Results 1 to 10 of 45 | next »
- WAIS and Gopher servers : a guide for Internet end-users / by Morgan, Eric Lease.(CARDINAL)208676;
Includes bibliographical references and index.
- Subjects: Client/server computing.; End-user computing.; Internet.;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Online searching for end users : an information sourcebook / by Batt, Fred.(CARDINAL)193924;
Includes bibliographies and indexes.
- Subjects: Bibliographies.; Online bibliographic searching; Database searching; End-user computing;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- The AMA report on end-user and departmental computing : an AMA research report / by American Management Association.(CARDINAL)142188; Microcomputer Managers Association.(CARDINAL)195488;
-
- Subjects: Management information systems.; Electronic data processing departments.;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
- Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
- Available copies: 2 / Total copies: 2
-
unAPI
- Diablo IV [electronic resource (PS5)] / by Blizzard Entertainment (Firm),game developer,publisher.(CARDINAL)651886;
Diablo IV is the next-gen action RPG experience with endless evil to slaughter, countless abilities to master, nightmarish Dungeons, and legendary loot. Embark on the campaign solo or with friends, meeting memorable characters through beautifully dark settings and a gripping story, or explore an expansive end game and shared world where players can meet in towns to trade, team up to battle World Bosses, or descend into PVP zones to test their skills against other players - no lobbies necessary - with cross-play and cross-progression on all available platforms.ESRB content rating: M, Mature 17+ (intense violence, blood and gore, language). "In-game purchases/users interact"--Container.System requirements: PS5 console; internet and PlayStation Plus required for online multiplayer; no offline mode; 90 GB minimum; Ultra HD Blu-ray.
- Subjects: Video games.; Sony video games.; Good and evil; Demonology; Combat; Battles;
- Available copies: 0 / Total copies: 1
-
unAPI
- Chromebook / by Gregory, Peter H.,author.(CARDINAL)658381; Lafay, Mark,author.(CARDINAL)617985;
Get the most out of your Google Chromebook Chromebook For Dummies walks you through setting up your Chromebook, transitioning from traditional computers, customizing a Chromebook to fit your needs, navigating the many apps and their uses, and applying advanced settings and features. This book documents the features of all Chromebooks, approaching them from the point of view of a smart person who is intimidated by the technology. Offers extensive and practical information. Covers all portable computers powered by Chrome OS. Helps make it easy to drive these fast, user-friendly devices. Includes coverage of the latest features in the Chrome operating system. You'll end up keeping this book close at hand, referring to it often as you explore the features of your Chromebook.
- Subjects: Handbooks and manuals.; Google Chrome.; Chromebook (Computer); Operating systems (Computers); Laptop computers.;
- Available copies: 6 / Total copies: 8
-
unAPI
- Uses of mobile information technology devices in the field for design, construction, and asset management / by Dadi, Gabriel B.,author.(CARDINAL)336162; Sturgil, Roy E.,author.; Wang, Xi,author.(CARDINAL)525376; United States.Federal Highway Administration,sponsor.(CARDINAL)139839; American Association of State Highway and Transportation Officials,sponsor.(CARDINAL)138446; National Cooperative Highway Research Program,sponsor.(CARDINAL)281856; National Research Council (U.S.).Transportation Research Board,issuing body.(CARDINAL)141287;
Includes bibliographical references (page 32).Summary -- ch. 1. Introduction -- ch. 2. Mobile information technology devices and applications -- ch. 3. Agency policies for mobile information technology use -- ch. 4. Performance evaluation and optimization -- ch. 5. Mobile information technology use case studies -- ch. 6. Mobile information technology use in design, construction, and asset management -- ch. 7. Conclusions -- References -- app. A. Survey questionnaire -- app. B. Survey results -- app. C. IT survey results -- app. D. End user survey results -- app. E. Case study questions."TRB's National Cooperative Highway Research Program (NCHRP) Synthesis 491: Uses of Mobile Information Technology Devices in the Field for Design, Construction, and Asset Management documents the state-of-the-practice and state-of-the-art applications of state transportation agencies related to their use of mobile information technology (IT) devices. Specifically, the report reviews applications pertaining to the areas of design, construction, and asset management. Mobile IT devices such as laptop computers, mini-laptop computers, handheld multifunctional data collectors, tablets, and smartphones also play a role in bringing the transportation industry into digital platforms."--Publisher's descriptionResearch sponsored by the American Association of State Highway and Transportation Officials in cooperation with the Federal Highway Administration
- Subjects: Highway engineering; Information technology.; Roads;
- Available copies: 1 / Total copies: 1
-
unAPI
- Call of duty [video game]: modern warfare. by Activision (Firm),publisher.;
"Prepare to go dark, Modern Warfare is back! The stakes have never been higher as players take on the role of lethal Tier One operators in a heart-racing saga that will affect the global balance of power. Call of Duty: Modern Warfare engulfs fans in an incredibly raw, gritty, provocative narrative that brings unrivaled intensity and shines a light on the changing nature of modern war. Developed by the studio that started it all, Infinity Ward delivers an epic reimagining of the iconic Modern Warfare series from the ground up. In the visceral and dramatic single-player story campaign, Call of Duty: Modern Warfare pushes boundaries and breaks rules the way only Modern Warfare can. Players will engage in breathtaking covert operations alongside a diverse cast of international special forces throughout iconic European cities and volatile expanses of the Middle East. And the story doesn't end there. In Call of Duty: Modern Warfare, players will be thrust into an immersive narrative spanning the entire game. Experience the ultimate online playground with classic multiplayer, or squad-up and play cooperatively in a collection of elite operations accessible to all skill levels."--Metacritic.com.ESRB content rating: M, Mature 17+ (content is generally suitable for ages 17 and up) for blood and gore, intense violence, strong language, suggestive themes, use of drugs.Disc characteristics: Blu-ray Disc; all regions.Online requirements: online multiplayer requires a PlayStation Plus membership (sold separately); online features require an account and are subject to terms of service and applicable privacy policy.Supported features: PS4 Pro enhanced; Dolby Audio; in-game purchases; users interactSystem requirements: PlayStation 4 game system; 150 GB minimum hard disk space; online play required; DualShock 4 controller.Title from disc label.
- Subjects: Sony video games.; Video games.; Battles; Combat; Dystopias; Private military companies; Shooting; Special forces (Military science);
- Available copies: 1 / Total copies: 2
-
unAPI
- Linux administration best practices : practical solutions to approaching the design and management of Linux Systems / by Miller, Scott Alan.(CARDINAL)871910;
Includes index.What is the role of a system administrator? -- Choosing your distribution and release model -- System storage best practices -- Designing system deployment architectures -- Patch management strategies -- Databases -- Documentation, monitoring, and logging techniques -- Improving administration maturation and automation through scripting and DevOps -- Backup and disaster recovery approaches -- User and access management strategies -- Troubleshooting.Linux administration best practices helps you to explore best practices for efficiently administering Linux systems and servers. This Linux book covers a wide variety of topics from installation and deployment through to managing permissions, with each topic beginning with an overview of the key concepts followed by practical examples of best practices and solutions. You'll find out how to approach system administration, Linux, and IT in general, put technology into proper business context, and rethink your approach to technical decision making. Finally, the book concludes by helping you to understand best practices for troubleshooting Linux systems and servers that'll enable you to grow in your career as well as in any aspect of IT and business. By the end of this Linux administration book, you'll have gained the knowledge needed to take your Linux administration skills to the next level.
- Subjects: Linux.; Operating systems (Computers); Computers.;
- Available copies: 1 / Total copies: 1
-
unAPI
- 1st case / by Patterson, James,1947-author.(CARDINAL)320355; Tebbetts, Christopher,author.(CARDINAL)670339;
"Angela Hoot's government career begins with an ending. Her unorthodox programming skills get her kicked out of MIT's graduate school and into the Bureau's cyber-forensics unit. A messaging app with sophisticated tracking capabilities surfaces. Its beta users, all young women, are only identified as they turn up dead in their bedrooms. As Angela races to crack the killer's digital code, their technical rivalry escalates. She must deny the killer access to her personal information, or risk losing her life to the underbelly of the Internet."--
- Subjects: Thrillers (Fiction); Detective and mystery fiction.; Novels.; United States. Federal Bureau of Investigation; Serial murderers; Computer programmers; Computer crimes;
- Available copies: 149 / Total copies: 245
-
unAPI
Results 1 to 10 of 45 | next »