Cybersecurity, big data, cloud computing, AI, and more.
EBSCOhost Computers & Applied Sciences
Elsevier-Science Direct ebooks
Science, technology, engineering, math, and health.
Proquest Advanced Technologies & Aerospace
Topics ranging from computer security to web commerce.
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics.
Your first podcast of the week is the last word in tech news. Join the top tech journalists and pundits in a roundtable discussion of the latest trends in tech.
Faculty and students from the South East Technology University (SETU) Ireland explore a wide range of topics related to computing and technology. Hosted by Rob O'Connor.
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource
Computer Programming for Absolute Beginners starts by taking you through the building blocks of any programming language with thorough explanations and relevant examples in pseudocode. You'll understand the relationship between computer programs and programming languages and how code is executed on the computer. The book then focuses on the different types of applications that you can create with your programming knowledge
Stephen Robertson's BC: Before Computers is a work which questions the idea that the mid-twentieth century saw a single moment of rupture. It is about all the things that we had to learn, invent, and understand - all the ways we had to evolve our thinking - before we could enter the information technology revolution of the second half of the twentieth century.
This book helps readers understand what the cloud is and how to work with it, even if it isn't a part of their day-to-day responsibility.
Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
In this book, you'll: Take control of your program flow Program with classes, objects, and methods Use Java's functional programming features Explore Java 17, the latest long-term support release This up-to-date handbook covers the latest developments in Java, including the new 'switch' statement syntax.
This fast-paced, thorough introduction will have you writing programs, solving problems, and developing functioning applications in no time... If you've been thinking about digging into programming, Python Crash Course will provide you with the skills to write real programs fast. Why wait any longer? Start your engines and code! Covers Python 3.x
Virtual reality might seem like the stuff of science fiction, but it has been in use in various forms since the 1950s. The technology is being developed for use in education, professional and military training, therapy, entertainment, and design. But is a simulated world a better world?
You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised. The book also offers: Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target Step-by-step instructions on how to create data backups and implement strong encryption
Many thanks to Shelby Beard, Information Services Librarian, South Piedmont Community College, for granting me permission to reuse her " Computer and Information Technology Toolkit" infoguide: https://spcc.libguides.com/ComputerToolkit .