Computing essentials 2000-2001
Author : Timothy J. O'Leary
Publisher :
Page : 369 pages
File Size : 49,93 MB
Release : 2000-04-01
Category : Computers
ISBN : 9780072361681
Author : Timothy J. O'Leary
Publisher :
Page : 369 pages
File Size : 49,93 MB
Release : 2000-04-01
Category : Computers
ISBN : 9780072361681
Author : O'Leary
Publisher :
Page : 276 pages
File Size : 44,95 MB
Release : 1999-02
Category : Computers
ISBN : 9780073655550
Author : James A. White
Publisher : IROL Press, LLC
Page : 290 pages
File Size : 38,1 MB
Release : 2007-05
Category : Computers
ISBN : 0979297168
"Just the Computer Essentials" will help readers understand exactly what they need to know when buying a new PC. The text discusses protecting the computer from dangers such as viruses, spyware, spam, and phishing, and how to set up a backup strategy to safeguard files. (Computer Books - Operating Systems)
Author : Debra Littlejohn Shinder
Publisher : Cisco Press
Page : 772 pages
File Size : 46,46 MB
Release : 2001
Category : Computers
ISBN : 9781587130380
"Computer Networking Essentials" starts with an introduction to networking concepts. Readers learn computer networking terminology and history, and then dive into the technical concepts involved in sharing data across a computer network.
Author : Timothy J. O'Leary
Publisher : McGraw-Hill Companies
Page : 276 pages
File Size : 48,59 MB
Release : 1991
Category : Computers
ISBN : 9780070488021
Author : Warren G. Kruse II
Publisher : Pearson Education
Page : 729 pages
File Size : 25,81 MB
Release : 2001-09-26
Category : Computers
ISBN : 0672334089
Every computer crime leaves tracks–you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity. Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding. Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process–from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered. This book provides a detailed methodology for collecting, preserving, and effectively using evidence by addressing the three A's of computer forensics: Acquire the evidence without altering or damaging the original data. Authenticate that your recorded evidence is the same as the original seized data. Analyze the data without modifying the recovered data. Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.
Author : McGraw-Hill Higher Education
Publisher :
Page : pages
File Size : 23,65 MB
Release : 2000-04-01
Category :
ISBN : 9780072389555
Author : Paul E. Ceruzzi
Publisher : MIT Press
Page : 468 pages
File Size : 50,46 MB
Release : 2003-04-08
Category : Technology & Engineering
ISBN : 9780262532037
From the first digital computer to the dot-com crash—a story of individuals, institutions, and the forces that led to a series of dramatic transformations. This engaging history covers modern computing from the development of the first electronic digital computer through the dot-com crash. The author concentrates on five key moments of transition: the transformation of the computer in the late 1940s from a specialized scientific instrument to a commercial product; the emergence of small systems in the late 1960s; the beginning of personal computing in the 1970s; the spread of networking after 1985; and, in a chapter written for this edition, the period 1995-2001. The new material focuses on the Microsoft antitrust suit, the rise and fall of the dot-coms, and the advent of open source software, particularly Linux. Within the chronological narrative, the book traces several overlapping threads: the evolution of the computer's internal design; the effect of economic trends and the Cold War; the long-term role of IBM as a player and as a target for upstart entrepreneurs; the growth of software from a hidden element to a major character in the story of computing; and the recurring issue of the place of information and computing in a democratic society. The focus is on the United States (though Europe and Japan enter the story at crucial points), on computing per se rather than on applications such as artificial intelligence, and on systems that were sold commercially and installed in quantities.
Author : Susan Bacorn Bastable
Publisher : Jones & Bartlett Learning
Page : 532 pages
File Size : 48,99 MB
Release : 2006
Category : Medical
ISBN : 9780763748425
As patient education is a fundamental component of nursing practice, this text prepares nurses for their increasing roles in patient teaching, health promotion and education. This application-based text addresses the needs and characteristics of the learner and discusses relevant instructional approaches.
Author :
Publisher :
Page : 2068 pages
File Size : 44,51 MB
Release : 2002
Category : Books
ISBN :