Computer insecurity -- Many current computer systems have only limited security precautions in place. Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite ... > full article
Security engineering -- Security engineering is the field of engineering dealing with the security and integrity of real-world systems. It is similar to systems engineering in that its motivation is to make a system meet ... > full article
Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer use.
The means traditionally taken to realize this objective is to attempt to create a ... > full article
Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article
Computer virus -- A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a ... > full article
Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article
Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article
Computing -- Originally, the word computing was synonymous with counting and calculating, and a science that deals with the original sense of computing mathematical ... > full article
Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article
Quantum computer --
A quantum computer is any device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. In a ... > full article
Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more
Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more
MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more
The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more
Automation, Production Systems, and Computer-Integrated Manufacturing (2nd Edition)
NEW ORGANIZATION. The second edition consists of five parts, following two introductory chapters: I. Automation and control technologies: industrial computer control, control system components, ... > read more
Decoding the Universe: How the New Science of Information Is Explaining Everything in the Cosmos, from Our Brains to Black Holes
As Charles Seife reveals in this energetic new book, information theory, once the province of philosophers and linguists, has emerged as the crucial science of our time, shedding new light on the ... > read more
Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more
Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more
Multivariate Data Analysis (6th Edition)
Well-suited for the non-statistician, this applications-oriented introduction to multivariate analysis focuses on the fundamental concepts that affect the use of specific techniques rather than the ... > read more
LabVIEW for Data Acquisition
Preface I've been interested in gadgets and computers since grade school, particularly gadgets connected to computers. My first real gadget-to-computer project, at age 16, was an alarm for my car ... > read more