Search:

The E-commerce question and answer book : a survival guide for business managers / by Rosen, Anita.(CARDINAL)639838;
Subjects: Electronic commerce.; Commerce électronique.;
Available copies: 1 / Total copies: 1
unAPI

Sweetbitter [sound recording] : a novel / by Danler, Stephanie.(CARDINAL)412178; McKenna, Alex,1984-(CARDINAL)349231;
Read by Alex McKenna.Tess comes to New York in the stifling summer of 2006. Knowing no one, living in a rented room in Williamsburg, she manages to land a job as a "backwaiter" at a celebrated downtown Manhattan restaurant. This begins the year we spend with Tess as she starts to navigate the chaotic, enchanting, punishing, and privileged life she has chosen, as well as the remorseless and luminous city around her. What follows is her education in many things - oysters, Champagne, the appellations of Burgundy, friendship, cocaine, lust, love, and dive bars. As her appetites awaken - for food and wine, but also for knowledge, experience, and belonging - we see her helplessly drawn into a darkly alluring love triangle. With an orphan's ardor she latches onto Simone, a senior server at the restaurant who has lived in ways Tess only dreams of, and against the warnings of coworkers she falls under the spell of Jake, the elusive, tatted up, achingly beautiful bartender. These two and their enigmatic connection to each other will prove to be Tess's most exhilarating and painful lesson of all.
Subjects: Audiobooks.; Sound recordings.; Fiction.; Young women; Self-realization in women;
Available copies: 3 / Total copies: 3
unAPI

Java and XML / by McLaughlin, Brett.(CARDINAL)702146;
Subjects: Java (Computer program language); XML (Document markup language);
Available copies: 1 / Total copies: 1
unAPI

Managing information technology : a handbook for systems librarians / by Ingersoll, Patricia.(CARDINAL)280881; Culshaw, John,1964-(CARDINAL)281214;
Includes bibliographical references (pages 183-192) and index.
Subjects: Handbooks and manuals.; Academic libraries; Systems librarians; Academic libraries; Academic libraries;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Degunking your email, spam, and viruses / by Duntemann, Jeff.(CARDINAL)181030;
Subjects: Handbooks and manuals.; Computer security; Computer viruses; Spam (Electronic mail);
Available copies: 3 / Total copies: 4
unAPI

Resumes that knock 'em dead / by Yate, Martin John.(CARDINAL)184035;
Includes bibliographical references (pages 285-290) and index.
Subjects: Résumés (Employment);
Available copies: 3 / Total copies: 4
unAPI

Principles of robotics & artificial intelligence / by Renneboog, Richard,editor.(CARDINAL)891845;
Includes bibliographical references (pages 429-467) and index.Extreme Value Theorem -- F -- Facial Recognition Technology in Surveillance -- Fuzzy Logic -- G -- Game Theory -- Geoinformatics -- Go -- Grammatology -- Graphene -- Graphics Technologies -- H -- Holographic Technology -- Human-Computer Interaction (HCI) -- Hypertext Markup Language (HTML) -- I -- Integral -- Internet of Things (IoT) -- Interoperability -- K -- Kinematics -- L -- Language Model for Dialogue Applications (LaMDA) -- Limit of a Function -- Linear Programming -- Linux -- Local Area Network (LAN) -- M -- Machine Code -- Machine Learning -- Machine Translation -- Magnetic Storage -- Mechatronics -- Microcomputer -- Microprocessor -- Motion (Physics) -- Multitasking -- N -- Nanotechnology -- Network Interface Controller (NIC) -- Network Topology -- Neural Engineering -- Nouvelle Artificial Intelligence -- Numerical Analysis -- O -- Object-Oriented Programming (OOP) -- Optical Storage -- P -- Parallel Computing -- Pattern Recognition -- Photogrammetry -- Pneumatics -- Probability and Statistics -- Programming Languages for Artificial Intelligence -- Proportionality -- Public-Key Cryptography -- Python -- Q -- Quantum Computing -- R -- R -- Replication -- Robotic Arms -- Robotic Process Automation (RPA) -- Robotics -- Robotics and Robotic Systems -- Ruby -- S -- Scale Model -- Scratch -- Self-Management -- Semantic Web -- Sequence -- Series -- Set Notation -- Siri -- Smart City -- Smart Homes -- Smart Label -- Smartphone -- Soft Robotics -- Solar Cell -- Space Drone -- Space Robotics -- Speech Recognition -- Stem-and-Leaf Plots -- Structured Query Language (SQL) -- Stuxnet -- Supercomputer -- T Tablet Computer -- Turing Test -- U -- UNIX -- V -- Video Game Design and Programming -- Virtual Reality -- Z -- Z3 -- Zombie -- Bibliography -- Glossary -- Organizations -- Index.Table of Contents -- Publisher's Note -- Introduction -- Contributors -- A -- Abstraction -- Advanced Encryption Standard (AES) -- Agile Robotics -- Algorithmic Bias -- Algorithms -- Analysis of Variance (ANOVA) -- Application Programming Interface (API) -- Artificial Consciousness -- Artificial Intelligence (AI) -- Artificial Intelligence and Terrorism -- Artificial Intelligence Cold War -- Artificial Intelligence in Cognitive Psychology -- Artificial Intelligence in Education -- Artificial Intelligence and Robotics in Cinema -- Artificial Intelligence and Robotics in Gaming -- Artificial Intelligence and Robotics in Literature -- Augmented Reality (AR) -- Automated Processes and Servomechanisms -- Automatons, Mechanical Creatures, and Artificial Intelligence in Mythology -- Autonomous Car -- Avatars and Simulation -- B -- Behavioral Neuroscience -- Binary Pattern -- Biomechanical Engineering -- Biomechanics -- Biomimetics -- Bionics and Biomedical Engineering -- C -- C -- C++ -- Charles Babbage's Difference and Analytical Engines -- Chatbot -- ChatGPT (software) -- Client-Server Architecture -- CNC Milling -- Cognitive Science -- Combinatorics -- Computed Tomography -- Computer Engineering -- Computer Languages, Compilers, and Tools -- Computer Memory -- Computer Networks -- Computer Simulation -- Computer Software -- Computer Viruses and Worms -- Computer-Aided Design and Manufacturing (CAD/CAM) -- Computing Devices in History -- Continuous Random Variable -- Cryptography and Encryption -- Cybernetics -- Cybersecurity -- Cyberspace -- D -- The Dark Side of Artificial Intelligence -- Data Analytics (DA) -- Deep Learning -- Deep Reinforcement Learning (deep RL) -- Deepfake -- Digital Fraud -- Digital Logic -- DNA Computing -- Domain-Specific Language (DSL) -- E -- Evaluating Expressions -- Existential Risk from Artificial General Intelligence -- Expert System."This volume provides readers with the important information they need to understand the basic concepts of artificial intelligence as well as ways that both AI and robotics can be successfully incorporated into manufacturing, transportation, education, and medicine. This new edition has been updated and expanded to include the latest developments in artificial intelligence, including ChatGPT and other chatbots, machine learning, and open-source AI. The text also discusses the role AI and robotics play in popular culture and modern society, recent calls to regulate the artificial intelligence industry and how the industry is expected to evolve in the future. More than 120 easy-to-understand entries, many with illustrations and photographs, cover: Augmented Reality; Machine Learning; Knowledge Acquisition; Pattern Recognition; Self-Management; Virtual Reality. These entries cover many important aspects of AI and robotics, including basic principles of robotic motion and engineering, neural engineering and human-computer interaction, programming languages and operating systems, and the mathematics that govern computation. The role of robotics and AI in war, fraud, and terrorism is also examined, as well as how these fields are portrayed in popular culture, which ultimately reflects how we perceive the line between human and machine. Entries begin by specifying related Fields of Study, followed by an Abstract and then a list of Key Concepts summarizing important points; all entries end with a helpful Further Reading section." -From publisher.
Subjects: Reference works.; Robotics.; Artificial intelligence.;
Available copies: 3 / Total copies: 3
unAPI

Conoce todo sobre creacion de un sitio web con PHP y MySQL / by Pavón Puertas, Jacobo,Author(DLC)no2007042260;
"With the help of this book you will learn to program web applications from scratch in PHP and to use the MySQL database. Combining these two powerful tools -and without any prior knowledge of programming or database management-, in a short time, you will be able to program your web pages and develop applications today used in many portals, such as forms, forums, accountants, visits, banner rotators, etc. In this fifth edition, contents have been included to manage the latest version of the XAMPP software package, which will allow us to develop complete web applications easily and quickly. For this we will have the Apache web server, the PHP interpreter and the MySQL database manager. In addition, two new chapters have been added in which we will analyze the latest features of the language. PHP, as well as AJAX, one of the technologies currently used to create more dynamic and fast Internet pages. Thanks to this work it will be very easy to learn to create your own website; even professional projects, since it is developed in such a way that all the chapters include examples with the necessary code to make them work. "
Subjects: MySQL (Electronic resource); PHP (Computer program language); Web sites;
Available copies: 1 / Total copies: 1
unAPI

Hackers : aprende a atacar y defenderte / by Gómez López, Julio,Author(DLC)no2007126015; Guillén Núñez, Pedro,Author(DLC)ns2018000305; Castro Simón, Miguel Ángel de,Author(DLC)ns2018000304;
"The security of computer systems is a crucial element that any administrator must assume as one of its main objectives. The large number of services offered through networks and the Internet has made it vitally important to secure systems against different attacks by hackers. Faced with this problem, the administrator must be prepared to face any attack that may compromise the security of the system. To find a solution to this conflict, the administrator must put himself in the shoes of a hacker and analyze or exploit the security of the system. But is an administrator a hacker? Both have extensive computer skills and analyze the security of companies in search of failures. But the difference lies in their ethics and professionalism. While a hacker ""examines"" a computer system with dubious purposes (economic, revenge, fun, ...) an administrator does it to protect the system against possible hacker attacks. The second edition of the book is presented as an updated edition where you will learn the techniques used to find and check the security failures of a system computer Topics included: ? Chapter 1. Basic concepts, types of attacks and training platforms. ? Chapter 2. Find an attack vector. Location and analysis of an objective, plot of routes and port scanning. ? Chapter 3. Systems hacking. Scanning of vulnerabilities, exploitation of vulnerabilities of a system, attacks against passwords and countermeasures. ? Chapter 4. Network hacking. Man in the middle, Sniffers, Phising, network break wireless, anonymous navigation and countermeasures. ? Chapter 5. Web server hacking. Search for vulnerabilities, attacks by brute force, XSS, RFI, LFI, SQL injection, CSRF and countermeasures. ? Chapter 6. Application hacking. Crack, Hotfuzz, keyloggers, viruses, trojans, rootkits and hiding for the antivirus. "
Subjects: Computer security.; Data protection.; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

Java EE and HTML5 enterprise application development : build and deploy dynamic, high-performance applications |cGeertjan Wielenga. by Brock, John(Application developer)(CARDINAL)617349; Gupta, Aru.; Wielenga, Geertjan.(CARDINAL)484746; ProQuest (Firm)(CARDINAL)291866;
"Build and distribute business web applications that target both desktop and mobile devices." - cover.
Subjects: Application software; Java (Computer program language); HTML (Document markup language);
Available copies: 1 / Total copies: 1
unAPI