Catalog Search Results
Discover leading business and technical publications in the computer, telecommunications, and electronics industries.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Confront the nemesis of all computer programmers: bugs. First, look into the history of this peculiar term. Then take a systematic approach to solving mysterious glitches in your own programs. Get acquainted with the debugger in PyCharm, and explore strategies for tracking down bugs and fixing them.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Any time a computer takes different paths depending on your response, there is usually a conditional statement involved. Delve into these widely used tools, looking at branching points, comparisons, if/then statements, nesting conditionals, and Boolean (true/false) expressions.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Expand your study of algorithms to cover recursion, one of the most fascinating ideas in computer science. Apply recursion to form a pair of sorting algorithms. Then see how another approach, iteration, excels at tasks that take too long with recursion, such as calculating the Fibonacci sequence.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Study some of the basic operations of computers. First, investigate the memory hierarchy and what the CPU does. Then consider variables, which are like boxes where units of data are stored in a program. Look at simple arithmetic operations with variables, and try input/output commands.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Python makes it very easy to create lists and perform a wide range of operations on them. Learn the fundamentals of building lists. Then experiment with indexing into lists, looping over lists, and making slices of lists, lists of lists, and list-like structures called tuples.
46) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Publisher
PublicAffairs
Pub. Date
2023.
Language
English
Description
"David Auerbach's exploration of the phenomenon he has identified as the meganet begins with a simple, startling revelation: There is no hand on the tiller of some of the largest global digital forces that influence our daily lives. From corporate sites such as Facebook, Amazon, Google, YouTube, Instagram, and Reddit - to the burgeoning metaverse encompassing cryptocurrencies and online gaming - to government systems such as China's Social Credit...
53) Hardware
Publisher
Gale
Pub. Date
uuuu
Language
English
Description
Gale Presents: Udemy is an online learning platform that provides instruction for adults who want to upskill for a new job, advance in their current profession, or deepen a personal interest. This top collection, curated from courses from Udemy.com and powered by Udemy for Business, gives users access to relevant skills training, helping them achieve success at work and in life. Before enrolling, users can review key information about a course, its...
55) The computer
Author
Publisher
Carlton Books
Pub. Date
2005
Language
English
Description
Traces the evolution of the computer from its earliest roots through its application in code-breaking during the Second World War; from its initial use in the workplace and home to its current status as an indispensable part of twenty-first century life. Examines some pivotal moments in computer development, from the use of computers in film and television such as the 1950s film The Forbidden Planet, to the key battle between Apple and IBM in the...
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
A man shoots down a drone that is flying over his private property. A retail store uses predictive data analytics to send pregnancy-related advertising to a teenager who has not told her parents about her condition. A police officer places a GPS device on a suspected criminal's car to follow him and build a case against him..The news is full of such stories, in which new technologies lead to dilemmas that could not have been imagined just a few decades...
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
In Interlibrary Loan
Didn't find what you need? Items not owned by Jackson County Oregon can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request