Computing essentials 2000-2001


Book Description




Computer Networking Essentials


Book Description

"Computer Networking Essentials" starts with an introduction to networking concepts. Readers learn computer networking terminology and history, and then dive into the technical concepts involved in sharing data across a computer network.







Just the Computer Essentials


Book Description

"Just the Computer Essentials" will help readers understand exactly what they need to know when buying a new PC. The text discusses protecting the computer from dangers such as viruses, spyware, spam, and phishing, and how to set up a backup strategy to safeguard files. (Computer Books - Operating Systems)




McGraw-Hill Computing Essentials


Book Description







Computer Forensics


Book Description

Every computer crime leaves tracks–you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity. Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding. Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process–from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered. This book provides a detailed methodology for collecting, preserving, and effectively using evidence by addressing the three A's of computer forensics: Acquire the evidence without altering or damaging the original data. Authenticate that your recorded evidence is the same as the original seized data. Analyze the data without modifying the recovered data. Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.




A History of Modern Computing, second edition


Book Description

From the first digital computer to the dot-com crash—a story of individuals, institutions, and the forces that led to a series of dramatic transformations. This engaging history covers modern computing from the development of the first electronic digital computer through the dot-com crash. The author concentrates on five key moments of transition: the transformation of the computer in the late 1940s from a specialized scientific instrument to a commercial product; the emergence of small systems in the late 1960s; the beginning of personal computing in the 1970s; the spread of networking after 1985; and, in a chapter written for this edition, the period 1995-2001. The new material focuses on the Microsoft antitrust suit, the rise and fall of the dot-coms, and the advent of open source software, particularly Linux. Within the chronological narrative, the book traces several overlapping threads: the evolution of the computer's internal design; the effect of economic trends and the Cold War; the long-term role of IBM as a player and as a target for upstart entrepreneurs; the growth of software from a hidden element to a major character in the story of computing; and the recurring issue of the place of information and computing in a democratic society. The focus is on the United States (though Europe and Japan enter the story at crucial points), on computing per se rather than on applications such as artificial intelligence, and on systems that were sold commercially and installed in quantities.




Essentials of Patient Education


Book Description

As patient education is a fundamental component of nursing practice, this text prepares nurses for their increasing roles in patient teaching, health promotion and education. This application-based text addresses the needs and characteristics of the learner and discusses relevant instructional approaches.