31601Introduction to computer science using Python : a computational problem-solving focus
With a focus on computational problem solving from Chapter 1, this text provides numerous hands-on exercises and examples, each chapter ending with a significant-size program demonstrating the step-by-step process of program development, testing, and debugging. A final chapter includes the history of computing, starting with Charles Babbage, containing over 65 historical images. An end-of-book Python 3 Programmers’ Reference is also included for quick lookup of Python details. Extensive instructor materials are provided for those adopting for classroom use, including an instructors’ manual, over 1,000 well-developed slides covering all fundamental topics of each chapter, source code, and test bank.
31602Introduction to computing : DANTES/DSST study guide
This is an unofficial study guide for the Introduction to Computing DANTES / DSST Test. This study guide is 122 pages long and includes 106 sample test questions. You too can pass this popular DANTES test.
31603Introduction to computing systems : from bits and gates to C and beyond : 2nd ed. (New)
1. Welcome aboard; 2. Bits, data types and operations; 3. Digiatal logic strutures; 4.The von N eumann model; 5. The LC-3; 6. Programming; 7. Assembly language; 8. I/O; 9. TRAP routines and subroutines; ...
31604Introduction to computing systems : from bits and gates to C and beyondec: 2nd ed.
We start with the underpinnings that are needed to understand the workings of a real computer. Chapter 2 introduces the bit and arithmetic and logical operations on bit; Chapter 3 takes the student from a MOS transistor, step by step, to a real memory. Chapter 4 introducces the Von Neumann execution model, as a lead-in to chapter 5, the LC-2....Chapters 11 through 19, showing how some of the magic from the students first course can actually be implemented....
31605Introduction to Criminal Justice
Part 1: The foundation of criminal justice; Part 2: Law enforcement; Part 3: The courts; Part 4: Corrections; Part 5: Additional issues in criminal justice.
31606Introduction to cryptography with coding theory : 2nd ed.
It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security.
31607Introduction to Data Acquisition with LabVIEW
This books introduction about data acquisition; Basic DAQ software design and flow control; The Labview environment; DAQ state machines; Input and output.
31608Introduction to Data Acquisition with LabVIEW
This books introduction about data acquisition; Basic DAQ software design and flow control; The Labview environment; DAQ state machines; Input and output.
31609Introduction to data base management in business
Foundations conventional storage files, secondary keys and primitive data bases, level data bases, conceptual data base structures, the codasyl approach to data base management, the relational approach to data base management, query-by-example and other relational features, conceptual data base design, the hierarchical approach to data base systems, total and adabas, data base teleprocessing, management of the data base environment.
31610Introduction to Data Communications and Networking
This text provides students with a thorough introduction to the concepts that underlie networking technology, from physical carrier media to the six most popular protocol suites. Historical material is presented to show the logic behind the development of a given mechanism. Also included are comprehensive discussions of important material, such as B-ISDN and ATM.





