本書內容包含1. Introduction to Computers2. The Internet and World Wide Web3. Application Software4. The Components of the System Unit5. Input6. Output7. Storage8. Operating Systems and Utility Programs9. Co
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to t
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY covers all aspects of computer networking. Hardware details such as the o
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough int
COMPTIA SECURITY+ SY0-401 IN DEPTH will prepare you to pass CompTIA's new Security+ certification exam and earn this important credential in the field of computer security. Using the proven In Depth c
Data communications and computer networks are vital in today's business world. Whether your career entails business management, computer programming, system design, or a related area, DATABASE COMMUNI
Cyber Safety covers the basics of computer security useful for typical computer users, including the five components of IT Security: firewalls, anti-virus, IDS, networking, and web security. This bo
For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my co
COMPUTER ORGANIZATION AND ARCHITECTURE: THEMES AND VARIATIONS stresses the structure of the complete system (CPU, memory, buses and peripherals) and reinforces that core content with an emphasis on di
This text by Shetty and Kolk, blends the pertinent aspects of mechatronics--system modeling, simulation, sensors, actuation, real-time computer interfacing, and control--into a single unified result s
This text by Shetty and Kolk, blends the pertinent aspects of mechatronics--system modeling, simulation, sensors, actuation, real-time computer interfacing, and control--into a single unified result
This textbook introduces students to computers, applications, and concepts. It explains computer hardware and software; networks and the Internet, including security and privacy; and Microsoft Windows
The United States government is reorganizing to increase domestic security. How will these changes impact the American criminal justice system ? DEFENDING THE HOMELAND: DOMESTIC INTELLIGENCE, LAW ENFO
Just getting started in the computer world? This introductory text, CENTURY 21?, JR. COMPUTER APPLICATIONS WITH KEYBOARDING, 3E is the perfect companion for navigation of computer basics, file managem
ELECTRICAL ENGINEERING IN CONTEXT: SMART DEVICES, ROBOTS & COMMUNICATIONS by bestselling author Roman Kuc describes the basic components and technologies that make today's computer-assisted system
PRACTICAL COMPUTER LITERACY provides clear, comprehensive instruction on the basics of computer literacy. This convenient, reader-friendly text integrates computer concepts, Microsoft Office 2013 appl
Get Synched! Learning happens when students and instructors effectively connect and communicate. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2013 makes it possible. This edition goes beyond the computer bas
INVITATION TO COMPUTER SCIENCE is a well-respected text that provides an overview of the computer science field. Using a flexible, non-language specific model, INVITATION TO COMPUTER SCIENCE offers a
With an innovative approach that leverages the power of the Maple computer algebra system as an analytical tool, MATHEMATICAL MODELING WITH MAPLE offers an effective introduction to mathematical model
Be introduced to computer concepts with COMPUTER CONCEPTS ? ILLUSTRTATED ESSENTIALS. This concise book is the provides the perfect foundation for any technology-focused course.
Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program
This course package addresses most aspects of the modern computer and its applications (computer literacy, Internet, input, output, storage, operating systems and software, networks, keyboarding, Micr
Looking for a keyboarding book without all the extra applications? APPLIED COMPUTER KEYBOARDING 6E is a one-semester new-key-learning text with basic word processing and document formatting. Computer
●CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALS (CISSP) AND CERTIFIED INFORMATION SECURITY MANAGERS (CISM) INFORMATION INTEGRATED THROUGHOUT. The authors have carefully incorporated both CISSP a
Companies today routinely utilize computer models to help make decisions. These models take many forms, from simple spreadsheets to sophisticated computer simulations. The chief underlying reason for
Learn computer concepts and applications YOUR way with the unique CMPTR and CMPTR ONLINE. CMPTR's easy-reference, paperback book presents course content through visually engaging chapters as well as C
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition
One of the fastest growing issues in Information Technology (IT) is the increasing need for security, both internal and external, to protect valuable enterprise data and resources. IT security is a mu
Now you can master today's most important computer concepts as well as key Microsoft Office 2013 skills with the user-friendly approach found in ENHANCED COMPUTER CONCEPTS AND MICROSOFT OFFICE 2010 IL
CISSP GUIDE TO SECURITY ESSENTIALS, Second Edition, provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems Security Profession
TECHNOLOGY NOW: YOUR COMPANION TO SAM COMPUTER CONCEPTS helps students learn computer concepts that are essential for success in the workplace today. Technology Now aligns perfectly with the SAM Compu
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Comput
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Comput
HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoft Windows 2000,
MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. B
GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techni
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Comput
Computer Concepts Illustrated is designed to help students learn and retain the most relevant and essential information about computers and technology in today's digital world! This edition has been r
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Comput
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Comput