -- Social Media Addiction -- Social Media and Depression -- Social Media and Isolation -- Social Media and Job Hunting -- Social Media and Law Enforcement -- Social Media and Religion -- Social Media and the Self-Esteem of Its Users -- Social Media as a Teaching and Learning Tool -- Social Media Mining -- Social Networking Services -- Software Architecture -- Spam -- Spam Filters -- Speech-Recognition Software -- Spotify -- Spyware -- Technical Drawing -- Technoethics and Society -- Telecommunications -- TikTok -- Touch Screens -- Transmedia Storytelling -- Tumblr -- Turkle, Sherry -- Twitch -- Twitter -- Universal Design for Learning -- UNIX -- Virtual Reality -- Wearable Technology -- Web 2.0 in the Schools -- Wikipedia -- Windows Operating System -- XML (Extensible Markup Language) -- YouTubeAims to introduce users to explanations of cutting-edge, as well as everyday, technology, explaining these technologies and their primary elements through clear prose informed by expert analysis.
Subjects: Reference works.; Computer literacy.; Digital media.; Information technology.;
Available copies: 3 / Total copies: 3
unAPI

97 things every cloud engineer should know : collective wisdom from the experts / by Freeman, Emily,editor.(CARDINAL)816442; Harvey, Nathen,editor.;
Provides valuable insights from professionals from around the world into today's cloud engineering role that explore the entire cloud computing experience, covering such topics as fundamentals, architecture, migration, security and compliance, operationsand reliability, software development, networking, and organizational culture.
Subjects: Cloud computing.; Web services.; Electronic data processing;
Available copies: 1 / Total copies: 1
unAPI

Resumes that knock 'em dead / by Yate, Martin John.(CARDINAL)184035;
Includes bibliographical references (pages 285-290) and index.
Subjects: Résumés (Employment);
Available copies: 3 / Total copies: 5
unAPI