157.976 results (0,43960 seconds)

Brand

Colour

Size

Gender

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Cyclic and Computer Generated Designs

Computer A History of the Information Machine

Statistical Methods in Computer Security

Computer Ethics

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security Cybersecurity Laws Internet of Things (IoT) and Mobile Devices is an introductory text addressing current technology trends and security issues. While many books on the market cover investigations forensic recovery and presentation of evidence and others explain computer and network security this book explores both explaining the essential principles governing computers wireless and mobile devices the Internet of Things cloud systems and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered investigated and adjudicated unless they are understood. The legal portion of the book is an overview of the legal system in the United States including cyberlaw standards and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances. Key Features: Provides a strong foundation of cybercrime knowledge along with the core concepts of networking computer security Internet of Things (IoTs) and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices cloud computing Software-as-a-Service (SaaS) VMware and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security concepts that are often glossed over in many textbooks and includes the study of cybercrime as critical forward-looking cybersecurity challenges. Cybercrime and Information Technology is a welcome addition to the literature particularly for those professors seeking a more hands-on forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum and is relevant to those studying Security Administration Public Administrations Police Studies Business Administration Computer Science and Information Systems. A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction. | Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

GBP 62.99
1

Dungeons and Desktops The History of Computer Role-Playing Games 2e

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Not only does almost everyone in the civilized world use a personal computer smartphone and/or tablet on a daily basis to communicate with others and access information but virtually every other modern appliance vehicle or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile for example without several computers on board to do everything from monitoring exhaust emissions to operating the anti-lock brakes to telling the transmission when to shift and so on. Appliances such as clothes washers and dryers microwave ovens refrigerators etc. are almost all digitally controlled. Gaming consoles like Xbox PlayStation and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere even when we don’t see them as such and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture and suitable for use in an undergraduate CS EE or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course the reader should be familiar with computer programming concepts in at least one language such as C C++ or Java. Previous courses in operating systems assembly language and/or systems programming would be helpful but are not essential. | Computer Architecture Fundamentals and Principles of Computer Design Second Edition

GBP 56.99
1

Alastair Glass Computer Table - Sigrid Mills

Computer Algebra Concepts and Techniques

Computer Systems Architecture

Computer Systems Architecture

Computer Systems Architecture provides IT professionals and students with the necessary understanding of computer hardware. It addresses the ongoing issues related to computer hardware and discusses the solutions supplied by the industry. The book describes trends in computing solutions that led to the current available infrastructures tracing the initial need for computers to recent concepts such as the Internet of Things. It covers computers’ data representation explains how computer architecture and its underlying meaning changed over the years and examines the implementations and performance enhancements of the central processing unit (CPU). It then discusses the organization hierarchy and performance considerations of computer memory as applied by the operating system and illustrates how cache memory significantly improves performance. The author proceeds to explore the bus system algorithms for ensuring data integrity input and output (I/O) components methods for performing I/O various aspects relevant to software engineering and nonvolatile storage devices such as hard drives and technologies for enhancing performance and reliability. He also describes virtualization and cloud computing and the emergence of software-based systems’ architectures. Accessible to software engineers and developers as well as students in IT disciplines this book enhances readers’ understanding of the hardware infrastructure used in software engineering projects. It enables readers to better optimize system usage by focusing on the principles used in hardware systems design and the methods for enhancing performance.

GBP 44.99
1