Search:

The four [sound recording] / by Galloway, Scott,1964-author.(CARDINAL)349015; Ross, Jonathan Todd,narrator.(CARDINAL)561707;
Read by Jonathan Todd Ross.Through analysis that's both rigorous and entertaining, Galloway outlines the path for the next trillion dollar company, the Fifth Horseman, and points to which companies are in the running. Uber for example or, less obvious, Microsoft and Starbucks. As with Peter Thiel's Zero to One; listeners will come away with fresh, game changing insights about what it takes to win in today's economy.
Subjects: Audiobooks.; Google.; Apple Computer, Inc.; Facebook (Firm); Amazon.com (Firm); Information services industry.; Strategic planning.; Consumer behavior.;
Available copies: 1 / Total copies: 1
unAPI

The smartphone society : technology, power, and resistance in the new gilded age / by Aschoff, Nicole Marie,1980-author.(CARDINAL)825572;
Includes bibliographical references and index.New Divides (Or, Old Divides Made New) -- New Titans -- New Frontier -- New Politics -- New Spirit -- New Map."The smartphone is the defining commodity of the twenty-first century, pitting ordinary peoples' desire for entertainment, connection, and justice against government and corporate drives for control and profit"--
Subjects: Smartphones; Online social networks; Cell phone services industry; Mobile computing;
Available copies: 5 / Total copies: 6
unAPI

Software development industry study / by Wilson, Lisa H.; University of North Carolina (System)(CARDINAL)155723; Small Business and Technology Development Center.;
Subjects: Computer software industry; Computer software;
Available copies: 2 / Total copies: 3
On-line resources: Suggest title for digitization;
unAPI

Great jobs for computer science majors / by Goldberg, Jan.(CARDINAL)384020; Rowh, Mark.(CARDINAL)753443;
Subjects: Computer industry; Computer industry; Computer science; Computer science;
Available copies: 1 / Total copies: 3
unAPI

Careers in writing & editing.
Includes biliographical references and index.Publisher's Note -- Introduction -- Working in a Gig Economy -- Industry profiles: Advertising and Marketing Industry -- Higher Education Industry -- Internet and Cyber Communications Industry -- Legal Services and Law Firms -- Libraries and Archives Industry -- Motion Picture and Television Industry -- Museums and Cultural Institutions Industry -- Music Industry -- Philanthropic, Charitable, Religious, Civic, and Grant-Making Industry -- Public Elementary and Secondary Education Industry -- Publishing and Information Industry -- Theater and Performing Arts Industry -- Video, Computer, and Virtual Reality Games Industry -- Career Profiles: Advertising, Promotions, and Marketing Managers -- Archivists, Curators, and Museum Workers -- Clergy -- Copywriters -- Court Reporters -- Dancers and Choreographers -- Editors -- Film and Video Editors and Camera Operators -- Grant Writers -- Graphic Designers -- Historians -- Interpreters and Translators -- Journalists -- Judges and Hearing Officers -- Lawyers -- Librarians -- Multimedia Artists and Animators -- Music Directors and Composers -- Paralegal and Legal Assistants -- Postsecondary Teachers -- Producers and Directors -- Public Relations Specialists -- Radio and Television Broadcasters -- Social Media Specialists -- Software Developers -- Technical Writers -- Writers and Editors -- Appendix A: Holland Code -- Appendix B: General Bibliography -- Appendix C: Web Resources -- Index.
Subjects: Authorship; Editing; Computer programming;
Available copies: 1 / Total copies: 1
unAPI

Careers in focus.
Agricultural equipment technicians -- Automobile service technicians -- Avionics technicians -- Chemical technicians -- Computer and office machine service technicians -- Electronics engineering technicians -- Fiber optics technicians -- Fluid power technicians -- Industrial engineering technicians -- Instrumentation technicians -- Laser technicians -- Mechanical engineering technicians -- Microelectronics technicians -- Optics technicians -- Packaging machinery technicians -- Radiation protection technicians -- Robotics technicians -- Semiconductor technicians -- Surveying and mapping technicians -- Welding Technicians.
Subjects: Young adult literature.; Young adult literature.; Industrial technicians; Technology;
Available copies: 1 / Total copies: 1
unAPI

Catalogue of computer-searchable information resources / by North Carolina Science and Technology Research Center.(CARDINAL)135649;
Subjects: North Carolina Science and Technology Research Center; Current awareness services; Information services;
Available copies: 1 / Total copies: 2
On-line resources: Suggest title for digitization;
unAPI

Should we automate now? : or, Evaluation of computer-integrated manufacturing systems : an applications manual with handy forms / by Canada, John R.(CARDINAL)145467; Edwards, Robert L.(CARDINAL)182912; North Carolina State University.Industrial Extension Service.(CARDINAL)166142;
Subjects: CAD/CAM systems.; Production management;
Available copies: 1 / Total copies: 3
On-line resources: Suggest title for digitization;
unAPI

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
Available copies: 2 / Total copies: 2
unAPI

Broadband : business services, technologies, and strategic impact / by Wright, David,1947-(CARDINAL)377972;
Includes bibliographical references and index.
Subjects: Computer networks.; Broadband communication systems.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI