Search:

Microsoft Excel workbook / by McFedries, Paul,author.(CARDINAL)367649; Harvey, Greg.Excel workbook for dummies.;
Building worksheets. Getting familiar with the Excel interface ; Entering the worksheet data ; Formatting the worksheet ; Printing worksheet reports ; Modifying the worksheet -- Using formulas and functions. Building formulas ; Copying and correcting formulas ; Creating date and time formulas ; Using math functions ; Using common statistical functions ; Using Lookup functions ; Using logical functions ; Text formulas and functions -- Working with graphics. Charting worksheet data ; Adding graphics to worksheets -- Managing and securing data. Building and maintaining tables ; Protecting workbooks and worksheet data -- Doing data analysis. Performing what-if analysis ; Generating PivotTables -- Macros and visual basic for applications. Using macros ; Using the Visual Basic editor -- The part of tens. Top ten features in Excel ; Top ten tips for using Excel like a pro.
Subjects: Problems and exercises.; Handbooks and manuals.; Microsoft Excel (Computer file); Microsoft Excel (Computer file); Microsoft Excel (Computer file); Business; Electronic spreadsheets.;

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;

Understanding coding with Minecraft / by Harris, Patricia,1943 October 17-(CARDINAL)426411;
Coding with cubes -- Messing around with redstone -- Rules -- Without logic -- Let's get logical -- Build and test -- Get connected -- Open the gates!840L
Subjects: Video games; Minecraft (Game); Computer simulation; Computers and children;

Digitized : the science of computers and how it shapes our world / by Bentley, P. J.(CARDINAL)506006;
Includes bibliographical references (pages 263-283) and index.000: Introduction ; Computers uncovered ; The science of computers -- 001: Can you compute? ; Understanding the impossible ; Turing's unstoppable machines ; Turing's legacy ; Complexity is simple ; Does P = NP? ; Oracles and other complexities ; Theoretical futures -- 010: Disposbale computing ; Thinking logically ; Building brains ; Anatomy of a digital brain ; The end of the beginning ; The law of Moore ; The future is many ; Beyond von Neumann -- 011: Your life in binary digits ; Learning to program computers ; Climbing higher ; Bases for data ; Software crisis ; Virtual futures -- 100: Monkeys with world-spanning voices ; Diverse connections ; Inter-networking ; Addressing for success ; Spinning webs over networks ; Weaving tangled webs ; Webs of deceit ; Digital lives -- 101: My computer made me cry ; The birth of friendly computing ; Seeing with new eyes ; Photos and chicken wire ; Waking dreams ; It's not what you do but the way that you do it ; My pet computer ; Human computer integration -- 110: Building bionic brains ; Teaching computers how to play ; The birth of intelligence ; The seasons of AI ; Intelligence from feet to head ; Adaptation by natural selection ; Learning to learn, predicting the predictors ; Complex futures -- 111: A computer changed my life ; Computer creativity ; Computational biology ; Computer medicine ; Computer detectives.Peter J. Bentley tells the story of computer science, explaining how and why computers were invented, how they work, looking at real-world examples of computers in use, and considering what will happen in the future--
Subjects: Computer science.; Computer science;

Making their mark : art by women in the Shah Garg collection / by Godfrey, Mark(Mark Benjamin),editor,contributor.(CARDINAL)425720; Siegel, Katy,editor,contributor.(CARDINAL)291393; Belasco, Daniel,1975-contributor.(CARDINAL)295653; Adamson, Glenn,contributor.(CARDINAL)264604; Bell, Kirsty,contributor.(CARDINAL)811594; Brown, Jessica Bell,contributor.(CARDINAL)841305; Sutton, Gloria,contributor.(CARDINAL)275357;
Includes bibliographical references and index.Preface -- Komal Shah in Conversation with Mark Godfrey and Katy Siegel -- Some Women / Katy Siegel -- Alive and Kicking : Abstraction in the 1970s / Mark Godfrey -- Women Curating Women, 1915-2022 / Daniel Belasco -- Craft in the Abstract / Glenn Adamson -- Queer Possibilities : Lesbian Feminist Abstract Painting in the 1970s and After / David J. Getsy -- Women and Painting : Rejections of Rejections / Kirsty Bell -- How to Make a World : Black Women Artists Now / Jessica Bell Brown -- The Computational Logic of Contemporary Painting / Glria Sutton.This book explores the bold vision and vast range of achievements of women artists working predominantly across North America from the late 1960s into the present moment. The paintings, sculpture and mixed-media works featured are drawn from the Shah Garg Collection, which is dedicated to illuminating the critical role that women have played in shaping the development of abstraction and the narratives of art more broadly. Making Their Mark includes two sweeping essays by editors Mark Godfrey and Katy Siegel, writings by six scholars on topics relevant to the depth of the collection, such as the importance of craft traditions, artistic experimentation with new technologies and the impact of personal and communal identity on artmaking, as well as lively texts by 15 artists about the artists who inspire them. Richly illustrated with works by 136 artists, this volume offers new insights that make it a resource for students of art and general readers alike.
Subjects: BMA Staff.; Shah, Komal; Garg, Gaurav; Women artists; Women artists; Women painters; Women sculptors; Women artists;

Think Java : how to think like a computer scientist / by Downey, Allen,author.(CARDINAL)834888; Mayfield, Chris(Computer scientist),author.(CARDINAL)832249;
Computer programming -- Variables and operators -- Input and output -- Methods and testing -- Conditionals and logic -- Loops and strings -- Arrays and references -- Recursive methods -- Immutable objects -- Mutable objects -- Designing classes -- Arrays of objects -- Objects of arrays -- Extending classes -- Arrays of arrays -- Reusing classes -- Advanced topics."Think Java" is a hands-on introduction to computer science and programming used by many universities and high schools around the world. Its conciseness, emphasis on vocabulary, and informal tone make it particularly appealing for readers with little or no experience. The book starts with the most basic programming concepts and gradually works its way to advanced object-oriented techniques. In this fully updated and expanded edition, authors Allen Downey and Chris Mayfield introduce programming as a means for solving interesting problems. Each chapter presents material for one week of a college course and includes exercises to help you practice what you've learned. Along the way, you'll see nearly every topic required for the AP computer science A exam and Java SE programmer I certification.
Subjects: Handbooks and manuals.; Java (Computer program language); Computer programming.; Data structures (Computer science); Object-oriented programming (Computer science);

Computer architecture : from the stone age to the quantum age / by Fox, Charles(Lecturer in computer science),author.(CARDINAL)889011;
Includes bibliographical references and index.Historical architectures -- Data representation -- Basic CPU-based architecture -- Switches -- Digital logic -- Simple machines -- Digital CPU design -- Advanced CPU design -- Input/Output -- Memory -- Retro architectures -- Embedded architectures -- Desktop architecture -- Smart architectures -- Parallel architectures -- Future architectures."Covers the inner workings of the computer, from the transistor level up to complete CPUs, memory, and beyond, as well as more recent developments, like parallel and quantum architectures. Each chapter includes hands-on exercises and additional resources for exploring topics further"--
Subjects: Computer architecture.;

A shortcut through time : the path to a quantum computer / by Johnson, George,1952 January 20-(CARDINAL)173624;
Includes bibliographical references (pages 175-191) and index."Simple electric brain machines and how to make them" -- Tinkertoy logic -- Playing with mirrors -- A shortcut through time -- Shor's algorithm -- Breaking the code -- Invisible machines -- Counting with atoms -- Quantum secrecy -- The hardest problem in the universe -- Epilogue: The nine billion names of God.
Subjects: Quantum computers.;

Minecraft mastery : build your own Redstone contraptions and mods / by Monk, Matthew.(CARDINAL)407830; Monk, Simon.(CARDINAL)357194;
Basic Redstone -- Redstone logic gates -- Advanced Redstone -- Miscellaneous Redstone -- Server hosting and tools -- Qcraft -- Computercraft -- Modding with forge -- Example mod: Thorium -- More modding examples.
Subjects: Electric controllers; Minecraft (Game); Video games; Virtual reality;

C programming / by Gookin, Dan,author.(CARDINAL)189724;
Provides informaton on how to write computer programs using the C programming language, guiding readers logically through the development cycle, from initial design and testing to deployment and live iteration.
Subjects: C (Computer program language);