ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer science illuminated.

دانلود کتاب علوم کامپیوتر روشن شد.

Computer science illuminated.

مشخصات کتاب

Computer science illuminated.

ویرایش: 7th Rev. ed. 
 
سری:  
ISBN (شابک) : 9781284155617, 1284155617 
ناشر: Jones & Bartlett Learning 
سال نشر: 2013 
تعداد صفحات: 725 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 64 مگابایت 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Computer science illuminated. به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علوم کامپیوتر روشن شد. نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Computer Science Illuminated
Copyright
Contents
1 Laying the Groundwork
	Chapter 1 The Big Picture
		1.1 Computing Systems
			Layers of a Computing System
			Abstraction
		1.2 The History of Computing
			A Brief History of Computing Hardware
			A Brief History of Computing Software
			Predictions
		1.3 Computing as a Tool and a Discipline
			The Big Ideas of Computing
		Summary
		Ethical Issues: Digital Divide
		Key Terms
		Exercises
		Thought Questions
2 The Information Layer
	Chapter 2 Binary Values and Number Systems
		2.1 Numbers and Computing
		2.2 Positional Notation
			Binary, Octal, and Hexadecimal
			Arithmetic in Other Bases
			Power-of-2 Number Systems
			Converting from Base 10 to Other Bases
			Binary Values and Computers
		Summary
		Ethical Issues: The FISA Court
		Key Terms
		Exercises
		Thought Questions
	Chapter 3 Data Representation
		3.1 Data and Computers
			Analog and Digital Data
			Binary Representations
		3.2 Representing Numeric Data
			Representing Negative Values
			Representing Real Numbers
		3.3 Representing Text
			The ASCII Character Set
			The Unicode Character Set
			Text Compression
		3.4 Representing Audio Data
			Audio Formats
			The MP3 Audio Format
		3.5 Representing Images and Graphics
			Representing Color
			Digitized Images and Graphics
			Vector Representation of Graphics
		3.6 Representing Video
			Video Codecs
		Summary
		Ethical Issues: The Fallout from Snowden’s Revelations
		Key Terms
		Exercises
		Thought Questions
3 The Hardware Layer
	Chapter 4 Gates and Circuits
		4.1 Computers and Electricity
		4.2 Gates
			NOT Gate
			AND Gate
			OR Gate
			XOR Gate
			NAND and NOR Gates
			Review of Gate Processing
			Gates with More Inputs
		4.3 Constructing Gates
			Transistors
		4.4 Circuits
			Combinational Circuits
			Adders
			Multiplexers
		4.5 Circuits as Memory
		4.6 Integrated Circuits
		4.7 CPU Chips
		Summary
		Ethical Issues: Codes of Ethics
		Key Terms
		Exercises
		Thought Questions
	Chapter 5 Computing Components
		5.1 Individual Computer Components
		5.2 The Stored-Program Concept
			von Neumann Architecture
			The Fetch–Execute Cycle
			RAM and ROM
			Secondary Storage Devices
			Touch Screens
		5.3 Embedded Systems
		5.4 Parallel Architectures
			Parallel Computing
			Classes of Parallel Hardware
		Summary
		Ethical Issues: Is Privacy a Thing of the Past?
		Key Terms
		Exercises
		Thought Questions
4 The Programming Layer
	Chapter 6 Low-Level Programming Languages and Pseudocode
		6.1 Computer Operations
		6.2 Machine Language
			Pep/9: A Virtual Computer
			Input and Output in Pep/9
		6.3 A Program Example
			Pep/9 Simulator
			Another Machine-Language Example
		6.4 Assembly Language
			Pep/9 Assembly Language
			Numeric Data, Branches, and Labels
			Loops in Assembly Language
		6.5 Expressing Algorithms
			Pseudocode Functionality
			Following a Pseudocode Algorithm
			Writing a Pseudocode Algorithm
			Translating a Pseudocode Algorithm
		6.6 Testing
		Summary
		Ethical Issues: Software Piracy
		Key Terms
		Exercises
		Thought Questions
	Chapter 7 Problem Solving and Algorithms
		7.1 How to Solve Problems
			Ask Questions
			Look for Familiar Things
			Divide and Conquer
			Algorithms
			Computer Problem-Solving Process
			Summary of Methodology
			Testing the Algorithm
		7.2 Algorithms with Simple Variables
			An Algorithm with Selection
			Algorithms with Repetition
		7.3 Composite Variables
			Arrays
			Records
		7.4 Searching Algorithms
			Sequential Search
			Sequential Search in a Sorted Array
			Binary Search
		7.5 Sorting
			Selection Sort
			Bubble Sort
			Insertion Sort
		7.6 Recursive Algorithms
			Subprogram Statements
			Recursive Factorial
			Recursive Binary Search
			Quicksort
		7.7 Important Threads
			Information Hiding
			Abstraction
			Naming Things
			Testing
		Summary
		Ethical Issues: Open-Source Software
		Key Terms
		Exercises
		Thought Questions
	Chapter 8 Abstract Data Types and Subprograms
		8.1 What Is an Abstract Data Type?
		8.2 Stacks
		8.3 Queues
		8.4 Lists
		8.5 Trees
			Binary Trees
			Binary Search Trees
			Other Operations
		8.6 Graphs
			Creating a Graph
			Graph Algorithms
		8.7 Subprograms
			Parameter Passing
			Value and Reference Parameters
		Summary
		Ethical Issues: Workplace Monitoring
		Key Terms
		Exercises
		Thought Questions
	Chapter 9 Object-Oriented Design and High-Level Programming Languages
		9.1 Object-Oriented Methodology
			Object Orientation
			Design Methodology
			Example
		9.2 Translation Process
			Compilers
			Interpreters
		9.3 Programming Language Paradigms
			Imperative Paradigm
			Declarative Paradigm
		9.4 Functionality in High-Level Languages
			Boolean Expressions
			Data Typing
			Input/Output Structures
			Control Structures
		9.5 Functionality of Object-Oriented Languages
			Encapsulation
			Classes
			Inheritance
			Polymorphism
		9.6 Comparison of Procedural and Object-Oriented Designs
		Summary
		Ethical Issues: Hoaxes and Scams
		Key Terms
		Exercises
		Thought Questions
5 The Operating Systems Layer
	Chapter 10 Operating Systems
		10.1 Roles of an Operating System
			Memory, Process, and CPU Management
			Batch Processing
			Timesharing
			Other OS Factors
		10.2 Memory Management
			Single Contiguous Memory Management
			Partition Memory Management
			Paged Memory Management
		10.3 Process Management
			The Process States
			The Process Control Block
		10.4 CPU Scheduling
			First Come, First Served
			Shortest Job Next
			Round Robin
		Summary
		Ethical Issues: Medical Privacy: HIPAA
		Key Terms
		Exercises
		Thought Questions
	Chapter 11 File Systems and Directories
		11.1 File Systems
			Text and Binary Files
			File Types
			File Operations
			File Access
			File Protection
		11.2 Directories
			Directory Trees
			Path Names
		11.3 Disk Scheduling
			First-Come, First-Served Disk Scheduling
			Shortest-Seek-Time-First Disk Scheduling
			SCAN Disk Scheduling
		Summary
		Ethical Issues: Privacy: Opt-In or Opt-Out?
		Key Terms
		Exercises
		Thought Questions
6 The Applications Layer
	Chapter 12 Information Systems
		12.1 Managing Information
		12.2 Spreadsheets
			Spreadsheet Formulas
			Circular References
			Spreadsheet Analysis
		12.3 Database Management Systems
			The Relational Model
			Relationships
			Structured Query Language
			Database Design
		12.4 E-Commerce
		12.5 Big Data
		Summary
		Ethical Issues: Politics and the Internet
		Key Terms
		Exercises
		Thought Questions
	Chapter 13 Artificial Intelligence
		13.1 Thinking Machines
			The Turing Test
			Aspects of AI
		13.2 Knowledge Representation
			Semantic Networks
			Search Trees
		13.3 Expert Systems
		13.4 Neural Networks
			Biological Neural Networks
			Artificial Neural Networks
		13.5 Natural-Language Processing
			Voice Synthesis
			Voice Recognition
			Natural-Language Comprehension
		13.6 Robotics
			The Sense–Plan–Act Paradigm
			Subsumption Architecture
			Physical Components
		Summary
		Ethical Issues: Initial Public Offerings
		Key Terms
		Exercises
		Thought Questions
	Chapter 14 Simulation, Graphics, Gaming, and Other Applications
		14.1 What Is Simulation?
			Complex Systems
			Models
			Constructing Models
		14.2 Specific Models
			Queuing Systems
			Meteorological Models
			Computational Biology
			Other Models
			Computing Power Necessary
		14.3 Computer Graphics
			How Light Works
			Object Shape Matters
			Simulating Light
			Modeling Complex Objects
			Getting Things to Move
		14.4 Gaming
			History of Gaming
			Creating the Virtual World
			Game Design and Development
			Game Programming
		Summary
		Ethical Issues: Gaming as an Addiction
		Key Terms
		Exercises
		Thought Questions
7 The Communications Layer
	Chapter 15 Networks
		15.1 Networking
			Types of Networks
			Internet Connections
			Packet Switching
		15.2 Open Systems and Protocols
			Open Systems
			Network Protocols
			TCP/IP
			High-Level Protocols
			MIME Types
			Firewalls
		15.3 Network Addresses
			Domain Name System
			Who Controls the Internet?
		15.4 Cloud Computing
		15.5 Blockchain
		Summary
		Ethical Issues: The Effects of Social Networking
		Key Terms
		Exercises
		Thought Questions
	Chapter 16 The World Wide Web
		16.1 Spinning the Web
			Search Engines
			Instant Messaging
			Weblogs
			Cookies
			Web Analytics
		16.2 HTML and CSS
			Basic HTML Elements
			Tag Attributes
			More About CSS
			More HTML5 Elements
		16.3 Interactive Web Pages
			Java Applets
			Java Server Pages
		16.4 XML
		16.5 Social Network Evolution
		Summary
		Ethical Issues: Gambling and the Internet
		Key Terms
		Exercises
		Thought Questions
	Chapter 17 Computer Security
		17.1 Security at All Levels
			Information Security
		17.2 Preventing Unauthorized Access
			Passwords
			CAPTCHA
			Fingerprint Analysis
		17.3 Malicious Code
			Antivirus Software
			Security Attacks
		17.4 Cryptography
		17.5 Protecting Your Information Online
			Corporate Responsibility
			Security and Portable Devices
			WikiLeaks
		Summary
		Ethical Issues: Blogging and Journalism
		Key Terms
		Exercises
		Thought Questions
8 In Conclusion
	Chapter 18 Limitations of Computing
		18.1 Hardware
			Limits on Arithmetic
			Limits on Components
			Limits on Communications
		18.2 Software
			Complexity of Software
			Current Approaches to Software Quality
			Notorious Software Errors
		18.3 Problems
			Comparing Algorithms
			Turing Machines
			Halting Problem
			Classification of Algorithms
		Summary
		Ethical Issues: Therac-25: Anatomy of a Disaster
		Key Terms
		Exercises
		Thought Questions
Glossary
Endnotes
Index




نظرات کاربران