1 | Advanced Data Communications and Networks By Bill Buchanan, William Buchanan · 2018

 

The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry. Now there is a textbook that discusses data communications and networking in a readable form that can be easily understood by students who will become the IS professionals of the future.Advanced Data Communications and Networks provides a comprehensive and practical treatment of rapidly evolving areas. The text is divided into seven main sections and appendices:"General data compression"Video, images, and sound"Error coding and encryption"TCP/IP and the Internet"Network operating systems"LANs/WANs"Cables and connectorsOther topics include error detection/correction, image/video compression, digital vi.

 

Resource ID #699d52e031fe9 SCIT

2 | ARIS — Business Process Modeling By August-Wilhelm Scheer · 2000

 

ARIS (Architecture of Integrated Information Systems) is a unique and internationally renowned method for optimizing business processes and implementing application systems.

This book describes in detail how ARIS methods model and realize business processes by means of UML (Unified Modeling Language), leading to an information model that is the keystone for a systematic and intelligent method of developing application systems.

Multiple real-world examples - including knowledge management, implementation of workflow systems and standard software solutions (SAP R/3 in particular) - address the deployment of ARIS methods

 

Resource ID #699d489902643 SCIT

3 | Data Mining for Business Applications 2008

 

Data Mining for Business Applications presents state-of-the-art data mining research and development related to methodologies, techniques, approaches and successful applications. The contributions of this book mark a paradigm shift from "data-centered pattern mining" to "domain-driven actionable knowledge discovery (AKD)" for next-generation KDD research and applications. The contents identify how KDD techniques can better contribute to critical domain problems in practice, and strengthen business intelligence in complex enterprise applications. The volume also explores challenges and directions for future data mining research and development in the dialogue between academia and business.

 

Resource ID #699c3d2ec3cf4 SCIT

4 | OBJECT-ORIENTED PROGRAMMING WITH JAVA, SECOND EDITION By SOMASHEKARA, M. T., GURU, D. S., MANJUNATHA, K. S. · 2024

 

This self-explanatory and highly informative text presents an exhaustive coverage of the concepts of Object-Oriented Programming with JAVA. A number of good illustrative examples are provided for each concept supported by well-crafted programs, thus making it useful for even those having no prerequisite knowledge of programming. Beginning from the preliminaries of the language and the basic principles of OOP, this textbook moves gradually towards advanced concepts like exception handling, multithreaded programming, GUI support through AWT controls, string handling, file handling, basic utility classes and collection framework in Java. In addition, the well-planned material in the book acts as a precursor to move towards high-end programming in Java, which includes the discussion of S...

 

Resource ID #699d51487f52f SCIT

5 | Quality in Business Process Modeling By John Krogstie · 2016

 

This book covers the whole spectrum of modeling goals to achieve optimal quality in the process model developed. It focuses on how to balance quality considerations across all semiotic levels when models are used for different purposes, and is based on SEQUAL, a framework for understanding the quality of models and modeling languages, which can take into account all main aspects relating to the quality of models.

Chapter 1 focuses on the theoretical foundations, introducing readers to the topics of business processes and business process modeling, as well as the most important concept underlying the modeling of business processes. In turn, Chapter 2 addresses the quality of models in general and business process models in particular. Chapter 3 contains a specialization of SEQU...

 

Resource ID #699d48289d72d SCIT

6 | UNIX in Easy Steps By Mohammed Azam · 1993

 

Unix In Easy Steps Is An Easy To Read And Act Book On The Unix Operating System. The Approach Is Easy, Lucid And Gets The Student Involved In The Subject. The Reader Whether New To Unix Or An Experienced User Will Find This Book Interesting Because He/She Can Try Out Each Command Or Concept, Which Are Explained With Examples. At The End Of Each Chapter A Number Of Questions Are Put To Help The Reader Make A Self-Assessment Of How Much Of Concepts Have Been Understood. At The End Of The Book You Have A Final Test, Which Is Meant To Test The Best Brains.Unix In Easy Steps Covers The Basic Concepts Of Unix And Also Gives The Reader A Brief View Of Unix Internals. Finally Fast Track , A Comprehensive Listing Of Commands With Their Options And Arguments, Is Provided Which Is An Invaluable Source Of Reference To All Users Of Unix.

 

Resource ID #699c49b020e3e SCIT

7 | A Concise Introduction to Software Engineering By Pankaj Jalote · 2008

 

oftware engineering is an integral part of studies in computer science and consequently foundational knowledge is critical to all students in the field. This text focuses on the essential elements, providing readers with the basic skills and introductory knowledge required to execute a software project successfully.

Following the winning formula and easy-to read style of the author’s previous An Integrated Approach to Software Engineering, this reader-friendly text is written specifically for undergraduates as an introduction to this broad-ranging discipline. With a strong emphasis on practice, this textbook takes a step-by-step approach whereby the key tasks involved in a project are discussed through the course of the book, illustrating the different activities invo...

 

Resource ID #699c4060dbf0d SCIT

8 | A Guide to Understanding Security Modeling in Trusted Systems 1993

 

 

Resource ID #699d549b04986 SCIT

9 | Advanced Introduction to Cybersecurity Law

 

"Elgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business, and law, expertly written by the world's leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. This succinct Advanced Introduction delivers insights into the pressing technological, political, and legal challenges of cybersecurity. Exploring cybersecurity threats on both a national and global scale, it provides guidance on how countries use domestic and international law to counter crime, terrorism, espionage, and armed conflict in cyberspace. Key Features: - Centres cybersecurity law within the internet as a technology, cyberspace

 

Resource ID #66a35e9f22457 SCIT

10 | Agile Web Application Development with Yii1.1 and PHP5 By Jeffrey Winesett · 2010

 

For PHP developers who know object-oriented programming, this book is the fast track to learning the Yii framework. It takes a step-by-step approach to building a complete real-world application 'Äì teaching by practice rather than theory.Key FeaturesA step-by-step guide to creating a modern, sophisticated web application using an incremental and iterative approach to software developmentBuild a real-world, user-based, database-driven project task management application using the Yii development frameworkTake a test-driven design (TDD) approach to software development utilizing the Yii testing frameworkWrite less code by using Yii's application generation and scaffolding toolsEnhance your application by adding Web feeds, adapting it to multiple languages, and by utilizing themes to prov...

 

Resource ID #69a2a80d4280d SCIT

11 | Algorithms Unlocked By Thomas H. Cormen · 2013

 

For anyone who has ever wondered how computers solve problems, an engagingly written guide for nonexperts to the basics of computer algorithms.

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves into your GPS, your laptop, or your smart phone? This book offers an engagingly written guide to the basics of computer algorithms. In Algorithms Unlocked, Thomas Cormen—coauthor of the leading college textbook on the subject—provides a general explanation, with limited mathematics, of how algorithms .

 

Resource ID #699d502b6a4bd SCIT

12 | An Introduction To Artificial Intelligence By Janet Finlay, Alan Dix · 1996

 

An authoritative and accessible one-stop resource, An Introduction to Artificial Intelligence presents the first full examination of AI. Designed to provide an understanding of the foundations of artificial intelligence, it examines the central computational techniques employed by AI, including knowledge representation, search, reasoning, and learning, as well as the principal application domains of expert systems, natural language, vision, robotics, software agents and cognitive modeling. Many of the major philosophical and ethical issues of AI are also introduced.

Throughout the volume, the authors provide detailed, well-illustrated treatments of each topic with abundant examples and exercises. The authors bring this exciting field to life by presenting a substantial and robust introduction to artificial intelligence in a clear and concise coursebook form. This book stands as a core text for all computer scientists approaching AI for the first time.

 

Resource ID #66a38cfbab557 SCIT

13 | An Introduction to Cyber Security A Beginner’s Guide

 

Cybersecurity is undoubtedly one of the fastest-growing fields. However, there is an acute shortage of skilled workforce. The cybersecurity beginners guide aims at teaching security enthusiasts all about organizational digital assets’ security, give them an overview of how the field operates, applications of cybersecurity across sectors and industries, and skills and certifications one needs to build and scale up a career in this field.

 

Resource ID #66a35d401c525 SCIT

14 | Artificial Intelligence and Machine Learning for Real-World Applications A Beginner's Guide with Case Studies By Latesh Malik, Sandhya Arora, Urmila Shrawankar · 2025

 

This book introduces foundational and advanced concepts in artificial intelligence (AI) and machine learning (ML), focusing on their real-world applications and societal implications. Covering topics from knowledge representation and model interpretability to deep learning and generative AI, Artificial Intelligence and Machine Learning for Real-World Applications: A Beginner's Guide with Case Studies includes practical Python implementations and case studies from healthcare, agriculture, and education. Beginning with core concepts such as AI fundamentals, knowledge representation, and statistical techniques, the text gradually advances to cover ML algorithms, deep learning architectures, and the basics of generative AI. Detailed discussions of data preprocessing, model training, eval...

 

Resource ID #699d4b97c1f59 SCIT

15 | Auditing Information Systems By Mario Piattini · 2000

 

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the IS benefits and allow the organization to manage the risks associated with technology. Auditing Information Systems gives a global vision of auditing and control, exposing the major techniques and methods. It provides guidelines for auditing the crucial areas of IT--databases, security, maintenance, quality, and communications.

 

Resource ID #66a368464d231 SCIT

16 | Basics Interactive Design: Interface Design An Introduction to Visual Communication in UI Design By Dave Wood, David Wood · 2014

 

AVA's Basics Interactive Design titles are designed to provide visual arts student with a theoretical and practical exploration of each of the fundamental topics within the discipline of Interactive Design. Packed with examples from students and professionals and fully illutrated with clear diagrams and inspiring imagery, they offer an essential exploration of the subject.

Basics Interactive Design: Interface Design is the first book in the new Basics series. From a visual communication direction, it focuses on the design of effective, user-focused front-end designs for a range of digital media interfaces. Using case studies and interviews to delve deeper, the design of effective visual communication for user interfaces is clearly explained, giving the reader the knowledge needed to design better interactions.

 

Resource ID #699c433f40591 SCIT

17 | Beginning Unix By Paul Love, Joe Merlino, Craig Zimmerman, Jeremy C. Reed, Paul Weinstein · 2005

 

Covering all aspects of the Unix operating system and assuming no prior knowledge of Unix, this book begins with the fundamentals and works from the ground up to some of the more advanced programming techniques The authors provide a wealth of real-world experience with the Unix operating system, delivering actual examples while showing some of the common misconceptions and errors that new users make Special emphasis is placed on the Apple Mac OS X environment as well as Linux, Solaris, and migrating from Windows to Unix A unique conversion section of the book details specific advice and instructions for transitioning Mac OS X, Windows, and Linux users

 

Resource ID #699c4a2590330 SCIT

18 | Big Data in Big Companies By Thomas H. Davenport Jill Dyché. 2013

 

In order to understand this coexistence, we interviewed 20 large organizations in the early months of 2013 about how big data fit in to their overall data and analytics environments. Overall, we found the expected co-existence; in not a single one of these large organizations was big data being managed separately from other types of data and analytics. The integration was in fact leading to a new management perspective on analytics, The integration was in fact leading to a new management perspective on analytics  3.0. In this paper, we will describe the  overall context for how organizations think about big data, the organizational structure and skills required for it..etc. We will conclude by describing the analytic of 3.0 era.

 

Resource ID #66a883d3e444b SCIT

19 | Business Data Communications and Networking By Jerry FitzGerald, Alan Dennis · 2009

 

Over the past few years, many fundamental changes have occurred in data communications and networking that will shape the future for decades to come.

Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field. 

Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared

 

Resource ID #699d527c1a540 SCIT

20 | Business Statistics, 5th Edition By J. K. Sharma · 2019

 

The fifth edition of the book Business Statistics will provide readers an understanding of problem-solving methods, and analysis, thus enabling readers to develop the required skills and apply statistical techniques to decision-making problems.A large number of new business-oriented solved as well as practice problems have been added, thus creating a bank of problems that give a better representation of the various business statistics techniques.

 

Resource ID #699d59fbf33e5 SCIT

21 | Business Statistics: Problems & Solutions By Sharma J.K.

 

This book meets the specific and complete requirements of students pursuing MBA/PGDBM, B.Com., M.Com., MA(Eco), CA, ICWA, BBA, BIS/BIT/BCA, etc., courses, who need to understand the basic concepts of business statistics and apply results directly to real-life business problems. The book also suits the requirements of students who need practical knowledge of the subject, as well as for those preparing for competitive examinations.

 

Resource ID #699d5aa9d1771 SCIT

22 | Challenges of Big Data analysis By Jianqing Fan, Fang Han, Han Liu. 2014

 

Big Data bring new opportunities to modern society and challenges to data scientists. On the one hand, Big Data hold great promises for discovering subtle population patterns and heterogeneities that are not possible with small-scale data. On the other hand, the massive sample size and high dimensionality of Big Data introduce unique computational and statistical challenges, including scalability and storage bottleneck, noise accumulation, spurious correlation, incidental endogeneity and measurement errors. These challenges are distinguished and require new computational and statistical paradigm. This paper gives overviews on the salient features of Big Data and how these features impact on paradigm change on statistical and computational methods as well as computing architectures. We also provide various new perspectives on the Big Data analysis and computation. In particular, we emphasize on the viability of the sparsest solution in high-confidence set and point out that exogenous assumptions in most statistical methods for Big Data cannot be validated due to incidental endogeneity. They can lead to wrong statistical inferences and consequently wrong scientific conclusions.

 

Resource ID #66a880e5c2186 SCIT

23 | CISA Certified Information Systems Auditor Study Guide By David L. Cannon, Timothy S. Bergmann, Brady Pamplin · 2006

 

Demand for qualified and certified information systems (IS) auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification, the one certification designed specifically for IS auditors, and improve your job skills with this valuable book. Not only will you get the valuable preparation you need for the CISA exam, you?ll also find practical information to prepare you for the real world. This invaluable guide contains:

Authoritative coverage of all CISA exam objectives, including:

The IS Audit Process. IT Governance. Systems and Infrastructure Lifecycle Management. IT Service Delivery and Support. Protection of Information Assets. Disaster Recovery and Business Continuity.

Practical information that will prepare you for the real world such as:

Secrets of successful auditing. Government regulations at a glance. Incident handling checklist. Scenarios providing insight into professional audit systems and controls.

Additional exam and career preparation tools such as:

Challenging chapter review questions. A glossary of terms. Tips on preparing for exam day. Information on related certifications.

A free CD-ROM with:

Advanced testing software with challenging chapter review questions plus bonus practice exams so you can test your knowledge. Flashcards that run on your PC, Pocket PC, or Palm handheld. The entire book in searchable and printable PDF.

 

Resource ID #66a36a1978398 SCIT

24 | Computer Application in Business ( Tamil Nadu) By R Parameswaran · 2008

 

It's a great pleasure in presenting this fifth thoroughly revised edition of the book on Computer Applications in Business .In this revised edition,the book includes Operating System,E-Commerece & Internet,System Analysis & Design,Computer based Information System and Database

 

Resource ID #69a28dfb1a6a6 SCIT

25 | Computer Applications In Management By Ritendra Goel · 2003

 

This Book Is Designed As Per The Syllabus Of U.P. Technical University. It Also Covers The Syllabus Of Many Other Universities That Have Similar Course. Wide Range Of Topics Are Covered.Salient Features * Book Covers Most Of The Basics Of Computers That One Must Know. * Even A Layman In Computer Can Pick Up The Concepts Easily. * It Covers Introduction To Computers, Basics Of Hardware And Software, Introduction To Dos And Windows, Ms Office, Basics Of Network, Internet And E-Mail And Dbms Along With Some Part Of Application Of Information System.

 

Resource ID #69a28cffa83f8 SCIT

26 | Computer applications in the social sciences By Edward E. Brent, Ronald E. Anderson · 1990

 

Presenting an introduction to computing and advice on computer applications, this book examines hardware and software with respect to the needs of the social scientist. It offers a framework for the use of computers, with focus on the 'work station', the center of which is a personal computer connected to networks by a telephone-based modem.

 

Resource ID #69a28ee8aa4c2 SCIT

27 | Computer Architecture and Organization (A Practical Approach) By Chopra Rajiv

 

Boolean Algebra And Basic Building Blocks 2. Computer Organisation(Co) Versus Computer Architecture (Ca) 3. Ragister Transfer Language (Rtl) 4. Bus And Memory 5. Instruction Set Architecture (Isa), Cpu Architecture And Control Design 6. Memory, Its Hierarchy And Its Types 7. Input And Output Processinf (Iop) 8. Parallel Processing 9. Computer Arithmetic Appendix A-E Appendix- A-Syllabus And Lecture Plans Appendix-B-Experiments In Csa Lab Appendix-C-Glossary Appendix-D-End Term University Question Papers Appendix-E- Bibliography

 

Resource ID #699d58b357aab SCIT

28 | Computer Fundamentals and Applications By Ashok Arora · 2015

 

With the invention of computers and the advent of the Internet, mobile computing and e-Business applications, Information Technology (IT) has brought rapid progress in domestic and international business, and a tremendous change in the lifestyle of people. This book provides the students not just the knowledge about the fundamentals of a computer system, like its organization, memory management and hardware devices, but also the software that run on it. The book then proceeds to describe operating systems, and the basics of programming concepts like procedure-oriented programming and object-oriented programming. Useful application software like MS Word, MS Excel and MS PowerPoint are described in great detail in separate chapters. A complete section has been devoted to the teaching of d.

 

Resource ID #69a2902417758 SCIT

29 | Computer Fundamentals By Anita Goel · 2010

 

Computer Fundamentals is specifically designed to be used at the beginner level. It covers all the basic hardware and software concepts in computers and its peripherals in a very lucid manner.

 

Resource ID #69a28fb678a13 SCIT

30 | Computer Fundamentals By Manish Soni · 2024

 

In the vast landscape of modern technology, understanding the fundamentals of computing is akin to possessing a master key that unlocks a world of possibilities. This book, dedicated to the exploration of computer fundamentals, serves as your gateway to comprehending the intricacies of these ubiquitous machines. Knowledge of computer fundamentals is not a mere luxury; it is an indispensable tool in the arsenal of modern life. Whether you're a seasoned professional seeking to deepen your understanding or a curious novice embarking on your first foray into the realm of computing, this book is tailored to meet your needs. As your companion in this voyage of discovery, we offer not just knowledge, but guidance. Whether you seek to bolster your technical prowess, embark on a career in tec...

 

Resource ID #69a2909a17d52 SCIT

31 | Computer Maintenance and Repairs Guide By Shane Bentley · 2023

 

Unlock the Secrets to Computer Maintenance with Our Exclusive Guide

Your One-Stop Handbook for Protecting, Repairing, and Optimising Your Computer

Whether you are a beginner just starting out or a seasoned professional looking to enhance your knowledge, our comprehensive computer maintenance book is designed to be your trusted companion. Get ready to dive deep into the world of computer maintenance and emerge with unparalleled understanding and skills.


 

Resource ID #699d4d6fcc14b SCIT

32 | Computer network security By Joseph Migga Kizza · 2005

 

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices ...

 

Resource ID #699c382c84f76 SCIT

33 | Computer Networking and Networks By Susan Shannon · 2006

 

Computer networks remain one of the central aspects of the computer world. This book examines crucial issues and research under the following rubrics: Communication Network Architectures; Communication Network Protocols; Network Services and Applications; Network Security and Privacy; Network Operation and Management; Discrete Algorithms and Discrete Modelling Algorithmic and discrete aspects in the context of computer networking as well as mobile and wireless computing and communications.

 

Resource ID #66a36cd71b630 SCIT

34 | Computer Networks 16th Conference, CN 2009, Wisla, Poland, June 16-20, 2009. Proceedings

 

The continuous and very intense development of IT has resulted in the fast development of computer networks. Computer networks, as well as the entire  subject to constant changes triggered by the general technological advancement and the influence of new IT technologies. These methods and tools of designing and modeling computer networks are becoming more advanced. Above all, the scope of their application is growing thanks to, for example, the results of new research and because of new proposals of application, which not long ago were not even taken into consideration. These new applications stimulate the development of scientist research, as the broader application of system solutions based on computer networks results in a wide range of both theoretical and practical problems. This book proves that and the contents of its chapters concern a variety of topics and issues. Generally speaking, the contents can be divided into several subject groups. The group of contributions concerns new technologies applied in computer networks, particularly those related to nanomolecular and quantum technology.

 

Resource ID #66a36be383854 SCIT

35 | Computer Networks A Systems Approach By Larry L. Peterson, Bruce S. Davie · 2011

 

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions.

This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data.

Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What’s Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises.


 

Resource ID #66a36abb369df SCIT

36 | Computer Organization And Architecture By P N Basu

 

The book covers the syllabi of Computer Organization and Architecture for most of the Indian universities and colleges. The author has carefully arranged the chapters and topics using Education Technology and Courseware Engineering Principles, with proper planning to help self-paced as well as guided learning. Large numbers of examples, solved problems and exercises have been incorporated to help students strengthen their base in the subject. A number of multiple choice questions have been included with answers and explanatory notes. The basic principles have been explained with appropriate lucid descriptions supported by explanatory diagrams and graphics. The advanced principles have been presented with in-depth explanation and relevant examples.

 

Resource ID #699d590db21fc SCIT

37 | Computer Organization and Architecture Hardware and Software Principles By Dr. Deepali A. Godse, A P Godse · 2020

 

The book provides comprehensive coverage of the fundamental concepts of computer organization and architecture. Its focus on real-world examples encourages students to understand how to apply essential organization and architecture concepts in the computing world.The book teaches you both the hardware and software aspects of the computer. It explains computer components and their functions, interconnection structures, bus structures, computer arithmetic, processor organization, memory organization, I/O functions, I/O structures, processing unit organization, addressing modes, instructions, instruction pipelining, instruction-level parallelism, and superscalar processors. The case studies included in the book help readers to relate the learned computer fundamentals with the real-world processors.

 

Resource ID #699d5871b502e SCIT

38 | Concise Guide to Software Engineering From Fundamentals to Application Methods

 

This textbook presents a concise introduction to the fundamental principles of software engineering, together with practical guidance on how to apply the theory in a real-world, industrial environment. The wide-ranging coverage encompasses all areas of software design, management, and quality.

Topics and features: presents a broad overview of software engineering, including software lifecycles and phases in software development, and project management for software engineering; examines the areas of requirements engineering, software configuration management, software inspections, software testing, software quality assurance, and process quality; covers topics on software metrics and problem solving, software reliability and dependability, and software design and development, including Agile approaches; explains formal methods, a set of mathematical techniques to specify and derive a program from its specification, introducing the Z specification language; discusses software process improvement, describing the CMMI model, and introduces UML, a visual modelling language for software systems; reviews a range of tools to support various activities in software engineering, and offers advice on the selection and management of a software supplier; describes such innovations in the field of software as distributed systems, service-oriented architecture, software as a service, cloud computing, and embedded systems; includes key learning topics, summaries and review questions in each chapter, together with a useful glossary.

This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to learn how to build high quality and reliable software on time and on budget. The text also serves as a self-study primer for software engineers, quality professionals, and software managers.

 

Resource ID #66a35873918ea SCIT

39 | Cybercrime and Digital Forensics : An Introduction By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar · 2015

 

The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.
This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:

This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology.

 

 

Resource ID #66a22863b5e07 SCIT

40 | Data Communication And Computer Networks By Rajneesh Agarwal · 2009

 

Data Communication and Computer Networks deals with various aspects of the subject vis-à-vis the emerging trends in network-centric information technology. It provides the reader with an in-depth framework of the fundamental concepts. Networking involves different kinds of personal computers, the operating system, the network adapter, the adapter drivers, cabling, and the protocols connecting these items. Likewise, there are many techniques of data communication such as modulation, multiplexing and analog to digital conversion. Constant demand from IT professionals and individuals leads to rapid and unbounded growth of both data communications and networks in terms of better applications and improved opportunities. This book provides a good learning platform to the people who need to be...

 

Resource ID #699d5222e4e34 SCIT

41 | DATA COMMUNICATIONS AND COMPUTER NETWORKS By PRAKASH C. GUPTA · 2006

 

Primarily intended as a text for undergraduate courses in Electronics and Communications Engineering, Computer Science, IT courses, and Computer Applications, this up-to-date and accessible text gives an indepth analysis of data communications and computer networks in an easy-to-read style. Though a new title, it is a completely revised and fully updated version of the author's earlier book Data Communications. The rapid strides made during the last decade in the fields of data communication and networking, and the close link between these two subjects have prompted the author to add several chapters on computer networks in this text.

The book gives a masterly analysis of topics ranging from the principles of data transmission to computer networking applications. It also provi...

 

Resource ID #699d53c5d2f15 SCIT

42 | Data Mining and Data Warehousing : Principles and Practical Techniques By Parteek Bhatia

 

Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

 

Resource ID #66a8843549733 SCIT

43 | Data mining and data warehousing: principles and practical techniques

 

This book will give learners sufficient information to acquire mastery over the subject. It covers the practical aspects of data mining , data warehousing and machine learning in a simplified manner without compromising on the details of the subject. The main strength of the book is the illustration on concepts with practical examples so that the learners can grasp the contents easily. Another important future of this book is illustration of data mining algorithms with practical hands on sessions on Weka and R language (a major data mining tool and language, respectively). In this book every concept has been illustrated through a step by step approach in tutorial form for self practice in Weka and R. This textbook includes many pedagogical features such as chapter wise summary, exercises including probable problems, question bank and relevant references to provide sound knowledge to learners. 

 

Resource ID #66a888ea74e3f SCIT

44 | Data Mining for Business Analytics Concepts, Techniques, and Applications with JMP Pro By Galit Shmueli, Peter C. Bruce, Mia L. Stephens, Nitin R. Patel · 2016

 

Data Mining for Business Analytics: Concepts, Techniques, and Applications with JMP Pro® hits the 'sweet spot' in terms of balancing the technical and applied aspects of data mining. The content and technical level of the book work beautifully for a variety of students ranging from undergraduates to MBAs to those in applied graduate programs."

— Allison Jones-Farmer, Van Andel Professor of Business Analytics & Director of the Center for Analytics and Data Science, Department of Information Systems & Analytics, Farmer School of Business, Miami University

 

Resource ID #699c3c770ae81 SCIT

45 | Data Mining for Business Intelligence Concepts, Techniques, and Applications in Microsoft Office Excel with XLMiner By Galit Shmueli, Nitin R. Patel, Peter C. Bruce, Inbal Yahav · 2011

 

Incorporating a new focus on data visualization and time series forecasting, Data Mining for Business Intelligence, Second Edition continues to supply insightful, detailed guidance on fundamental data mining techniques. This new edition guides readers through the use of the Microsoft Office Excel add-in XLMiner for developing predictive models and techniques for describing and finding patterns in data.

 

Resource ID #699c3bab7186b SCIT

46 | Data Structures and Algorithms By Shi Kuo Chang · 2003

 

This is an excellent, up-to-date and easy-to-use text on data structures and algorithms that is intended for undergraduates in computer science and information science. The thirteen chapters, written by an international group of experienced teachers, cover the fundamental concepts of algorithms and most of the important data structures as well as the concept of interface design. The book contains many examples and diagrams. Whenever appropriate, program codes are included to facilitate learning.This book is supported by an international group of authors who are experts on data structures and algorithms, through its website at http: //www.cs.pitt.edu/jung/GrowingBook/, so that both teachers and students can benefit from their expertise

 

Resource ID #699d4e23e9623 SCIT

47 | Data Structures in C By NAIR, ACHUTHSANKAR S., MAHALEKSHMI, T. · 2009

 

This compact and student-friendly book deals with data structures, particularly user defined data structures, such as linked lists, stacks, queues, trees, graphs and files, using C as the programming language. The text begins with an introduction to the most common concepts of C and then it goes on to give a detailed discussion on the processing of one-dimensional and two-dimensional arrays, their internal organization, and handling arrays using pointers. Besides, it dwells on the dynamic linked list and its variations such as doubly linked lists and circular linked lists, with the help of memory diagrams. The text delineates the static and dynamic implementations of stacks and queues, the application, implementation, and construction of binary trees, and representation of graphs and...

 

Resource ID #699d4e7dd58c6 SCIT

48 | DESIGN METHODS AND ANALYSIS OF ALGORITHMS By S. K. BASU · 2005

 

The design of correct and efficient algorithms for problem solving lies at the heart of computer science. This concise text, without being highly specialized, teaches the skills needed to master the essentials of this subject. With clear explanations and engaging writing style, the book places increased emphasis on algorithm design techniques rather than programming in order to develop in the reader the problem-solving skills.

The treatment throughout the book is primarily tailored to the curriculum needs of B.Tech students in computer science and engineering, B.Sc. (Hons.) and M.Sc. students in computer science, and MCA students.

The book focuses on the standard algorithm design methods and the concepts are illustrated through representative examples to offer a reader-...

 

Resource ID #699d4fde3a166 SCIT

49 | Digital Forensics Processing and Procedures : Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements By David Lilburn Watson, Andrew Jones · 2013

 

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.

A step-by-step guide to designing, building and using a digital forensics lab A comprehensive guide for all roles in a digital forensics laboratory Based on international standards and certifications.

 

Resource ID #66a22711da68c SCIT

50 | Digital Forensics: Digital Evidence in Criminal Investigations By Angus McKenzie Marshall • 2009

 

The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations.

Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidential data which may be recoverable from a range of devices, considering issues relating to reliability and usefulness of those data.


 

Resource ID #66a22cade541c SCIT

51 | Digital Marketing All-In-One For Dummies By Stephanie Diamond · 2023

 

Digital Marketing All-in-One For Dummies is the most comprehensive tool for marketers looking to beef up their online presence. In this edition, you’ll learn the latest trends in digital marketing strategies, including brand new insight on how to incorporate artificial intelligence into your marketing plans. You’ll also get the latest information on how to manage your customers’ experiences, create exceptional marketing content, get help from influencers, and leverage social accounts for more followers and greater profits. With the help of this friendly Dummies guide, you’ll accelerate your journey from traditional to digital marketing processes, uncover tips to prove ROI of marketing activities, and increase audience engagement.

Build and implement a winning digital plan for your brand Learn how to establish an online presence with social media Turn online prospects into loyal customers Target consumers in any market segment and age bracket

Dig into the latest marketing advice as you provide your potential and existing customers the kind of personal experience you look for as a customer.

 

Resource ID #66a365b0dad18 SCIT

52 | Digital marketing By Dave Chaffey Fiona Ellis-Chadwick. 2019

 

Digital marketing has transformed how businesses and other organisations communicate with their audiences. The 5Ds of digital marketing we introduce in Chapter 1 (digital devices, digital platforms, digital media, digital data and digital technology) can be used, alongside traditional marketing techniques, to get closer to audiences than ever before. Consumers now have access to a much wider choice of entertainment, products, services and prices from different suppliers and a more convenient way to select and purchase. items. Organisations have the opportunity to expand into new markets, offer new services, interact with audiences in new ways and compete on a more equal footing with larger businesses. Marketers working within these organisations have the opportunity to develop new skills and to use these new tools to improve the competitiveness of the company. At the same time, the Internet and related digital technology platforms give rise to many threats to organisations. For example, online companies such as ASOS.com and Zalando (clothing), Amazon.com (books and retail), iTunes and Spotify (music) and Booking.com and Expedia (travel) have captured a significant part of their market and struck fear into the existing players. Many consumers now regularly use social networks such as Facebook, Instagram, Linkedin, Snapchat and Twitter as part of their daily lives, with the majority of access via smartphones. Engaging these consumers is an ongoing challenge but, as we will see, companies like those above have taken advantage of these opportunities to interact with customers and this has helped them develop as worldwide brands.

 

Resource ID #66a876ae5de6d SCIT

53 | Digital Marketing Excellence Planning, Optimizing and Integrating Online Marketing By Dave Chaffey, PR Smith · 2022

 

In this sixth edition, the hugely popular Digital Marketing Excellence is a practical guide to creating and executing integrated digital marketing plans, combining established approaches to marketing planning with the creative use of new digital models and digital tools. Written by two highly experienced digital marketing consultants, the book shows you how to:

Draw up an outline integrated digital marketing plan

Evaluate and apply digital marketing principles and models

Integrate online and offline communications

Implement customer-driven digital marketing as part of digital transformation

Reduce costly trial and error

Measure and enhance your digital marketing

Learn best practices for reaching and engaging your audiences using the key digital marketing platforms.

This new edition has been streamlined to seamlessly integrate the latest developments in digital analytics, ethics and privacy, Predictive Analytics, Machine Learning and Artificial Intelligence. Including new international case studies and up-to-date examples throughout, this book cuts through the jargon to show marketers how to leverage data and digital technologies to their advantage.

Offering a highly structured and accessible guide to a critical and far-reaching subject, Digital Marketing Excellence, 6th edition, provides a vital reference point for all digital marketing students, and managers involved in digital marketing strategy and implementation.

Online resources have been fully updated for the new edition and include a new set of PowerPoint slides and a full test bank of questions and exercises.

 

Resource ID #66a3668e44c15 SCIT

54 | Digital Marketing For Dummies By Ryan Deiss, Russ Henneberry · 2020

 

Digital Marketing for Dummies has the tools you need to step into the digital world and bring your marketing process up to date. In this book, you’ll discover how digital tools can expand your brand’s reach and help you acquire new customers. Digital marketing is all about increasing audience engagement, and the proven strategy and tactics in this guide can get your audience up and moving!

One will learn how to identify the digital markets and media that work best for your business—no wasting your time or money! Discover how much internet traffic is really worth to you and manage your online leads to convert web visitors into paying clients. From anonymous digital prospect to loyal customer—this book will take you through the whole process!

Learn targeted digital strategies for increasing brand awareness Determine the best-fit online markets for your unique brand Access downloadable tools to put ideas into action Meet your business goals with proven digital tactics

Digital marketing is the wave of the business future, and you can get digital with the updated tips and techniques inside this book!

 

Resource ID #66a36788ee9cf SCIT

55 | Digital marketing: A framework, review and research agenda By P.K. Kannan. 2017

 

We develop and describe a framework for research in digital marketing that highlights the touchpoints in the marketing process as well as in the marketing strategy process where digital technologies are having and will have a significant impact. Using the framework, we organize the developments and extant research around the elements and touchpoints comprising the framework and review the research literature in the broadly defined digital marketing space. We outline the evolving issues in and around the touchpoints and associated questions for future research. Finally, we integrate these identified questions and set a research agenda for future research in digital marketing to examine the issues from the perspective of the firm.

 

Resource ID #66a8772f25a2b SCIT

56 | Digital Marketing: An Overview By Abms Academy · 2020

 

World is going through digital transformation era and customers are spending most of their times online. Now most of the people using online for the purchasing essentials items due to pandemic situation. People are spending time online for various purposes like spending time in social media networks, searching in the internet. It also helps them to take purchasing decisions at faster pace than before. Hence organization needs to have dynamic strategies to understand the needs of the users and covert them as their potential customers. Digital marketing is a broader term which also includes the e-marketing concepts. Digital marketing includes strategies which are related to digital media such as internet, social media, e-mail, digital display boards such as billboards, mobile applications, virtual reality, and databases. Digital media content includes audio, video, text and graphics. Digital marketing analytics plays an important role in the success of digital marketing strategies especially with the use of Machine Learning and Deep Learning models in predicting customer behaviors, purchasing patterns and customer loyalty and retention. This book starts with the introduction of digital marketing and discusses the different types of digital marketing strategies, its positives and areas of weakness. It also helps the users to develop and evaluate the effects of their digital marketing strategies. ABMS Academywww.abmsacademy.com

 

Resource ID #66a366108738d SCIT

57 | Digital marketing: strategy By Dr Dave Chaffey and Danyl Bosomworth. 2012

 

This book of the digital marketing planning is no different to any other marketing plan, in fact it’s increasingly strange to have separate plans for ‘digital’ and ‘offline’ since that’s not how your customers perceive your business. However, we’re often required to separate plans for “digital” only based on the way teams and reporting is structured and to help the transition to digital - before it becomes “business as usual”. A common format helps align your plan to other marketing plans!  

 

Resource ID #66a874bc7a2c3 SCIT

58 | Discrete Mathematics Using a Computer By Cordelia Hall, John O'Donnell · 2013

 

Several areas of mathematics find application throughout computer science, and all students of computer science need a practical working understanding of them. These core subjects are centred on logic, sets, recursion, induction, relations and functions. The material is often called discrete mathematics, to distinguish it from the traditional topics of continuous mathematics such as integration and differential equations. The central theme of this book is the connection between computing and discrete mathematics. This connection is useful in both directions: • Mathematics is used in many branches of computer science, in applications including program specification, data structures, design and analysis of algorithms, database systems, hardware design, reasoning about the correctness of implementations, and much more; • Computers can help to make the mathematics easier to learn and use, by making mathematical terms executable, making abstract concepts more concrete, and through the use of software tools such as proof checkers. These connections are emphasized throughout the book. Software tools (see Appendix A) enable the computer to serve as a calculator, but instead of just doing arithmetic and trigonometric functions, it will be used to calculate with sets, relations, functions, predicates and inferences. There are also special software tools, for example a proof checker for logical proofs using natural deduction.

 

Resource ID #66a36eaa8e673 SCIT

59 | Dynamic Networks And Cyber-security 2016

 

As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue.This collection of papers by leading researchers and practitioners synthesises cutting-edge work in the analysis of dynamic networks and statistical aspects of cyber security. The book is structured in such a way as to keep security application at the forefront of discussions. It offers readers easy access into the area of data analysis for complex cyber-security applications, with a particular focus on temporal and network aspects.Chapters can be read as standalone sections and provide rich reviews of the latest...

 

Resource ID #699c38eb3dd32 SCIT

60 | Effectiveness of Digital Marketing in the Challenging Age: An Empirical Study By Afrina Yasmin, Sadia Tasneem, Kaniz Fatema. 2015

 

Marketers are faced with new challenges and opportunities within this digital age. Digital marketing is the utilization of electronic media by the marketers to promote the products or services into the market. The main objective of digital marketing is attracting customers and allowing them to interact with the brand through digital media. This article focuses on the importance of digital marketing for both marketers and consumers. We examine the effect of digital marketing on the firms’ sales. Additionally the differences between traditional marketing and digital marketing in this paper are presented. This study has described various forms of digital marketing, effectiveness of it and the impact it has on firm’s sales. The examined sample consists of one hundred fifty firms and fifty executives which have been randomly selected to prove the effectiveness of digital marketing. Collected data has been analyzed with the help of various statistical tools and techniques. 

 

Resource ID #66a87c3934975 SCIT

61 | Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security Edited by Chang-Tsun Li. 2013

 

The revolutionary way in which modern technologies have enabled us to exchange information with ease has created a demand for interdisciplinary research in digital forensics and investigations aiming to combat the abuse of computer technologies. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security presents various digital crime and forensic disciplines that use electronic devices and software for crime prevention and detection. This book provides theoretical and empirical research articles and case studies for a broad range of academic readers as well as professionals, industry consultants, and practitioners involved in the use, design, and development of techniques related to digital forensics and investigation.

 

Resource ID #66a22569730a8 SCIT

62 | Entrepreneurship and SME Management Across Africa Context, Challenges, Cases

 

This book focuses on issues related to entrepreneurship and SME management on the African continent by providing insights from different conceptual, empirical and case studies. In doing so, it focuses on context-specific challenges for conducting entrepreneurial activities or business endeavors in smaller firms in the African continent. The book responds to calls for more research about African businesses given the acknowledgement of scholars, students and policy makers around the world who realize the increasing and growing economic importance of the African continent. In addition to serving as a source book for more in-depth studies by assisting the reader in gaining increased understanding of the topics covered, complementing the different parts with reviews, the book also elaborates...

 

Resource ID #699c3abf55e84 SCIT

63 | Essential Business Process Modeling By Michael Havey · 2005

 

Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today's enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes

BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.

Sound complicated? It is. But it's downright frustrating when you have to search the Web for every little piece...

 

Resource ID #699d47bb9b64c SCIT

64 | Essentials of Discrete Mathematics By David James Hunter · 2009

 

Essentials of Discrete Mathematics is the ideal text for a one-term discrete mathematics course to serve computer science majors as well students from a wide range of other disciplines. The material is organized around five types of mathematical thinking: logical, relational, recursive, quantitative, and analytical. This presentation results in a coherent outline that steadily builds upon mathematical sophistication. Graphs are introduced early and referred to throughout the text, providing a richer context for examples and applications. Students will encounter algorithms near the end of the text, after they have acquired enough skills and experience to analyze them properly. The final chapter contains in-depth case studies from a variety of fields, including biology, sociology, linguistics, economics, and music. Clear and concise, Essentials of Discrete Mathematics presents a unified and complete picture of discrete math that instructors can move through in a single semester.

 

Resource ID #66a378aa694e0 SCIT

65 | Express Web Application Development Learn how to Develop Web Applications with the Express Framework from Scratch By Hage Yaapa · 2013

 

Express Web Application Development is a practical introduction to learning about Express. Each chapter introduces you to a different area of Express, using screenshots and examples to get you up and running as quickly as possible.If you are looking to use Express to build your next web application, "Express Web Application Development" will help you get started and take you right through to Express' advanced features. You will need to have an intermediate knowledge of JavaScript to get the most out of this book

 

Resource ID #69a2a8555bb5b SCIT

66 | Fundamentals of Computer Organization and Architecture By Mostafa Abd-El-Barr, Hesham El-Rewini · 2005

 

This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and architecture, including: Instruction set architecture and design Assembly language programming Computer arithmetic Processing unit design Memory system design Input-output design and organization Pipelining design techniques Reduced Instruction Set Computers (RISCs) The authors, who share over 15 years of undergraduate and graduate level instruction in computer architecture, provide real world applications, examples of machines, case studies and practical experiences in each chapter.

 

Resource ID #699d57f356381 SCIT

67 | Fundamentals of Data Communication Networks By Oliver C. Ibe · 2017

 

What every electrical engineering student and technical professional needs to know about data exchange across networks

While most electrical engineering students learn how the individual components that make up data communication technologies work, they rarely learn how the parts work together in complete data communication networks. In part, this is due to the fact that until now there have been no texts on data communication networking written for undergraduate electrical engineering students. Based on the author’s years of classroom experience, Fundamentals of Data Communication Networks fills that gap in the pedagogical literature, providing readers with a much-needed overview of all relevant aspects of data communication networking, addressed from the perspective of the v...

 

Resource ID #699d53278a21a SCIT

68 | Fundamentals of Database Management Systems By Mark L. Gillenson · 2023

 

In the newly revised third edition of Fundamentals of Database Management Systems, veteran database expert Dr. Mark Gillenson delivers an authoritative and comprehensive account of contemporary database management. The Third Edition assists readers in understanding critical topics in the subject, including data modeling, relational database concepts, logical and physical database design, SQL, data administration, data security, NoSQL, blockchain, database in the cloud, and more.

The author offers a firm grounding in the fundamentals of database while, at the same time, providing a wide-ranging survey of database subfields relevant to information systems professionals. And, now included in the supplements, the author's audio narration of the included PowerPoint slides! Readers...

 

Resource ID #699d466e806bf SCIT

69 | Fundamentals of Digital Forensics : Theory, Methods, and Real-Life ApplicationsBy Joakim Kävrestad · 2020

 

This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises.

This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis.

Topics and features:

Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the Access Data Forensic Tool kit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online

This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations.

Joakim Kävrestad is a lecturer and researcher at the University of Skövde, Sweden, and an Access Data Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.

 

Resource ID #66a22a0b49cf7 SCIT

70 | Generative Artificial Intelligence. By World Intellectual Property Organization · 2024

 

This report from the World Intellectual Property Organization (WIPO) provides a comprehensive analysis of the patent landscape related to Generative Artificial Intelligence (GenAI). It examines the rapid growth in patent filings and scientific publications in this field, highlighting key technological advancements and emerging trends. The report identifies significant players in the GenAI patent arena, including major corporations and research institutions, and outlines the influence of powerful computing, large datasets, and advanced algorithms on GenAI development. The document serves as a resource for policymakers, researchers, and industry stakeholders to understand the evolving GenAI ecosystem and its potential applications across various sectors.

 

Resource ID #699d4c06069e7 SCIT

71 | Integrations of Data Warehousing, Data Mining, and Database Technologies: Innovative Approaches David Taniar, Li Chen. 2011

 

In the last years, data warehousing systems have gained relevance to support decision making within organizations. The core component of these systems is the data warehouse and nowadays it is widely assumed that the data warehouse design must follow the multidimensional paradigm. Thus, many methods have been presented to support the multidimensional design of the data warehouse. The first methods introduced were requirement-driven but the semantics of the data warehouse (since the data warehouse is the result of homogenizing and integrating relevant data of the organization in a single, detailed view of the organization business) require to also consider the data sources during the design process. Considering the data sources gave rise to several data-driven methods that automate the data warehouse design process, mainly, from relational data sources. Currently, research on multidimensional modeling is still a hot topic and we have two main research lines. On the one hand, new hybrid automatic methods have been introduced proposing to combine data-driven and requirement-driven approaches. These methods focus on automating the whole process and improving the feedback retrieved by each approach to produce better results. On the other hand, some new approaches focus on considering alternative scenarios than relational sources. These methods also consider (semi)-structured data sources, such as ontologies or XML, that have gained relevance in the last years. Thus, they introduce innovative solutions for overcoming the heterogeneity of the data sources. All in all, we discuss the current scenario of multidimensional modeling by carrying out a survey of multidimensional design methods. We present the most relevant methods introduced in the literature and a detailed comparison showing the main features of each approach.

 

Resource ID #66a889ba50ce5 SCIT

72 | Introduction to Artificial Intelligence : A Beginner’s Guide By Simplilearn · 2020

 

This AI beginner’s guide aims to take the readers through the current AI landscape, provides the key fundamentals and terminologies of AI, and offers practical guidelines on why and how you can be a part of the AI revolution, and also the ways in which you can scale up your AI career.

 

Resource ID #66a38e623354a SCIT

73 | Introduction to Artificial Intelligence By Wolfgang Ertel · 2018

 

This accessible and engaging textbook presents a concise introduction to the exciting field of artificial intelligence (AI). The broad-ranging discussion covers the key subdisciplines within the field, describing practical algorithms and concrete applications in the areas of agents, logic, search, reasoning under uncertainty, machine learning, neural networks, and reinforcement learning. Fully revised and updated, this much-anticipated second edition also includes new material on deep learning.

Topics and features:

Presents an application-focused and hands-on approach to learning, with supplementary teaching resources provided at an associated website

Contains numerous study exercises and solutions, highlighted examples, definitions, theorems, and illustrative cartoons Includes chapters on predicate logic, PROLOG, heuristic search, probabilistic reasoning, machine learning and data mining, neural networks and reinforcement learning

Reports on developments in deep learning, including applications of neural networks to generate creative content such as text, music and art (NEW)

Examines performance evaluation of clustering algorithms, and presents two practical examples explaining Bayes’ theorem and its relevance in everyday life (NEW)

Discusses search algorithms, analyzing the cycle check, explaining route planning for car navigation systems, and introducing Monte Carlo Tree Search (NEW)

Includes a section in the introduction on AI and society, discussing the implications of AI on topics such as employment and transportation (NEW)

Ideal for foundation courses or modules on AI, this easy-to-read textbook offers an excellent overview of the field for students of computer science and other technical disciplines, requiring no more than a high-school level of knowledge of mathematics to understand the material.


 

Resource ID #66a38da40a376 SCIT

74 | Introduction to Computer Networks and Cybersecurity

 

Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.

 

Resource ID #699c374cb8c8d SCIT

75 | Introduction to Cyber Security

 

This book consists of cyber crimes classification, cyber fraud, types of frauds, types of computer virus and how worms work on computer systems. 

 

Resource ID #66a35ceb485af SCIT

76 | Introduction to Cyber Security Guide to the World of Cyber Security

 

Introduction to Cyber Security is a handy guide to the world of Cyber Security. It can serve as a reference manual for those working in the Cyber Security domain. The book takes a dip in history to talk about the very first computer virus, and at the same time, discusses in detail about the latest cyber threats. There are around four chapters covering all the Cyber Security technologies used across the globe. The book throws light on the Cyber Security landscape and the methods used by cybercriminals. Starting with the history of the Internet, the book takes the reader through an interesting account of the Internet in India, the birth of computer viruses, and how the Internet evolved over time. The book also provides an insight into the various techniques used by Cyber Security professionals to defend against the common cyberattacks launched by cybercriminals. The readers will also get to know about the latest technologies that can be used by individuals to safeguard themselves from any cyberattacks, such as phishing scams, social engineering, online frauds, etc. The book will be helpful for those planning to make a career in the Cyber Security domain. It can serve as a guide to prepare for the interviews, exams and campus work.

 

Resource ID #66a35a2b853b7 SCIT

77 | Introduction to Database Management System By Satinder Bal Gupta

 

 

Resource ID #699d460fd0673 SCIT

78 | Introduction to Software Design with Java By Martin P. Robillard · 2019

 

This textbook provides an in-depth introduction to software design, with a focus on object-oriented design, and using the Java programming language. Its goal is to help readers learn software design by discovering the experience of the design process. To this end, a narrative is used that introduces each element of design know-how in context, and explores alternative solutions in that context. The narrative is supported by hundreds of code fragments and design diagrams.

The first chapter is a general introduction to software design. The subsequent chapters cover design concepts and techniques, which are presented as a continuous narrative anchored in specific design problems. The design concepts and techniques covered include effective use of types and interfaces, encapsulation, composition, inheritance, design patterns, unit testing, and many more. A major emphasis is placed on coding and experimentation as a necessary complement to reading the text. To support this aspect of the learning process, a companion website with practice problems is provided, and three sample applications that capture numerous design decisions are included. Guidance on these sample applications is provided in a section called “Code Exploration” at the end of each chapter. Although the Java language is used as a means of conveying design-related ideas, the book’s main goal is to address concepts and techniques that are applicable in a host of technologies.

This book is intended for readers who have a minimum of programming experience and want to move from writing small programs and scripts to tackling the development of larger systems. This audience naturally includes students in university-level computer science and software engineering programs. As the prerequisites to specific computing concepts are kept to a minimum, the content is also accessible to programmers without a primary training in computing. In a similar vein, understanding the code fragments requires only a minimal grasp of the language, such as would be taught in an introductory programming course.

 

Resource ID #66a358e06cad3 SCIT

79 | Introduction to Software Testing By Paul Ammann, Jeff Offutt · 2017

 

This extensively classroom-tested text takes an innovative approach to explaining software testing that defines it as the process of applying a few precise, general-purpose criteria to a structure or model of the software. The book incorporates cutting-edge developments, including techniques to test modern types of software such as OO, web applications, and embedded software. This revised second edition significantly expands coverage of the basics, thoroughly discussing test automaton frameworks, and it adds new, improved examples and numerous exercises. The theory of coverage criteria is carefully and cleanly explained to help students understand concepts before delving into practical applications, while extensive use of the JUnit test framework gives students practical experience in a test framework popular in the industry. Exercises, meanwhile, feature specifically tailored tools that allow students to check their own work. The book's website also offers an instructor's manual, PowerPoint slides, testing tools for students, and example software programs in Java.

 

Resource ID #66a359b6aaadc SCIT

80 | Introductory Computer Forensics : A Hands-on Practical Approach By Xiaodong Lin · 2018

 

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge.

This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques.

This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

 

Resource ID #66a22bccdc037 SCIT

81 | Mastering Web Application Development with Express A Comprehensive Guide to Developing Production-ready Web Applications with Express By Alexandru Vladutu · 2014

 

If you are a Node.js developer who wants to take your Express skills to the next level and develop high performing, reliable web applications using best practices, this book is ideal for you. The only prerequisite is knowledge of Node.js.

 

Resource ID #69a2a89662dba SCIT

82 | Mathematics for Computer Scientists By Gareth J. Janacek, Mark Lemmon Close. 2011

 

The aim of this book is to present some of the basic mathematics that is needed by computer scientistic. It is a little like programming. It takes time to understand a lot of code and you never understand how to write code by just reading a manual mathematics is exactly the same.

 

Resource ID #66a384976d0b8 SCIT

83 | Object-Oriented Programming Languages: Interpretation By I. Craig · 2007

 

1.1 Introduction Object-oriented programming has opened a great many perspectives on the concept of software and has been hailed as part of the solution to the so-called “software crisis”. It has given the possibility that software components can be constructedandreusedwithconsiderablymorecredibility.Therearenowmany case studies in which the reuse of object-oriented components has been made and analysed. Object-oriented programming relates the programming activity to that of modelling or simulation; objects are identi?ed by a correspondence with the objects found in the application area of the program and are used to model those domain operations. Object-oriented programming also opens the prospect of more ?exible software that is able to respond dynamically to the needs of the applicat...

 

Resource ID #699d50fdb66e3 SCIT

84 | Object-oriented programming with C++ By M. P. Bhave, S. A. Paterkar · 2004

 

 

Resource ID #699d508ee1cfe SCIT

85 | Operating System Forensics By Vijay Kumar Gupta · 2024

 

 

Resource ID #69a2aac6d7e70 SCIT

86 | Practical Database Programming with Java By Ying Bai · 2011

 

Covers fundamental and advanced Java database programming techniques for beginning and experienced readers

This book covers the practical considerations and applications in database programming using Java NetBeans IDE, JavaServer Pages, JavaServer Faces, and Java Beans, and comes complete with authentic examples and detailed explanations.

Two data-action methods are developed and presented in this important resource. With Java Persistence API and plug-in Tools, readers are directed step by step through the entire database programming development process and will be able to design and build professional data-action projects with a few lines of code in mere minutes. The second method, runtime object, allows readers to design and build more sophisticated and practical Java databa...

 

Resource ID #699c464b46e45 SCIT

87 | Problems and Exercises in Discrete Mathematics By G.P. Gavrilov, A.A. Sapozhenko · 2013

 

Many years of practical experience in teaching discrete mathematics form the basis of this text book. Part I contains problems on such topics as Boolean algebra, k-valued logics, graphs and networks, elements of coding theory, automata theory, algorithms theory, combinatorics, Boolean minimization and logical design. The exercises are preceded by ample theoretical background material. For further study the reader is referred to the extensive bibliography. Part II follows the same structure as Part I, and gives helpful hints and solutions.

Audience: This book will be of great value to undergraduate students of discrete mathematics, whereas the more difficult exercises, which comprise about one-third of the material, will also appeal to postgraduates and researchers.

 

Resource ID #66a3793f0f651 SCIT

88 | Security Modeling and Analysis of Mobile Agent Systems By Lu Ma, Jeffrey J.-P. Tsai · 2006

 

A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. Sample Chapter(s)...

 

Resource ID #699d55425cdfa SCIT

89 | Software Engineering By Kassem A. Saleh · 2009

 

Software engineering from a project point of view embarks on software products that are both feasible technically and financially. Moreover, software projects must be completed on time and within budgets and are important challenges to software engineers. Research has shown that one-third of software projects are never completed, another third do not fulfill their promises. Software Engineering provides the software engineering fundamentals, principles and skills needed to develop and maintain high quality software products. The software engineering processes and techniques covered include requirements specification, design, implementation, testing and management of software projects. This up-to-date book is modeled on the recommendations and guidelines prescribed in the Guide to the So...

 

Resource ID #699c40d76391f SCIT

90 | Software Engineering Foundations A Software Science Perspective By Yingxu Wang · 2007

 

Covering the theoretical and empirical foundations of software engineering, this book integrates the latest research, methodologies, and their applications. Based on the author's 30 years of experience, it examines a wide range of underlying theories from as philosophy, cognitive informatics, denotational mathematics, system science, organization laws, and engineering economics. Comprehensive and written for all levels of software engineers and students, the book contains in-depth information, annotated references, real-world problems, and heuristics. A comprehensive reference for practitioners and students, this volume delineates an overarching, durable, and transdisciplinary theoretical framework as well as alternative solutions and open issues for further research.

 

Resource ID #699c3fc333647 SCIT

91 | Structured System Analysis and Design By J.B. Dixit · 2007

 

 

Resource ID #699d55fdce70b SCIT

92 | Systems Analysis and Design By Alan Dennis, Barbara Haley Wixom, Roberta M. Roth · 2009

 

The 4th edition of Systems Analysis and Design continues to offer a hands-on approach to SA&D while focusing on the core set of skills that all analysts must possess.

Building on their experience as professional systems analysts and award-winning teachers, authors Dennis, Wixom, and Roth capture the experience of developing and analyzing systems in a way that students can understand and apply.

With Systems Analysis and Design, 4th edition, students will leave the course with experience that is a rich foundation for further work as a systems analyst.

 

Resource ID #699d559e56daa SCIT

93 | Systems Analysis and Design Methods

 

This work aims to balance the coverage of concepts, techniques and their applications, provide the most examples of system analysis and design deliverables available, and balance the coverage of classical methods and emerging methods.

 

Resource ID #66a357abd1680 SCIT

94 | Systems Analysis and Design Techniques, Methodologies, Approaches, and Architectures

 

For the last two decades, IS researchers have conducted empirical studies leading to better understanding of the impact of Systems Analysis and Design methods in business, managerial, and cultural contexts. SA & D research has established a balanced focus not only on technical issues, but also on organizational and social issues in the information society. This volume presents the very latest, state-of-the-art research by well-known figures in the field. The chapters are grouped into three categories: techniques, methodologies, and approaches.

 

Resource ID #66a3573b8d82f SCIT

95 | Systems Analysis and Design: People, Processes, and Projects

 

For the last two decades, IS researchers have conducted empirical studies leading to a better understanding of the impact of Systems Analysis and Design methods in business, managerial, and cultural contexts. SA&D research has established a balanced focus not only on technical issues, but also on organizational and social issues in the information society. This volume presents the very latest, state-of-the-art research by well-known figures in the field. The chapters are grouped into three categories: techniques, methodologies, and approaches.

 

Resource ID #66a35500e867d SCIT

96 | Text Book Of Business Statistics By A.K. Sharma · 2005

 

The Book Business Statistics is an outcome of long teaching experience of the subject. This book present a thorough treatment of what is the requirement of the students of B.A/ B.Com/B.Sc. of all Indian Universities. It includes the fundamental concepts, illustrative examples and application to various business problems. These illustrated examples have been selected carefully on each topic and sufficient number of unsolved questions are provided which aim at sharpening the skill of the students. It believed that publication will served as useful guide not only to the under graduate but also for the post graduate students of all Indian Universities. This book is also helpful for the candidate appearing in I.A.S./P.C.S/and other competitive examination. Contents: Business Forecasting, Statistical Quality Control, Interpolation and Extrapolation, Vital Statistics, Statistics Decision Theory, Non-parametric Tests.

 

Resource ID #699d5a5a20d2e SCIT

97 | The Book on Data Structures Volume 1 By David R. Richardson · 2002

 

The study of data structures is one of the most important for beginning and advanced students studying the theory of computer science. This is a comprehensive guide designed to teach the principles and applications of data structures in a structured format.

While other books require you to have an intimate knowledge of a particular programming language, this book teaches this intriguing facet of computer science in a language independent manner.

In this first volume, we will discuss all of the important facts and concepts that you would encounter in a data structures 1 course. This makes this particular guide an excellent reference for the student. Also, with the addition of chapter exercises, this text makes an excellent text book for an undergraduate course in data structures.

 

Resource ID #699d4f08c3d95 SCIT

98 | The Essential Guide to User Interface Design An Introduction to GUI Design Principles and Techniques By Wilbert O. Galitz · 2007

 

Bringing together the results of more than 300 new design studies, an understanding of people, knowledge of hardware and software capabilities, and the author's practical experience gained from 45 years of work with display-based systems, this book addresses interface and screen design from the user's perspective. You will learn how to create an effective design methodology, design and organize screens and Web pages that encourage efficient comprehension and execution, and create screen icons and graphics that make displays easier and more comfortable to use.

 

Resource ID #699c41fa7b85b SCIT

99 | The Essentials of Computer Organization and Architecture By Linda Null, Julia Lobur · 2006

 

Thoroughly Revised And Updated, The Essentials Of Computer Organization And Architecture, Second Edition Is A Comprehensive Resource That Addresses All Of The Necessary Organization And Architecture Topics Yet Is Concise Enough To Move Through In A Single Semester. The Text Covers Such Topics As Digital Logic, Data Representation, Machine-Level Language, General Organization, Assembly Language Programming, CPU Organization, Memory Organization, And Input/Output Devices, As Well As A New Chapter On Embedded Systems. Correlated To The ACM-IEEE Computing Curricula Guidelines, The Essentials Of Computer Organization And Architecture Is The Forefront Text For Your Computer Organization And Architecture Course.

 

Resource ID #699d5978f3609 SCIT

100 | Understanding and Conducting Information Systems Auditing By Veena Hingarh, Arif Ahmed · 2013

 

A comprehensive guide to understanding and auditing modern information systems

The increased dependence on information system resources for performing key activities within organizations has made system audits essential for ensuring the confidentiality, integrity, and availability of information system resources. One of the biggest challenges faced by auditors is the lack of a standardized approach and relevant checklist. Understanding and Conducting Information Systems Auditing brings together resources with audit tools and techniques to solve this problem.

Featuring examples that are globally applicable and covering all major standards, the book takes a non-technical approach to the subject and presents information systems as a management tool with practical applications. It explains in detail how to conduct information systems audits and provides all the tools and checklists needed to do so. In addition, it also introduces the concept of information security grading, to help readers to implement practical changes and solutions in their organizations.

Includes everything needed to perform information systems audits Organized into two sections—the first designed to help readers develop the understanding necessary for conducting information systems audits and the second providing checklists for audits Features examples designed to appeal to a global audience

Taking a non-technical approach that makes it accessible to readers of all backgrounds, Understanding and Conducting Information Systems Auditing is an essential resource for anyone auditing information systems.

 

Resource ID #66a369a738fe0 SCIT

101 | Understanding Digital Marketing Marketing Strategies for Engaging the Digital Generation By Damian Ryan, Calvin Jones · 2012

 

Digital marketing now represents 25% of the marketing spend in the UK and this is predicted to move to 50% or higher within the next three years. Understanding Digital Marketing looks at the world of digital marketing: how it got started, how it got to where it is today, and where the thought leaders in the industry believe it is headed in the future. This authoritative title demonstrates how to harness the power of digital media and use it to achieve the utmost success in business, now and in the future. Understanding Digital Marketing deals with every key topic in detail, including: search marketing, social media, Google, mobile marketing, affiliate marketing, e-mail marketing, customer engagement and digital marketing strategies. Essential reading for both practitioners and students alike, and including real-world examples of digital marketing successes and expert opinions, Understanding Digital Marketing provides you with tools to utilize the power of the internet to take your company wherever you want it to go.

 

Resource ID #66a36706eaae0 SCIT

102 | Upgrading and Repairing PCs By Scott Mueller · 2003

 

This is the newest comprehensive update to the world's #1 guide to PC repair and maintenance. World-renowned PC hardware expert Scott Mueller has thoroughly updated his legendary "Upgrading and Repairing PCs to reflect today's latest PC technologies, and added a new DVD with more than two hours of digital video demonstrating PC maintenance and repair, which can be watched on either their DVD-equipped PCs or any DVD player. Mueller presents updated coverage of every significant PC component: processors, motherboards, memory, the BIOS, IDE and SCSI interfaces, drives, removable and optical storage, video and audio hardware, USB, FireWire, Internet connectivity, LANs, power supplies, even PC cases. This book also contains a detailed troubleshooting index designed to help readers rapidly diagnose more than 250 common PC hardware problems, as well as an extensive vendor contact guide, and a comprehensive PC technical glossary.

 

Resource ID #699d4cebd1fe0 SCIT

103 | User Interface Design and Evaluation By Debbie Stone, Caroline Jarrett, Mark Woodroffe, Shailey Minocha · 2005 Preview 163 pages

 

User Interface Design and Evaluation provides an overview of the user-centered design field. It illustrates the benefits of a user-centered approach to the design of software, computer systems, and websites.

The book provides clear and practical discussions of requirements gathering, developing interaction design from user requirements, and user interface evaluation. The book's coverage includes established HCI topics—for example, visibility, affordance, feedback, metaphors, mental models, and the like—combined with practical guidelines for contemporary designs and current trends, which makes for a winning combination. It provides a clear presentation of ideas, illustrations of concepts, using real-world applications. This book will help readers develop all the skills necessar...

 

Resource ID #699c425e1b4cd SCIT

104 | Web Based Application Development By Ralph Grove · 2009

 

Web-Based Application Development present an introduction to the concepts, theories, practices, languages, and tools used to develop applications for the World Wide Web. It explores the important fundamentals of Web applications while also introducing the programming and technology necessary to put these ideas into practice. This book goes beyond presenting the languages and tools found in other texts by including networking, architecture, security, reliability, and other important concepts and theories necessary for today's web applications. Ideal for novice programmers looking to master the basic skills critical for a successful career in web development, Web-Based Application Development provides broad coverage of the topics coupled with hands-on, active-learning exercises in one, mu...

 

Resource ID #69a2a77d85727 SCIT

105 | What Is User Interface Design? By Patricia Harris, Ph.D., Patricia Harris · 2017

 

Have you ever wondered why the play button for most music players is still the same right-facing triangle that was on every cassette player and VCR? User interface (UI) designers try to develop icons and controls that are so obvious they endure through the years and across technologies. For example, iPhone apps often feel so familiar because many designers use the UI toolkit from Apple with standard fonts and icons. Unlike user experience (UX) design, which has to do with the flow of a program, UI is all about the look and feel of software and hardware. With colorful photographs and helpful illustrations, readers will make the most of this essential coding topic

 

Resource ID #699c42c05406d SCIT