Mobile Computer Technicians





imageedit_5_3949838586

Website Investments

Mobile Computer Technicians

Computer Repair - Microsoft - DIY Computer - Build Computer

Repair Computer - Computer Memory - Fix Computer - Computer Virus






A Math Journey Through Computer Games

RRP $19.95

Click on the Google Preview image above to read some pages of this book!

Fun pictograms and infographics about computer games make learning about math topics such as ratios, speed, distance, time, volume, percentages, and equations easy and fun. In this book, readers are presented with several computer game scenarios and must use their mathematical skills to solve equations to up their scores. Math puzzles and exercises help children build confidence in their math skills.


Analyzing Computer Security

RRP $261.99

Click on the Google Preview image above to read some pages of this book!

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 


Computer Vision

RRP $24.95

Click on the Google Preview image above to read some pages of this book!

Computer Vision: A Modern Approach, 2e, is appropriate for upper-division undergraduate- and graduate-level courses in computer vision found in departments of Computer Science, Computer Engineering and Electrical Engineering.


This textbook provides the most complete treatment of modern computer vision methods by two of the leading authorities in the field. This accessible presentation gives both a general view of the entire computer vision enterprise and also offers sufficient detail for students to be able to build useful applications. Students will learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods


Linh Builds A Tower

RRP $17.99

Click on the Google Preview image above to read some pages of this book!

This fiction STEM and STEAM title provides emerging readers the chance to experience a range of science, technology, engineering, art, and/or math subject matter at their ability level. When paired with its nonfiction counterpart, the reader gains two perspectives for analysis on the same topic from different sources.


Foundations Of Computer Science

RRP $241.99

Click on the Google Preview image above to read some pages of this book!

Foundations of Computer Science: From Data Manipulation to Theory of Computation successfully provides students with an overview of the many specializations within the field of computer science. Although many incoming freshman students are familiar with computers, they are often unaware of the broad field of computer science beyond the task of programming. Behrouz Forouzan has developed a five-part approach to introduce students to different aspects of the discipline without overwhelming them with technical detail. These topics include computer and data, computer hardware, computer software, data organization, and advanced topics. Throughout the book, Forouzan emphasizes the concept rather than the mathematical model, and difficult topics are supplemented with visual aids as needed to help students grasp concepts.



Search

Mobile Computer Technicians Articles

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians Books

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians





imageedit_5_3949838586

Website Investments