It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-012.mrc:87374361:13944
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-012.mrc:87374361:13944?format=raw

LEADER: 13944cam a2200337Ia 4500
001 5595465
005 20221121191158.0
008 060215s2007 maua b 001 0 eng d
020 $a1418836540
020 $a1423901436
020 $a9781423901433
035 $a(OCoLC)ocm63818827
035 $a(NNC)5595465
035 $a5595465
040 $aVVS$cVVS$dBAKER$dOrLoB-B
050 14 $aQA76.73.J38$bS36 2007
100 1 $aSchneider, G. Michael.$0http://id.loc.gov/authorities/names/n81012465
245 10 $aInvitation to computer science :$bJava version /$cG. Michael Schneider, Judith L. Gersting ; contributing author, Keith Miller.
250 $a3rd ed.
260 $aBoston, Mass. :$bThomson Course Technology,$c2007.
300 $axxiii, 720 pages :$billustrations ;$c26 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
504 $aIncludes bibliographical references and index.
505 00 $gChapter 1.$tAn Introduction to Computer Science -- $g1.1.$tIntroduction -- $g1.2.$tThe Definition of Computer Science -- $tSpecial Interest Box: Abu Ja' far Muhammad ibn Musa Al-Khowarizmi (a.d. 780-850?) -- $tSpecial Interest Box: In the Beginning... -- $g1.3.$tAlgorithms -- $g1.3.1.$tThe Formal Definition of an Algorithm -- $g1.3.2.$tThe Importance of Algorithmic Problem Solving -- $tPractice Problems -- $g1.4.$tA Brief History of Computing -- $g1.4.1.$tThe Early Period: Up to 1940 -- $tSpecial Interest Box: The Original "Technophobia" -- $tSpecial Interest Box: Charles Babbage (1791-1871) Ada Augusta Byron, Countess of Lovelace (1815-1852) -- $g1.4.2.$tThe Birth of Computers: 1940-1950 -- $tSpecial Interest Box: And the Verdict Is... -- $tSpecial Interest Box: John Von Neumann (1903-1957) -- $g1.4.3.$tThe Modern Era: 1950 to the Present -- $tSpecial Interest Box: Good Evening, This Is Walter Cronkite -- $tSpecial Interest Box: The World's First Microcomputer -- $g1.5.$tOrganization of the Text -- $tChallenge Work -- $gLevel 1.$tThe Algorithmic Foundations of Computer Science -- $gChapter 2.$tAlgorithm Discovery and Design -- $g2.1.$tIntroduction -- $g2.2.$tRepresenting Algorithms -- $g2.2.1.$tPseudocode -- $g2.2.2.$tSequential Operations -- $tPractice Problems -- $g2.2.3.$tConditional and Iterative Operations -- $tSpecial Interest Box: From Little Primitives Mighty Algorithms Do Grow -- $tPractice Problems -- $g2.3.$tExamples of Algorithmic Problem Solving -- $g2.3.1.$tExample 1: Go Forth and Multiply -- $tPractice Problems -- $g2.3.2.$tExample 2: Looking, Looking, Looking -- $g2.3.3.$tExample 3: Big, Bigger, Biggest -- $tPractice Problems -- $g2.3.4.$tExample 4: Meeting Your Match -- $tPractice Problems -- $g2.4.$tConclusion -- $tChallenge Work -- $gChapter 3.$tThe Efficiency of Algorithms -- $g3.1.$tIntroduction -- $g3.2.$tAttributes of Algorithms -- $tPractice Problems -- $g3.3.$tMeasuring Efficiency -- $g3.3.1.$tSequential Search -- $g3.3.2.$tOrder of Magnitude-Order n -- $tPractice Problem -- $g3.3.3.$tSelection Sort -- $tPractice Problem -- $g3.3.4.$tOrder of Magnitude-Order n[superscript 2] -- $tSpecial Interest Box: The Tortoise and the Hare -- $tPractice Problem -- $g3.4.$tAnalysis of Algorithms -- $g3.4.1.$tData Cleanup Algorithms -- $tPractice Problems -- $g3.4.2.$tBinary Search -- $tPractice Problem -- $g3.4.3.$tPattern Matching -- $g3.4.4.$tSummary -- $tPractice Problem -- $g3.5.$tWhen Things Get Out of Hand -- $tPractice Problems -- $g3.6.$tSummary of Level 1 -- $tChallenge Work -- $gLevel 2.$tHardware World -- $gChapter 4.$tThe Building BLocks: Binary Numbers, Boolean Logic, and Gates -- $g4.1.$tIntroduction -- $g4.2.$tThe Binary Numbering System -- $g4.2.1.$tBinary Representation of Numeric and Textual Information -- $tPractice Problems -- $g4.2.2.$tBinary Representation of Sound and Images -- $g4.2.3.$tThe Reliability of Binary Representation -- $tPractice Problems -- $g4.2.4.$tBinary Storage Devices -- $g4.3.$tBoolean Logic and Gates -- $g4.3.1.$tBoolean Logic -- $tSpecial Interest Box: Dr. William Shockley (1910-1989) -- $tSpecial Interest Box: George Boole (1815-1864) -- $tPractice Problems -- $g4.3.2.$tGates -- $g4.4.$tBuilding Computer Circuits -- $g4.4.1.$tIntroduction -- $g4.4.2.$tA Circuit Construction Algorithm -- $tPractice Problems -- $g4.4.3.$tExamples of Circuit Design and Construction -- $tPractice Problems -- $g4.5.$tControl Circuits -- $g4.6.$tConclusion -- $tChallenge Work -- $gChapter 5.$tComputer Systems Organization -- $g5.1.$tIntroduction -- $g5.2.$tThe Components of a Computer System -- $g5.2.1.$tMemory and Cache -- $tSpecial Interest Box: Powers of 10 -- $tPractice Problems -- $g5.2.2.$tInput/Output and Mass Storage -- $tPractice Problems -- $g5.2.3.$tThe Arithmetic/Logic Unit -- $g5.2.4.$tThe Control Unit -- $tPractice Problems -- $g5.3.$tPutting All the Pieces Together-the Von Neumann Architecture -- $tSpecial Interest Box: An Alphabet Soup of Speed Measures-MIPS, MFLOPS, MHz, and GHz -- $g5.4.$tNon-Von Neumann Architectures -- $tSpecial Interest Box: Speed to Burn -- $g5.5.$tSummary of LeveL 2 -- $tSpecial Interest Box: Quantum Computing -- $tChallenge Work -- $gLevel 3.$tThe Virtual Machine -- $gChapter 6.$tAn Introduction to System Software and Virtual Machines -- $g6.1.$tIntroduction -- $g6.2.$tSystem Software -- $g6.2.1.$tThe Virtual Machine -- $g6.2.2.$tTypes of System Software -- $g6.3.$tAssemblers and Assembly Language -- $g6.3.1.$tAssembly Language -- $tPractice Problems -- $g6.3.2.$tExamples of Assembly Language Code -- $tPractice Problems -- $g6.3.3.$tTranslation and Loading -- $tPractice Problems -- $g6.4.$tOperating Systems -- $g6.4.1.$tFunctions of an Operating System -- $tSpecial Interest Box: A Machine for the Rest of Us -- $tSpecial Interest Box: Hackers -- $tPractice Problem -- $tSpecial Interest Box: The Open Source Movement -- $g6.4.2.$tHistorical Overview of Operating Systems Development -- $tSpecial Interest Box: Now That's Big! -- $g6.4.3.$tThe Future -- $tChallenge Work -- $gChapter 7.$tComputer Networks, the Internet, and the World Wide Web -- $g7.1.$tIntroduction -- $g7.2.$tBasic Networking Concepts -- $g7.2.1.$tCommunication Links -- $tSpecial Interest Box: Blogs -- $tPractice Problems -- $tSpecial Interest Box: Ubiquitous Computing -- $g7.2.2.$tLocal Area Networks -- $tPractice Problems -- $g7.2.3.$tWide Area Networks -- $g7.2.4.$tOverall Structure of the Internet -- $g7.3.$tCommunication Protocols -- $g7.3.1.$tPhysical Layer -- $g7.3.2.$tData Link Layer -- $tPractice Problems -- $g7.3.3.$tNetwork Layer -- $tPractice Problems -- $g7.3.4.$tTransport Layer -- $g7.3.5.$tApplication Layer -- $g7.4.$tNetwork Services and Benefits -- $tSpecial Interest Box: Spam -- $g7.5.$tA Brief History of the Internet and the World Wide Web -- $g7.5.1.$tThe Internet -- $g7.5.2.$tThe World Wide Web -- $tSpecial Interest Box: Geography Lesson -- $g7.6.$tConclusion -- $g7.7.$tSummary of Level 3 -- $tChallenge Work -- $gLevel 4.$tThe Software World -- $gChapter 8.$tIntroduction to High-level Language Programming -- $g8.1.$tWhere Do We Stand? -- $g8.2.$tHigh-level Languages -- $g8.3.$tIntroduction to Java -- $g8.3.1.$tA Simple Java Program -- $tSpecial Interest Box: Java Is Born -- $g8.3.2.$tRunning a Java Program -- $g8.4.$tVirtual Data Storage -- $tPractice Problems -- $g8.5.$tStatement Types -- $g8.5.1.$tInput Statements -- $tSpecial Interest Box: The Console Class -- $tPractice Problem -- $g8.5.2.$tOutput Statements -- $tPractice Problems -- $g8.5.3.$tThe Assignment Statement -- $tPractice Problems -- $g8.5.4.$tControl Statements -- $tPractice Problems -- $g8.5.5.$tAnother Example -- $tPractice Problems -- $g8.6.$tMeeting Expectations -- $g8.7.$tManaging Complexity -- $g8.7.1.$tDivide and Conquer -- $tSpecial Interest Box: Which Java? -- $g8.7.2.$tUsing Methods -- $g8.7.3.$tWriting Methods -- $tPractice Problems -- $g8.8.$tObject-Oriented Programming -- $g8.8.1.$tWhat Is It? -- $g8.8.2.$tJava and OOP -- $g8.8.3.$tOne More Example -- $g8.8.4.$tWhat Have We Gained? -- $tPractice Problems -- $g8.9.$tGraphical Programming -- $g8.9.1.$tGraphics Hardware -- $g8.9.2.$tGraphics Software -- $tPractice Problem -- $g8.10.$tThe Big Picture: Software Engineering -- $g8.10.1.$tScaling Up -- $g8.10.2.$tThe Software Life Cycle -- $tSpecial Interest Box: Vital Statistics for Real Code -- $g8.10.3.$tModern Environments -- $g8.11.$tConclusion -- $tChallenge Work -- $gChapter 9.$tThe Tower of Babel -- $g9.1.$tWhy Babel? -- $g9.2.$tProcedural Languages -- $g9.2.1.$tFortran -- $tSpecial Interest Box: Old Dog, New Tricks #1 -- $tPractice Problem -- $g9.2.2.$tCobol -- $tPractice Problem -- $g9.2.3.$tC/C++ -- $tPractice Problems -- $g9.2.4.$tAda -- $tPractice Problem -- $g9.2.5.$tC# and .NET -- $tPractice Problem -- $tSpecial Interest Box: Old Dog, New Tricks #2 -- $g9.3.$tSpecial-purpose Languages -- $g9.3.1.$tSQL -- $g9.3.2.$tHTML -- $tSpecial Interest Box: Beyond HTML -- $g9.3.3.$tJavaScript -- $tPractice Problems -- $tSpecial Interest Box: PHP -- $g9.4.$tAlternative Programming Paradigms -- $g9.4.1.$tFunctional Programming -- $tPractice Problems --
505 80 $tSpecial Interest Box: Simplicity Is in the Eye of the Beholder -- $g9.4.2.$tLogic Programming -- $tPractice Problems -- $g9.4.3.$tParallel Programming -- $tPractice Problem -- $g9.5.$tConclusion -- $tSpecial Interest Box: Parallel Computing with Titanium -- $tChallenge Work -- $gChapter 10.$tCompilers and Language Translation -- $g10.1.$tIntroduction -- $g10.2.$tThe Compilation Process -- $g10.2.1.$tPhase I: Lexical Analysis -- $tPractice Problems -- $g10.2.2.$tPhase II: Parsing -- $tPractice Problems -- $tPractice Problems -- $g10.2.3.$tPhase III: Semantics and Code Generation -- $g10.2.4.$tPhase IV: Code Optimization -- $tPractice Problems -- $tSpecial Interest Box: "I Do Not Understand," Said the Machine -- $g10.3.$tConclusion -- $tChallenge Work -- $gChapter 11.$tModels of Computation -- $g11.1.$tIntroduction -- $g11.2.$tWhat Is a Model? -- $tPractice Problems -- $g11.3.$tA Model of a Computing Agent -- $g11.3.1.$tProperties of a Computing Agent -- $g11.3.2.$tThe Turing Machine -- $tSpecial Interest Box: Alan Turing, Brilliant Eccentric -- $tPractice Problems -- $g11.4.$tA Model of an Algorithm -- $g11.5.$tTuring Machine Examples -- $g11.5.1.$tA Bit Inverter -- $g11.5.2.$tA Parity Bit Machine -- $g11.5.3.$tMachines for Unary Incrementing -- $g11.5.4.$tA Unary Addition Machine -- $tPractice Problems -- $g11.6.$tThe Church-Turing Thesis -- $tSpecial Interest Box: The Turing Award -- $g11.7.$tUnsolvable Problems -- $tSpecial Interest Box: Couldn't Do, Can't Do, Never Will Be Able to... -- $tPractice Problems -- $g11.8.$tConclusion -- $g11.9.$tSummary of Level 4 -- $tChallenge Work -- $gLevel 5.$tApplications -- $gChapter 12.$tSimulation and Modeling -- $g12.1.$tIntroduction -- $g12.2.$tComputational Modeling -- $g12.2.1.$tIntroduction to Systems and Models -- $g12.2.2.$tComputational Models, Accuracy, and Errors -- $g12.2.3.$tAn Example of Model Building -- $tPractice Problems -- $g12.3.$tRunning the Model and Visualizing Results -- $g12.4.$tConclusion -- $tSpecial Interest Box: The Mother of all Computations! -- $tChallenge Work -- $gChapter 13.$tElectronic Commerce and Information Security -- $g13.1.$tIntroduction -- $tSpecial Interest Box: Shopping on the Web -- $g13.2.$tE-commerce -- $g13.2.1.$tThe Vision Thing -- $g13.2.2.$tDecisions, Decisions -- $g13.2.3.$tAnatomy of a Transaction -- $tSpecial Interest Box: A Rose by Any Other Name... -- $tSpecial Interest Box: Gone Phishin' -- $g13.2.4.$tDesigning Your Web Site -- $g13.2.5.$tBehind the Scenes -- $tSpecial Interest Box: The Price of Success -- $tPractice Problem -- $g13.3.$tDatabases -- $g13.3.1.$tData Organization -- $g13.3.2.$tDatabase Management Systems -- $g13.3.3.$tOther Considerations -- $tPractice Problems -- $g13.4.$tInformation Security -- $g13.4.1.$tEncryption Overview -- $g13.4.2.$tSimple Encryption Algorithms -- $tPractice Problems -- $g13.4.3.$tDES -- $tSpecial Interest Box: Cracking DES -- $g13.4.4.$tPublic-Key Systems -- $tPractice Problem -- $g13.5.$tConclusion -- $tChallenge Work -- $gChapter 14.$tArtificial Intelligence -- $g14.1.$tIntroduction -- $tSpecial Interest Box: To Whom Am I Speaking? -- $g14.2.$tA Division of Labor -- $g14.3.$tKnowledge Representation -- $tPractice Problem -- $g14.4.$tRecognition Tasks -- $tSpecial Interest Box: Read Me a Story -- $tPractice Problem -- $g14.5.$tReasoning Tasks -- $g14.5.1.$tIntelligent Searching -- $g14.5.2.$tSwarm Intelligence -- $tSpecial Interest Box: The Chess Challenge -- $g14.5.3.$tIntelligent Agents -- $tSpecial Interest Box: ANTS in Space! -- $g14.5.4.$tExpert Systems -- $tPractice Problems -- $g14.6.$tRobotics -- $g14.7.$tConclusion -- $g14.8.$tSummary of Level 5 -- $tSpecial Interest Box: Shall We Dance? -- $tChallenge Work -- $gLevel 6.$tSocial Issues in Computing -- $gChapter 15.$tMaking Decisions about Computers, Information, and Society -- $g15.1.$tIntroduction -- $g15.2.$tCase Studies -- $g15.2.1.$tCase 1: The Story of MP3-Compression Codes, Musicians, and Money -- $tPractice Problems -- $tSpecial Interest Box: The Sound of Music -- $g15.2.2.$tCase 2: PGP: The U.S. Government vs. Phil Zimmermann -- $g15.2.3.$tCase 3: Hackers: Public Enemies or Gadflies? -- $tPractice Problems -- $tSpecial Interest Box: The Cyborg -- $tPractice Problems -- $g15.2.4.$tThinking Straight about Technology and Ethics -- $g15.2.5.$tCase 4: Genetic Information and Medical Research -- $g15.3.$tWhat We Covered and What We Did Not -- $g15.4.$tSummary of Level 6 -- $tAnswers to Practice Problems.
650 0 $aComputer science.$0http://id.loc.gov/authorities/subjects/sh89003285
650 0 $aJava (Computer program language)$0http://id.loc.gov/authorities/subjects/sh95008574
700 1 $aGersting, Judith L.$0http://id.loc.gov/authorities/names/n82036438
700 1 $aMiller, Keith.$0http://id.loc.gov/authorities/names/n79139721
852 00 $boff,eng$hQA76.73.J38$iS36 2007