Search:

Python for cybersecurity : using Python for cyber offense and defense / by Poston, Howard E.,III,author.(CARDINAL)871037;
Subjects: Python (Computer program language); Computer security.; Computer networks; HTTP (Computer network protocol);
Available copies: 0 / Total copies: 2
unAPI

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
Available copies: 2 / Total copies: 2
unAPI

Principles of programming & coding / by Franceschetti, Donald R.,1947-editor.(CARDINAL)651222;
Includes bibliographical references and index3D printing -- Algorithms -- American Standard Code for Information -- Interchange (ASCII) -- Android OS -- Application -- Autonomic computing -- Avatars and simulation -- Binary hexadecimal representations -- Boolean operators -- Branching logic -- Characters and strings -- Cloud computing -- Coding and encryption -- Color coding -- Combinatorics -- Comment programming -- Comparison operators -- Computer animation -- Computer memory -- Computer modeling -- Computer security -- Computer-aided design (CAD) -- Computer-aided design and computer-aided manufacturing software (CAD/CAM) -- Computer-assisted instruction (CAI) -- Conditional operators -- Constraint programming -- Control systems -- Cowboy coding -- CPU design -- Crowdfunding -- Crowdsourcing -- Cryptography -- Data mining -- Data warehouse -- Database design -- Database structuring conventions -- Debugging -- Device drivers -- Diffusion of innovations -- Digital divide -- Digital forensics -- Digital libraries -- Digital native -- Digital photography -- Digital signal processors (DSP) -- Digital watermarking -- Disk operating system (DOS) -- Drone warfare -- Drones -- E-banking -- E-learning -- Electronic circuits -- Electronic communication software -- Encryption -- Error handling -- Event-driven marketing (EDM) -- Expectancy theory -- Experimenter's bias -- Extreme programming -- Firewalls -- Firmware -- Functional electrical stimulation (FES) -- Game programming -- Gamification -- Graphical user interface (GUI) -- Graphics formats -- Guard clause -- HTTP cookie -- Imagined communities -- Incremental development -- Informational technology (IT) -- Information visualization -- Internet Protocol (IP) -- Inversion of control (Hollywood Principle) -- iOS -- Iterative constructs -- Java programming language -- JavaScript -- Knowledge worker -- Levels of processing theory -- Logic synthesis -- Logistics -- Machine learning -- Malware -- Massive open online course (MOOC) -- Meta-analysis -- Metacomputing -- Metadata -- Microprocessors -- Mixed methods research (MMR) -- Mobile apps -- Mobile technology -- Motherboards -- Multiprocessing operating systems (OS) -- Multi-user operating system (OS) -- Naming conventions -- Net neutrality -- Network security -- Neuro-linguistic programming (NLP) -- Neuromarketing -- Neuromorphic chips -- Objectivity -- Object-oriented design (OOD) -- Object-oriented programming (OOP) -- Privacy rights -- Programming languages -- Prototyping -- Quantum computing -- Random access memory (RAM) -- Rapid application development (RAD) -- Rational choice theory -- Search engine optimization (SEO) -- Semantic memory -- Semantics -- Signal processing -- Source code comments -- Spiral development -- Standard deviation -- Standpoint theory -- Statistical inference -- String-oriented symbolic languages (SNOBOL) -- Structural equation modeling (SEM) -- Technology in education -- Test doubles -- Theory of multiple intelligences -- Theory X and Theory Y -- Transformation priority premise (TPP) -- Tree structures -- Turing test -- Uncertainty reduction theory (URT) -- Unicode -- UNIX -- Variables and values -- Waterfall development -- Web design -- Web graphic design -- Working memory -- Worse-is-better -- Time Line of Inventions and Advancements in Programming and CodingThis new volume makes sense of the jumble of techno-jargon and programming acronyms for high school and undergraduate students. More than 125 entries explain the fundamental concepts, popular languages, systems, and protocols that go into computer programming.
Subjects: Computer programming.; Coding theory.;
Available copies: 0 / Total copies: 1
unAPI