Search:

Keep your kids safe on the Internet / by Johnson, Simon(Simon A.)(CARDINAL)546766;
Includes bibliographical references and index."Safeguard your children against threats that lurk on the Internet, including pedophiles, cyber-stalkers ..."--Cover.
Subjects: Internet and children.; Computer network resources; Computer networks; Computer networks; Internet; Internet;
Available copies: 5 / Total copies: 5
unAPI

Principles of programming & coding / by Franceschetti, Donald R.,1947-editor.(CARDINAL)651222;
Includes bibliographical references and index3D printing -- Algorithms -- American Standard Code for Information -- Interchange (ASCII) -- Android OS -- Application -- Autonomic computing -- Avatars and simulation -- Binary hexadecimal representations -- Boolean operators -- Branching logic -- Characters and strings -- Cloud computing -- Coding and encryption -- Color coding -- Combinatorics -- Comment programming -- Comparison operators -- Computer animation -- Computer memory -- Computer modeling -- Computer security -- Computer-aided design (CAD) -- Computer-aided design and computer-aided manufacturing software (CAD/CAM) -- Computer-assisted instruction (CAI) -- Conditional operators -- Constraint programming -- Control systems -- Cowboy coding -- CPU design -- Crowdfunding -- Crowdsourcing -- Cryptography -- Data mining -- Data warehouse -- Database design -- Database structuring conventions -- Debugging -- Device drivers -- Diffusion of innovations -- Digital divide -- Digital forensics -- Digital libraries -- Digital native -- Digital photography -- Digital signal processors (DSP) -- Digital watermarking -- Disk operating system (DOS) -- Drone warfare -- Drones -- E-banking -- E-learning -- Electronic circuits -- Electronic communication software -- Encryption -- Error handling -- Event-driven marketing (EDM) -- Expectancy theory -- Experimenter's bias -- Extreme programming -- Firewalls -- Firmware -- Functional electrical stimulation (FES) -- Game programming -- Gamification -- Graphical user interface (GUI) -- Graphics formats -- Guard clause -- HTTP cookie -- Imagined communities -- Incremental development -- Informational technology (IT) -- Information visualization -- Internet Protocol (IP) -- Inversion of control (Hollywood Principle) -- iOS -- Iterative constructs -- Java programming language -- JavaScript -- Knowledge worker -- Levels of processing theory -- Logic synthesis -- Logistics -- Machine learning -- Malware -- Massive open online course (MOOC) -- Meta-analysis -- Metacomputing -- Metadata -- Microprocessors -- Mixed methods research (MMR) -- Mobile apps -- Mobile technology -- Motherboards -- Multiprocessing operating systems (OS) -- Multi-user operating system (OS) -- Naming conventions -- Net neutrality -- Network security -- Neuro-linguistic programming (NLP) -- Neuromarketing -- Neuromorphic chips -- Objectivity -- Object-oriented design (OOD) -- Object-oriented programming (OOP) -- Privacy rights -- Programming languages -- Prototyping -- Quantum computing -- Random access memory (RAM) -- Rapid application development (RAD) -- Rational choice theory -- Search engine optimization (SEO) -- Semantic memory -- Semantics -- Signal processing -- Source code comments -- Spiral development -- Standard deviation -- Standpoint theory -- Statistical inference -- String-oriented symbolic languages (SNOBOL) -- Structural equation modeling (SEM) -- Technology in education -- Test doubles -- Theory of multiple intelligences -- Theory X and Theory Y -- Transformation priority premise (TPP) -- Tree structures -- Turing test -- Uncertainty reduction theory (URT) -- Unicode -- UNIX -- Variables and values -- Waterfall development -- Web design -- Web graphic design -- Working memory -- Worse-is-better -- Time Line of Inventions and Advancements in Programming and CodingThis new volume makes sense of the jumble of techno-jargon and programming acronyms for high school and undergraduate students. More than 125 entries explain the fundamental concepts, popular languages, systems, and protocols that go into computer programming.
Subjects: Computer programming.; Coding theory.;
Available copies: 1 / Total copies: 1
unAPI

Firewall [videorecording] by Arkin, Alan.act(CARDINAL)348089; Bernstein, Armyan.prd; Bettany, Paul,1971-act(CARDINAL)357180; Ford, Harrison,1942-act(CARDINAL)740457; Forster, Robert,1942-act(CARDINAL)344922; Forte, Joe,1963-aus; Iwanyk, Basil.prd(CARDINAL)341234; Loncraine, Richard.drt(CARDINAL)845110; Madsen, Virginia,1963-act; Patrick, Robert,1958-act; Rajskub, Mary Lynn.act; Shestack, Jonathan.prd; Beacon Pictures.(CARDINAL)340295; Thunder Road Productions.(CARDINAL)813682; Village Roadshow Pictures.(CARDINAL)340620; Warner Bros. Pictures (1969- );
Director of photography, Marco Pontecorvo ; edited by, Jim Page ; music by, Alexandre Desplat ; costume designer, Shuna Harwood ; production designer, Brian Morris ; visual effects supervisor, Mark Breakspear.Harrison Ford, Paul Bettany, Virginia Madsen, Mary Lynn Rajskub, Robert Patrick, Robert Forster, Alan Arkin.Bank security expert Jack Stanfield specializes in designing infallible theft-proof financial computer systems. But there is a hidden vulnerability in the system he didn't account for - himself. When a ruthless criminal mastermind kidnaps his family, Jack is forced to find a flaw in his system and steal $100 million. With the lives of his wife and children at stake and under constant surveillance, he has only hours to find a loophole in the thief's own impenetrable system of subterfuge and false identities to beat him at his own game.MPAA rating: PG-13; for some intense sequences of violence and some language.DVD, region 1, widescreen (2.40:1) presentation; Dolby Digital 5.1 surround, DVD-9, dual-layer.
Subjects: Feature films.; Thrillers (Motion pictures, television, etc.); Video recordings for the hearing impaired.; Crime; Suspense films.; Thriller; Criminal behavior; Kidnapping; Security consultants; Security systems; Secuestro; Sistemas de seguridad; Security systems;
Available copies: 4 / Total copies: 8
unAPI

200+ ways to protect your privacy : simple ways to prevent hacks and protect your privacy--on and offline / by Rogers, Jeni,author.(CARDINAL)867725;
Includes bibliographical references and index.Protecting your offline privacy-at home, in public, and everywhere in between -- Protecting the privacy of your children (and teaching them to protect themselves) -- Strategies for protecting yourself and your private data on mobile devices -- Strategies and best practices for staying safe and protecting your privacy online -- How to enjoy social media while retaining your privacy -- Strategies for protecting yourself and your privacy in email, online classifieds, and online dating -- Despite your best intentions-recovering from a privacy breach."We all know that the Internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe--you can do it yourself with these 200+ easy-to-implement tactics, some of which include: shredding hard copies of bills; turning off Bluetooth when not in use; using a firewall; and more"--
Subjects: Handbooks and manuals.; Data protection; Computer security; Identity theft; Records; Privacy, Right of;
Available copies: 2 / Total copies: 2
unAPI

Protect, backup and clean your PC for seniors : stay safe when using the internet and email and keep your PC in good condition / by Visual Steps (Firm)(CARDINAL)605286;
Provides information about personal computer use, social networking, and computer viruses, as well as tips for backing up computer files and protecting privacy.
Subjects: Microcomputers; Computer security.; Computer viruses.; Microcomputers; Computers and older people.;
Available copies: 2 / Total copies: 2
unAPI

Linux administration : a beginners guide / by Soyinka, Wale.(CARDINAL)303937;
"Deploy and manage a Linux server quickly and easilyThoroughly revised to cover the most current Linux distributions and the latest Linux kernel release, Linux Administration: A Beginner's Guide, Sixth Edition shows new and inexperienced Linux system administrators how to set up and configure Linux. The sixth edition adds key updates about the latest Linux distributions and focuses on Fedora, openSUSE, and Ubuntu. The book adds coverage of newer technologies, including virtualization, infrastructure services, Windows and Linux integration, Linux routers and firewalls, LDAP, printing, and new hardware now supported by the updated Linux kernel.This trusted, bestselling beginner's guide continues its recipe and step-by-step approach to Linux system administration, including managing files and software, users and user rights, basic security, Internet and intranet services, and kernel customization. The book makes it easy for existing system administrators to quickly zero in on relevant sections of the book to solve or tackle real-world Linux administration issues.Linux Administration: A Beginner's Guide, Sixth Edition Covers the major distributions of Linux server for Fedora, openSUSE and Ubuntu, and the latest Linux kernel release Includes new chapters introducing Distributed File Systems--key for today's cloud computing/virtualization-centric world Contains a new chapter on the business case for Linux and the marketability of Linux administration skills Step-by-step coverage: Technical Summary of Linux Distributions and Windows Server 2008; Installing Linux in a Server Configuration; Installing Software; Single Host Administration; Managing Users; The Command Line; Booting and Shutting Down; File Systems; Core System Services; Compiling the Linux Kernel; Knobs and Dials: The /proc File System; Security and Networking; TCP/IP for System Administrators; Network Configuration; Configuring the Linux Firewall and Router; Local Security; Network Security; Configuring Internet Services; DNS; FTP; Web Servers; SMTP; POP and IMAP; SSH and Encryption; Virtualization; Configuring Intranet Services; Network File Systems (NFS); Distributed File Systems; Network Information Service (NIS); LDAP; Samba (SMB/CIFS); Printing; DHCP; Backups "--Provided by publisher."Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. Linux Administration: A Beginner's Guide, Sixth Edition provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice"--Provided by publisher.Technical summary of Linux distributions -- Installing Linux in a server configuration -- Managing software -- Managing users and groups -- The command line -- Booting and shutting down -- File systems -- Core system services -- The Linux kernel -- Knobs and dials : virtual file systems -- TCP/IP for system administrators -- Network configuration -- Linux firewall (Netfilter) -- Local security -- Network security -- DNS -- FTP -- Apache Web Server -- SMTP -- POP and IMAP -- The secure shell (SSH) -- Network file system (NFS) -- Samba -- Distributed file systems -- Network information service -- LDAP -- Printing -- DHCP -- Backups.
Subjects: Linux.; Operating systems (Computers);
Available copies: 1 / Total copies: 1
unAPI

Windows XP all-in-one desk reference for dummies / by Leonhard, Woody.(CARDINAL)325082;
Subjects: Microsoft Windows (Computer file); Operating systems (Computers);
Available copies: 1 / Total copies: 2
unAPI

Firewall : Tom Clancy's splinter cell / by Swallow, James,author.(CARDINAL)421516; Clancy, Tom,1947-2013.(CARDINAL)293728;
"Veteran Fourth Echelon agent Sam Fisher has a new mission recruiting and training the next generation of Splinter Cell operatives for the NSA's covert action division, including his daughter Sarah. But when a lethal assassin from Fisher's past returns from the dead on a mission of murder, father and daughter are thrust into a race against time as a sinister threat to global security is revealed. A dangerous cyberwarfare technology known as Gordian Sword - capable of crashing airliners, destroying computer networks and plunging entire cities into darkness - is being auctioned off to whichever rogue state makes the highest bid. Sam and Sarah must call on their very singular set of skills to neutralize Gordian Sword and stop the weapon falling into the wrong hands - at any cost..."--
Subjects: Novels.; Computer crimes; Intelligence officers; Terrorism;
Available copies: 2 / Total copies: 2
unAPI

Firewall [videorecording] / by Warner Home Video.; Arkin, Alan,actor.(CARDINAL)348089; Arkin, Alan.act.(CARDINAL)348089; Arkin, Alan.act(CARDINAL)348089; Bernstein, Armyan,production personnel.; Bernstein, Armyan.prd; Bernstein, Armyan.prd.; Bettany, Paul,1971-act.(CARDINAL)357180; Bettany, Paul,1971-act(CARDINAL)357180; Bettany, Paul,1971-actor.(CARDINAL)357180; Ford, Harrison,1942-act.(CARDINAL)740457; Ford, Harrison,1942-act(CARDINAL)740457; Ford, Harrison,1942-actor.(CARDINAL)740457; Forster, Robert,1942-act.(CARDINAL)344922; Forster, Robert,1942-act(CARDINAL)344922; Forster, Robert,1942-actor.(CARDINAL)344922; Forte, Joe,1963-aus; Forte, Joe,1963-aus.; Forte, Joe,1963-screenwriter.; Iwanyk, Basil,production personnel.(CARDINAL)341234; Iwanyk, Basil.prd.(CARDINAL)341234; Iwanyk, Basil.prd(CARDINAL)341234; Loncraine, Richard,director.(CARDINAL)845110; Loncraine, Richard.drt.(CARDINAL)845110; Loncraine, Richard.drt(CARDINAL)845110; Madsen, Virginia,1963-act; Madsen, Virginia,1963-act.; Madsen, Virginia,1963-actor.; Patrick, Robert,1958-act; Patrick, Robert,1958-act.; Patrick, Robert,1958-actor.; Rajskub, Mary Lynn,1971-; Rajskub, Mary Lynn,1971-act; Rajskub, Mary Lynn,actor.; Rajskub, Mary Lynn.act; Shestack, Jonathan,production personnel.; Shestack, Jonathan.prd; Shestack, Jonathan.prd.; Beacon Pictures.(CARDINAL)340295; Thunder Road Productions.(CARDINAL)813682; Village Roadshow Pictures.(CARDINAL)340620; Warner Bros. Pictures (1969- ); Warner Home Video (Firm)(CARDINAL)218485;
Director of photography, Marco Pontecorvo ; editor, Jim Page ; music, Alexandre Desplat ; costume designer, Shuna Harwood ; production designer, Brian Morris ; visual effects supervisor, Mark Breakspear.Harrison Ford, Paul Bettany, Virginia Madsen, Mary Lynn Rajskub, Robert Patrick, Carly Schroeder, Jimmy Bennett, Robert Forster, Alan Arkin.Bank security expert Jack Stanfield specializes in designing infallible theft-proof financial computer systems. But there is a hidden vulnerability in the system he didn't account for - himself. When a ruthless criminal mastermind kidnaps his family, Jack is forced to find a flaw in his system and steal $100 million. With the lives of his wife and children at stake and under constant surveillance, he has only hours to find a loophole in the thief's own impenetrable system of subterfuge and false identities to beat him at his own game.MPAA rating: PG-13; for some intense sequences of violence and some language.DVD; Dolby Digital 5.1 surround.
Subjects: DVD-Video discs.; DVDs for the hearing impaired.; Feature films.; Feature films; Thrillers (Motion pictures, television, etc.); Thrillers (Motion pictures); Video recordings for the hearing impaired.; Video recordings for the hearing impaired; Crime; Feature films.; Feature films.; Suspense films.; Suspense films.; Suspense films; Thriller; Thrillers (Motion pictures); Video recordings for the hearing impaired.; Closed captioning.; Criminal behavior; Feature films.; Films for the hearing impaired.; Kidnapping; Security consultants; Security systems; Secuestro; Secuestro; Sistemas de seguridad; Sistemas de seguridad; Security systems;
Available copies: 17 / Total copies: 19
unAPI

Web stalkers : protect yourself from Internet criminals & psychopaths. by Andert, Stephen.; Burleson, Donald K.(CARDINAL)378617;
Provides information on ways to protect one's anonymity and personal information on the Internet.
Subjects: Computer crimes; Computer security; Internet fraud; Internet;
Available copies: 1 / Total copies: 1
unAPI