Computer Literacy BASICS

Computer Literacy BASICS PDF Author: Morrison
Publisher:
ISBN: 9781473714908
Category :
Languages : en
Pages :

Get Book Here

Book Description

Computer Literacy BASICS

Computer Literacy BASICS PDF Author: Morrison
Publisher:
ISBN: 9781473714908
Category :
Languages : en
Pages :

Get Book Here

Book Description


How Computers Really Work

How Computers Really Work PDF Author: Matthew Justice
Publisher: No Starch Press
ISBN: 171850067X
Category : Computers
Languages : en
Pages : 394

Get Book Here

Book Description
An approachable, hands-on guide to understanding how computers work, from low-level circuits to high-level code. How Computers Really Work is a hands-on guide to the computing ecosystem: everything from circuits to memory and clock signals, machine code, programming languages, operating systems, and the internet. But you won't just read about these concepts, you'll test your knowledge with exercises, and practice what you learn with 41 optional hands-on projects. Build digital circuits, craft a guessing game, convert decimal numbers to binary, examine virtual memory usage, run your own web server, and more. Explore concepts like how to: Think like a software engineer as you use data to describe a real world concept Use Ohm's and Kirchhoff's laws to analyze an electrical circuit Think like a computer as you practice binary addition and execute a program in your mind, step-by-step The book's projects will have you translate your learning into action, as you: Learn how to use a multimeter to measure resistance, current, and voltage Build a half adder to see how logical operations in hardware can be combined to perform useful functions Write a program in assembly language, then examine the resulting machine code Learn to use a debugger, disassemble code, and hack a program to change its behavior without changing the source code Use a port scanner to see which internet ports your computer has open Run your own server and get a solid crash course on how the web works And since a picture is worth a thousand bytes, chapters are filled with detailed diagrams and illustrations to help clarify technical complexities. Requirements: The projects require a variety of hardware - electronics projects need a breadboard, power supply, and various circuit components; software projects are performed on a Raspberry Pi. Appendix B contains a complete list. Even if you skip the projects, the book's major concepts are clearly presented in the main text.

The Complete Idiot's Guide to Computer Basics, 5th Edition

The Complete Idiot's Guide to Computer Basics, 5th Edition PDF Author: Joe Kraynak
Publisher: Penguin
ISBN: 1101022175
Category : Computers
Languages : en
Pages : 452

Get Book Here

Book Description
Time for an upgrade! The fifth edition of The Complete Idiot's Guide® to Computer Basics places the reader in charge of the computer, rather than the other way around, and places the focus on software troubleshooting rather than hardware techno-babble. The reader wants to do something practical with his or her computer—this book shows them how. • Covers basic office programs and how to manage photo, video, and music files • Advice on safe web-surfing, including coverage of newsgroups, message boards, and mailing lists • New green computing initiatives that help protect the environment • Maintenance and upgrading information

The Secret Guide to Computers

The Secret Guide to Computers PDF Author: Russ Walter
Publisher:
ISBN:
Category : Microcomputers
Languages : en
Pages : 0

Get Book Here

Book Description


Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture

Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture PDF Author: Mark Balch
Publisher: McGraw Hill Professional
ISBN: 0071433473
Category : Technology & Engineering
Languages : en
Pages : 482

Get Book Here

Book Description
YOUR ONE-STOP RESOURCE FOR DIGITAL SYSTEM DESIGN!The explosion in communications and embedded computing technologies has brought with it a host of new skill requirements for electrical and electronics engineers, students, and hobbyists. With engineers expected to have such diverse expertise, they need comprehensive, easy-to-understand guidance on the fundamentals of digital design.Enter McGraw-Hill’s Complete Digital Design. Written by an experienced electrical engineer and networking hardware designer, this book helps you understand and navigate the interlocking components, architectures, and practices necessary to design and implement digital systems. It includes: * Real world implementation of microprocessor-based digital systems * Broad presentation of supporting analog circuit principles * Building complete systems with basic design elements and the latest technologiesComplete Digital Design will teach you how to develop a customized set of requirements for any design problem—and then research and evaluate available components and technologies to solve it. Perfect for the professional, the student, and the hobbyist alike, this is one volume you need handy at all times!What you’ll find inside: * Digital logic and timing analysis * Integrated circuits * Microprocessor and computer architecture * Memory technologies * Networking and serial communications * Finite state machine design * Programmable logic: CPLD and FPGA * Analog circuit basics * Diodes, transistors, and operational amplifiers * Analog-to-digital conversion * Voltage regulation * Signal integrity and PCB design * And more!

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons PDF Author: Carey Parker
Publisher: Apress
ISBN: 1484238524
Category : Computers
Languages : en
Pages : 411

Get Book Here

Book Description
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You’ll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don’t really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves—step by step, without judgment, and with as little jargon as possible.

Guide to Computer Network Security

Guide to Computer Network Security PDF Author: Joseph Migga Kizza
Publisher: Springer Science & Business Media
ISBN: 1848009178
Category : Computers
Languages : en
Pages : 483

Get Book Here

Book Description
If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

The Essential Guide to Computer Hardware

The Essential Guide to Computer Hardware PDF Author: James Edward Keogh
Publisher:
ISBN: 9780130620132
Category : Computer input-output equipment
Languages : en
Pages : 0

Get Book Here

Book Description
Covering both PC and non-PC computing devices, this is the essential guide to the basics of all computer hardware for the non-technical professional. It provides a review of companies in the computer hardware industry and covers Pentium 4, digital cameras, and wireless and mobile communication not found in competing books.

Cloud Security

Cloud Security PDF Author: Ronald L. Krutz
Publisher: John Wiley & Sons
ISBN: 0470938943
Category : Computers
Languages : en
Pages : 1

Get Book Here

Book Description
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches

Programming Persistent Memory

Programming Persistent Memory PDF Author: Steve Scargall
Publisher: Apress
ISBN: 1484249321
Category : Computers
Languages : en
Pages : 387

Get Book Here

Book Description
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times—a huge leap forward in byte-addressable capacity compared with current DRAM offerings. This revolutionary new technology gives applications significant performance and capacity improvements over existing technologies. It requires a new way of thinking and developing, which makes this highly disruptive to the IT/computing industry. The full spectrum of industry sectors that will benefit from this technology include, but are not limited to, in-memory and traditional databases, AI, analytics, HPC, virtualization, and big data. Programming Persistent Memory describes the technology and why it is exciting the industry. It covers the operating system and hardware requirements as well as how to create development environments using emulated or real persistent memory hardware. The book explains fundamental concepts; provides an introduction to persistent memory programming APIs for C, C++, JavaScript, and other languages; discusses RMDA with persistent memory; reviews security features; and presents many examples. Source code and examples that you can run on your own systems are included. What You’ll Learn Understand what persistent memory is, what it does, and the value it brings to the industry Become familiar with the operating system and hardware requirements to use persistent memory Know the fundamentals of persistent memory programming: why it is different from current programming methods, and what developers need to keep in mind when programming for persistence Look at persistent memory application development by example using the Persistent Memory Development Kit (PMDK)Design and optimize data structures for persistent memoryStudy how real-world applications are modified to leverage persistent memoryUtilize the tools available for persistent memory programming, application performance profiling, and debugging Who This Book Is For C, C++, Java, and Python developers, but will also be useful to software, cloud, and hardware architects across a broad spectrum of sectors, including cloud service providers, independent software vendors, high performance compute, artificial intelligence, data analytics, big data, etc.