1 - 20
Next
- Covvey, H. Dominic.
- Reading, Mass. : Addison-Wesley, 1980.
- Description
- Book — xi, 212 p. : ill. ; 24 cm.
- Summary
-
- Preliminaries
- Introduction
- Computer system
- Hardware: Fauna of the solid-state stone age
- Never forgetting
- Origin of the species
- Missing link
- Skeleton, monster, or servant?
- Software: ow soft is software?
- Bringing hardware to life
- Dawn of language
- Whole system: System in Situ
- Through the computer, darkly
- Glossary
- Index.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76 .C64 1980 | Available |
- Chamarty, Sitaram.
- Birmingham, U.K. : Packt Pub., ©2014.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful.
(source: Nielsen Book Data)
- International Conference on Emerging Technologies in Computing (4th : 2021 : Online)
- Cham, Switzerland : Springer, 2021.
- Description
- Book — 1 online resource (xii, 195 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Information and Network Security 1 Hardware Assisted Protocol for Attacks Prevention in ad hoc Networks.- Android Malicious Software using Boosting Algorithms Deepon Nath.- Privacy and Security Factors of Government Websites versus Private Websites in Bangladesh and USA: A Comparative Study.- Protecting Web Applications from Web Scraping.- Cloud, IoT and Distributed Computing.- 5 Integrated CMOS Active Low-pass Filter for IoT RFID Transceiver.- LoRa IoT WSN for E-Agriculture.- Integrating the Meteorological Data into a Smart City Service using Cloud of Things (CoT)
- Data Handling and Transparency Enhancement in Central Sterile Service Department.- AI, Expert Systems and Big Data Analytics
- Data Mining Approach Improving Decision-Making Competency along the Business Digital Transformation Journey: A Literature Review.- An Event-level Clustering Framework for Process Mining Using Common Sequential Rules.- Fuzzy Logic enabled Stress Detection using Physiological Signals.- The Auxiliary Parametric Sensitivity Method as a Means of Improving Project Management Analysis and Synthesis of Executive Elements.- Predicting Diabetes Using Diabetes Datasets and Machine Learning Algorithms: Comparison and Analysis.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Emerging Technologies in Computing (3rd : 2020 : Online)
- Cham, Switzerland : Springer, [2020]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Cloud Forensic Analysis on pCloud: from Volatile Memory Perspectives.- CALIPER: A Coarse Grain Parallel Performance Estimator and Predictor.- 3 Integration of Safety Means with Functions of Blockchain in Multi-layered Architecture of IoT for Safer Data Transmission Procedures.- Amazon Web Services (AWS) - An Overview of the On-Demand Cloud Computing Platform Security, Wireless Sensor Networks and Internet of Things (IoT).- SIoT: Secure IoT Framework for Smart Environments.- Review of Hybrid Control Designs for Underactuated Quadrotor with Unmodelled Dynamic Factors.- A Review of Underwater Acoustic, Electromagnetic and Optical Communications.- Optically Inspired Cryptography and Cryptanalysis: A Survey and Research Directions.- Sentiment Analysis of Turkish Twitter Data using Polarity Lexicon and Artificial Intelligence.- Big Data Analytics in Healthcare: A Review of Opportunities and Challenges.- A Multi-Level Consensus Clustering Framework for Customer Choice Modelling in Travel Industry.- Bangla Speech Recognition using 1D-CNN and LSTM with Different Dimension Reduction Techniques.- Comparative Analysis of Dimension Reduction Techniques over Classification Algorithms for Speech Emotion Recognition.- Investigations on Performances of Pre-trained U-Net Models for 2D Ultrasound Kidney Image Segmentation.- Development of Hierarchical Attention Network based Architecture for Cloze-style Question Answering.- An ARIMA-LSTM Correlation Coefficient based Hybrid Model for Portfolio Management of Dhaka Stock Exchange.- The Combination Of Attention Sub-Convnet And Triplet Loss For Pulmonary Nodule Detection In CT Images.- A Review on Steel Surface Image Features Extraction and Representation Methods.- Parameterization of an Agent-Based Model of spatial distribution of species.- Emerging Technologies in Engineering Education and Sustainable Development.- A Survey on the Use of e-Portfolios as a Form of As-sessment in Online Computer Science Courses.- Design for medical simulation: guidelines and visioning for a new model of education.- Design and Implementation of an E-Notice Board using a NodeMCU.- A study of the impacts of technological innovations on cooperation cases.- Possibilities of building company's reputation with the support of digital marketing tools - a case study.- Developing an Interactive Mathematical Learning Me-dia based on the TPACK Framework Using the Haw-gent Dynamic Mathematics Software.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
5. Take control of 1password [2018]
- Kissell, Joe, author.
- 3rd edition. - San Diego, CA : Alt concepts Inc., 2018.
- Description
- Book — 1 online resource (1 volume) : illustrations Digital: data file.
- Summary
-
- Intro; Table of Contents; Read Me First; Introduction; 1Password Quick Start; Meet 1Password; Understand Password Security; Use 1Password for Web Browsing; Store Other Information in 1Password; Search and Organize Your 1Password Items; Edit 1Password Items; Customize 1Password; Manage a Family or Team Account; Use 1Password on the Go; Solve Problems; About This Book; Also by Joe Kissell; Copyright and Fine Print
6. Take control of your passwords [2018]
- Kissell, Joe, author.
- 3rd edition. - San Diego, CA : Alt concepts Inc., 2018.
- Description
- Book — 1 online resource (1 volume) Digital: data file.
7. Learn Git in 3 hours [2018]
- Conyers, Ross, speaker.
- [Place of publication not identified] : Packt, [2018]
- Description
- Video — 1 online resource (1 streaming video file (1 hr., 57 min., 58 sec.))
- Summary
-
"In this course, we'll teach you the basics of using Git and explain how it works. To begin with, we'll show you how to install Git and effectively use your computer's terminal or command line to navigate the file system, and create and edit files. Then we'll cover all the commonly used commands in Git that make up the vast majority of any Software Engineer's workflow. Moving on, we'll explain Git's branching workflow, why it's such a useful feature, and how to use it in your projects. Once you've learned all this, we'll discuss some advanced Git workflow techniques that will make you a valued contributor and collaborator on any project. You'll be able to create your own Git repositories, or clone and contribute to existing ones. This will allow you to track the changes to sets of files over time, recover data you might lose, and collaborate with others on projects. You'll have a profound understanding of Git's branching workflow, and how to use it in the best possible way in your projects. By the end, you'll be familiar with using Git and use VCS to handle large projects easily and make well-crafted contributions to your own or others' projects."--Resource description page
8. Git essentials LiveLessons [2017]
- Chen, Daniel Y.
- [Place of publication not identified] : Addison-Wesley : Pearson, [2017]
- Description
- Video — 1 online resource (1 streaming video file (3 hr., 38 min., 32 sec.)) : digital, sound, color
- Summary
-
"Git has emerged as the leading revision control system for open source projects. Git is a distributed revision control and source code management (SCM) system with an emphasis on speed. Git Essentials LiveLessons teaches the skills necessary to version control with git. The first part of the course begins with the basics of Git and how to use it as an individual programmer. Part 1: Git Fundamentals covers installation and setup, fundamental commands, and how to use remote and branches in git using Github as the online hosting service to lay the foundation for more advanced workflows. After the basics are covered, Part 2: Collaborating with Git shows how to work collaboratively with teams with git. Three common ways of collaboration are covered, including: adding other users to your project repository, forking a copy of repository and submitting changes for review, and finally using the git flow workflow."--Resource description page.
9. Take control of your Apple ID [2022]
- Fleishman, Glenn, author.
- Third edition. - [Place of publication not identified] : Take Control Books, [2022]
- Description
- Book — 1 online resource (138 pages) : illustrations
- Summary
-
Prevent (or solve) problems with your Apple ID! Version 3.2, updated January 17, 2022 This book covers everything someone needs to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access. Your Apple ID is much more than a simple username. It's a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple ID protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple ID, you could be in for a world of hurt. Unfortunately, things go wrong with Apple IDs all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld's "Mac 911" column, is ready to help with expert advice on how to manage your Apple ID--including how to prevent, solve, or work around most common problems! In this book, Glenn answers questions like: What all is my Apple ID used for? How does my iCloud account relate to my Apple ID? What problems can two-factor authentication (2FA) solve, and how do I use it? Are there other mechanisms I can use to ensure that I can recover an Apple ID in the event of a problem? (Spoiler: yes!) What if I have a device that's too old to work with two-factor authentication? What should I do if I have two or more Apple IDs or iCloud accounts? Will I lose access to all my Apple media purchases if I move to another country? Can I share an Apple ID with someone else? What exactly should I do if I think someone is hacking my Apple ID account? How can I recover a forgotten Apple ID password? What steps should I take if Apple locks me out of my account? If I lose access to an email address associated with my Apple ID, what can I do? What Apple ID changes in iOS 15/iPadOS 15 and macOS 12 Monterey do I need to know about? How does "Sign in with Apple" work? How can I use Family Sharing to share data and purchases within my family? What types of subscriptions can I manage with my Apple ID, and how? Which payment methods can I associate with my Apple ID, and how do I manage them? And that's just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this compact book. Read it before you encounter Apple ID problems to minimize your risk, and if you've already encountered a problem, read it to find the best path to a rapid solution.
10. Take control of your Apple ID [2018]
- Fleishman, Glenn, author.
- San Diego, CA : Alt concepts Inc., [2018]
- Description
- Book — 1 online resource (1 volume) : illustrations
11. International journal of mini & microcomputers [1978 - 1996]
- Anaheim, Calif. ; Calgary, Alta. : ACTA Press, 1978-1996.
- Description
- Journal/Periodical — 18 v. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
For use in Green Library
|
Request (opens in new tab) |
QA75.5 .I68 V.15-16 1993-1994 | Available |
QA75.5 .I68 V.13-14 1991-1992 | Available |
QA75.5 .I68 V.11-12 1989-1990 | Available |
QA75.5 .I68 V.6-10 1984-1988 | Available |
QA75.5 .I68 V.1-2 1978-1980 | Available |
QA76.5 .I68 V.17-18 1995-1996 | Available |
QA76.5 .I68 V.4:NO.2,V.5:NO.1-2 1982-83 | Available |
12. Les micro-ordinateurs [1978]
- Rouquerol, Max.
- 4e éd. - Paris : Presses universitaires de France, 1995,c1978.
- Description
- Book — 127 p. : ill. ; 18 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.525 .R67 1995 | Available |
13. IBM software defined environment [2015]
- Quintero, Dino, author.
- First edition. - Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2015.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
This resource introduces the IBM Software Defined Environment (SDE) solution, which helps to optimize the entire computing infrastructure--compute, storage, and network resources--so that it can adapt to the type of work required. In an SDE, workloads are dynamically assigned to IT resources based on application characteristics, best-available resources, and service level policies so that they deliver continuous, dynamic optimization and reconfiguration to address infrastructure issues. Underlying all of this are policy-based compliance checks and updates in a centrally managed environment. SDE can accelerate business success by matching workloads and resources so that you have a responsive, adaptive environment. -- Edited summary from book.
- ISMM International Symposium: Computer Applications in Design, Simulation, and Analysis (1990 : New Orleans, La.)
- Anaheim [Calif.] : Acta Press, [1990]
- Description
- Book — 324 p. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK7888.3 .I58 1990 | Available |
- ISMM International Symposium: Mini and Microcomputers and Their Applications (1990 : Lugano, Switzerland)
- Anaheim, Calif. ; Calgary : ACTA Press, [1990]
- Description
- Book — 294, [2] p. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.5 .I419 1990 | Available |
- ISMM International Symposium: Mini and Microcomputers and Their Applications (1984 : San Francisco, Calif.)
- Anaheim [Calif.] ; Calgary : Acta Press, [1984]
- Description
- Book — 78 p. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.5 .I838 1984 | Available |
17. Datenbanken : Kompaktkurs [2020]
- Heuer, Andreas, 1959-
- [Place of publication not identified] : MITP, 2020.
- Description
- Book — 1 online resource
- Summary
-
- Cover
- Inhaltsverzeichnis
- Vorwort
- Was sind Datenbanken?
- Warum Datenbanken?
- Datenbanksysteme
- Anforderungen: Die Codd'schen Regeln
- DBMS-Architektur
- Datenunabhängigkeit
- Transaktionen
- Konkrete Datenbankmanagementsysteme
- Einsatzgebiete und Grenzen
- Beispielanwendungen
- Übersicht über die Kapitel des Buches
- Übungsaufgaben
- Relationale Datenbanken
- Daten als Tabellen
- Relationen für tabellarische Daten
- Integritätsbedingungen: Schlüssel und Fremdschlüssel
- Tabellendefinition in SQL
- Anfrageoperationen auf Tabellen
- Selektion
- Projektion
- Natürlicher Verbund -3mu
- Umbenennung
- Mengenoperationen,
- Anfragen in SQL
- Änderungsoperationen in SQL
- Zusammenfassung
- Übungsaufgaben
- Das Entity-Relationship- Modell
- Eigenschaften von Datenbankmodellen
- Einführung in das Entity-Relationship-Modell
- Grundkonzepte
- Ein einfaches Beispiel für ein ER-Schema
- ER-Modellierungskonzepte
- Wert und Attribut
- Entity und Entity-Typ
- Beziehung und Beziehungstyp
- Identifizierung durch Schlüssel
- Kardinalitäten
- n:m-Beziehung
- 1:n-Beziehung
- 1:1-Beziehung
- Optionale und zwingende Beziehungen
- Abhängige Entity-Typen
- Die Ist-Beziehung
- Alternative Notationen für Kardinalitäten
- Zusammenfassung
- Übungsaufgaben
- Datenbankentwurf
- Der Datenbankentwurfsprozess
- Ziele des Datenbankentwurfs
- Das Phasenmodell
- Formalisierung des Relationenmodells
- Logischer Datenbankentwurf: Abbildung auf Relationen
- Übersicht über die Abbildungsregeln
- Abbildung von Entity-Typen
- Abbildung von Beziehungstypen
- Abbildung eines abhängigen Entity-Typs
- Abbildung der Ist-Beziehung
- Komplexere Beispiele
- Zusammenfassung
- Übungsaufgaben
- Normalisierung für eine redundanzfreie Datenbank
- Funktionale Abhängigkeiten
- Schema-Eigenschaften
- Update-Anomalien
- Erste Normalform
- Zweite Normalform
- Dritte Normalform
- Boyce-Codd-Normalform
- Minimalität
- Transformationseigenschaften
- Abhängigkeitstreue
- Verbundtreue
- Mehrwertige Abhängigkeiten
- Definition der mehrwertigen Abhängigkeit
- Vierte Normalform
- Zusammenfassung
- Übungsaufgaben
- Datendefinition und Updates in SQL
- Datendefinition in SQL
- Die create table-Klausel
- Die create domain-Klausel
- Die Klauseln alter und drop
- Änderungsoperationen in SQL
- Die insert-Klausel
- Die update-Klausel
- Die delete-Klausel
- Zusammenfassung
- Übungsaufgaben
- Anfragen in SQL
- Kriterien für Anfragesprachen
- Der SFW-Block
- Auswahl von Tabellen: Die from-Klausel
- Kartesisches Produkt
- Verbunde als explizite Operatoren
- Projektionsattribute: Die select-Klausel
- Selektionsbedingungen: Die where-Klausel
- Verbundbedingung
- Schachtelung von Anfragen
- Mengenoperationen
- Mächtigkeit des SQL-Kerns
- Weitere Verbunde in SQL
- Äußere Verbunde
- Selbstverbunde
- Weitere Selektionen in SQL
18. Upgrading and repairing PCs [2015]
- Mueller, Scott, on-screen presenter.
- 22nd edition. - [Place of publication not identified] : Que, 2015.
- Description
- Video — 1 online resource (1 streaming video file ( hr., min., sec.)) : digital, sound, color
- Summary
-
"Learn from the undisputed PC hardware champion, Scott Mueller! This two-hour, studio-quality how-to video is playable on your DVD player or computer! In this video, Scott Mueller delivers a complete seminar on PC troubleshooting, teaching you how to identify and resolve an array of common and not-so-common PC problems. Scott provides detailed explanations for all the tools that should be standard issue part of any PC toolkit, as well as explaining critical rules you should follow to safely operate on your PC's internal components. In these videos, Scott ensures that you are equipped to handle any PC hardware problem. From there, Scott takes you through a complete disassembly of an All-in-One (AiO) system, showing just what you can do to keep these specialized systems running smoothly. Finally, Scott gives you a detailed look at today's ultra-fast, solid-state disk drives (SSD) and the benefits they bring to modern systems."--Resource description page.
19. PC hardware in a nutshell [2002]
- Thompson, Robert Bruce.
- 2nd ed. - Sebastopol, CA : O'Reilly, 2002.
- Description
- Book — 1 online resource (xxiii, 780 pages) : illustrations Digital: text file.
- Summary
-
Carefully researched and written, PC Hardware in a Nutshell, 2nd Edition is packed with useful and unbiased information, including how-to advice for specific components, ample reference material, and a comprehensive case study on building a PC. To the point yet complete, this book provides an enormous amount of timeless information intended for anyone who buys, builds, upgrades, or repairs PCs in a corporate, small business, or home setting. In addition to coverage of the fundamentals and general tips about working on PCs, this book includes chapters focusing on motherboards, processors, memory, floppies, hard drives, optical drives, tape devices, video devices, input devices, audio components, communications, power supplies, and maintenance. Special emphasis is given to upgrading and troubleshooting existing equipment so you can get the most from your existing investments. This new edition is expanded to include: Detailed information about the latest motherboards and chipsets from AMD, Intel, SiS, and VIA Extensive coverage of the Pentium 4 and the latest AMD processors, including the Athlon XP/MP Full details about new hard drive standards, including the latest SCSI standards, ATA/133, Serial ATA, and the new 48-bit "Big Drive" ATA interface Extended coverage of DVD drives, including DVD-RAM, DVD-R/RW, and DVD+R/RW Details about Flat Panel Displays, including how to choose one (and why you might not want to) New chapters on serial communications, parallel communications, and USB communications (including USB 2.0) Enhanced troubleshooting coverage PC Hardware in a Nutshell, 2nd Edition provides independent, useful and practical information in a no-nonsense manner with specific recommendations on components. Based on real-world testing over time, it will help you make intelligent, informed decisions about buying, building, upgrading, and repairing PCs in a cost effective manner that will help you maximize new or existing computer hardware systems
20. Upgrading and repairing PCs [2013]
- Mueller, Scott.
- 21st ed. - Indianapolis, Ind. : Que, ©2013.
- Description
- Book — 1 online resource (x, 1107 pages) : illustrations
- Summary
-
- Development of the PC
- PC Components, Features, and System Design
- Processor Types and Specifications
- Motherboards and Buses
- BIOS
- Memory
- The ATA/IDE Interface
- Magnetic Storage Principles
- Hard Disk Storage
- Flash and Removable Storage
- Optical Storage
- Video Hardware
- Audio Hardware
- External I/O Interfaces
- Input Devices
- Internet Connectivity
- Local Area Networking
- Power Supplies
- Building or Upgrading Systems
- PC Diagnostics, Testing, and Maintenance.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.