SiteMap All
- Page ID
- 1580
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)
- Campus Bookshelves
- Arkansas Tech University
- Discrete-Time Signal Processing
- Front Matter
- 1: Introduction to Digital Signal Processing
- 2: The Sampling Theorem
- 3: Amplitude Quantization
- 4: Discrete -Time Signals and Systems
- 5: Discrete -Time Fourier Transform (DTFT)
- 6: Discrete Fourier Transforms (DFT)
- 7: DFT - Computational Complexity
- 8: Fast Fourier Transform (FFT)
- 9: Spectrograms
- 10: Discrete-Time Systems
- 11: Discrete-Time Systems in the Time-Domain
- 12: Discrete -Time Systems in the Frequency Domain
- 13: Filtering in the Frequency Domain
- 14: Efficiency of Frequency - Domain Filtering
- 15: Discrete -Time Filtering of Analog Signals
- 16: Digital Signal Processing Problems
- Back Matter
- Discrete-Time Signal Processing
- Bucknell University
- CEEG 445: Environmental Engineering Chemistry (Fall 2021)
- Butler County Community College
- Using NIST for Security and Risk Assessment
- Front Matter
- 1: Introduction
- 2: Security Assessment Using SP.800-171r2 and SP.800-172
- 3: Security Assessment using SP.800-213 and SP.800-213A
- 3.1: Introduction
- 3.2: Governance and Oversight
- 3.3: Challenges to Assessing IoT-MIoT
- 3.4: Using NIST SP.800-213A Capabilities for MIoT Security Assessment
- 3.5: Evaluation Process
- 3.6: Methodology - Design and Variables
- 3.7: Using the Assessment Workbook
- 3.8: Advantages and Benefits of Using NIST SP.800-213 and SP.800-213A for MIoT Assessment
- 4: VI. Assessment Workbook Downloads
- Back Matter
- Using NIST for Security and Risk Assessment
- California State Polytechnic University, Humboldt
- Mechanics and Science of Materials
- Front Matter
- Chapter 1: Introduction to Materials, X-Ray Diffraction, and Inter and Intramolecular Bonding
- Chapter 2: Structure: Crystalline, Amorphous, Non-Crystalline, and Liquid Crystal Materials
- Chapter 3: Defects in Crystalline Materials
- Chapter 4: Phase Diagrams
- Chapter 5: Mechanical Behavior of Materials Part I
- Chapter 6: Mechanical Behavior of Materials Part II
- Chapter 7: Electrochemistry and Corrosion
- Chapter 8: Polymers and Soft Matter
- Back Matter
- Mechanics and Science of Materials
- Cañada College
- Circuits and Devices
- Front Matter
- 1: Basic Concepts and Quantitites
- 2: Fundamental Laws
- 3: Circuit Simulations Using Computers
- 4: Analysis Theorems and Techniques
- 5: Nodal and Mesh Analysis, Dependent Sources
- 6: Capacitors and Inductors
- 7: Advanced Topic- Operational Amplifiers
- 8: Transient Behavior- First and Second Order Circuits
- 9: AC Signal Fundamentals
- 10: Series RLC Circuits
- 11: Parallel RLC Circuits
- 12: AC Circuit Analysis Theorems and Techniques
- 13: AC Power
- 14: Advanced Topic- Magnetic Circuits and Transformers
- Back Matter
- Circuits and Devices: Laboratory
- Front Matter
- 1: The Electrical Laboratory
- 2: Sources and Instruments
- 3: Relating V, I and R
- 4: Important Theorems
- 5: Circuit Analysis Techniques
- 6: First Order Circuits
- 7: AC Circuits
- 8: Introduction to RL and RC Circuits
- 9: Series RLC Circuits
- 10: Parallel RLC Circuits
- 11: DC Operational Amplifiers (Op Amps)
- Back Matter
- Circuits and Devices
- Coastline College
- Delta College
- CS11 - Informations Systems
- Front Matter
- 1: What is an Information System?
- 2: Information Systems for Strategic Advantage
- 2.1: Does IT Matter?
- 2.2: Business Processes
- 2.3: The People in Information Systems
- 2.4: Information Systems Development
- 3: Information Systems Beyond the Organization
- Back Matter
- CSP31A - C Programming
- Front Matter
- 1: Introduction to Programming
- 2: Program Planning and Design
- 3: Data and Operators
- 4: Often Used Data Types
- 5: Integrated Development Environment
- 6: Program Control Functions
- 7: Specific Task Functions
- 8: Standard Libraries
- 9: Character Data, Sizeof, Typedef, Sequence
- 10: Introduction to Structured Programming
- 11: Two Way Selection
- 12: Multiway Selection
- 13: Test After Loops
- 14: Test Before Loops
- 15: Counting Loops
- 16: String Class, Unary Positive and Negative
- 17: Conditional Operator and Recursion
- 18: Introduction to Arrays
- 19: File I
- 20: More Array Functions
- Back Matter
- Introduction to Programming Concepts - Python
- Front Matter
- 1: Introduction
- 1.1: Why should you learn to write programs?
- 1.2: Creativity and Motivation
- 1.3: Computer Hardware Architecture
- 1.4: Understanding Programming
- 1.5: Words and Sentences
- 1.6: Conversing with Python
- 1.7: Terminology - Interpreter and Compiler
- 1.8: Writing a Program
- 1.9: What is a program?
- 1.10: The Building Blocks of Programs
- 1.11: What could possibly go wrong?
- 1.12: The Learning Journey
- 1.13: Introduction (Exercises)
- 1.14: Introduction (Glossary)
- 2: Variables, Expressions, and Statements
- 2.1: Values and Types
- 2.2: Variables
- 2.3: Variable names and Keywords
- 2.4: Statements
- 2.5: Operators and Operands
- 2.6: Expressions
- 2.7: Order of Operations
- 2.8: Modulus Operator
- 2.9: String Operations
- 2.10: Asking the user for input
- 2.11: Comments
- 2.12: Choosing Mnemonic Variable Names
- 2.13: Debugging
- 2.14: Variables, Expressions, and Statements (Exercises)
- 2.15: Glossary
- 3: Conditional Execution
- 3.1: Boolean Expressions
- 3.2: Logical Operators
- 3.3: Conditional Execution
- 3.4: Alternative Execution
- 3.5: Chained Conditionals
- 3.6: Nested Conditionals
- 3.7: Catching exceptions Using Try and Except
- 3.8: Short-Circuit Evaluation of Logical Expressions
- 3.9: Debugging
- 3.10: Conditional Execution (Exercises)
- 3.11: Conditional Execution (Glossary)
- 4: Functions
- 4.1: Function Calls
- 4.2: Built-in Functions
- 4.3: Type Conversion Functions
- 4.4: Random Numbers
- 4.5: Math Functions
- 4.6: Adding New Functions
- 4.7: Definitions and Uses
- 4.8: Flow of Execution
- 4.9: Parameters and Arguments
- 4.10: Fruitful functions and void functions
- 4.11: Why functions?
- 4.12: Debugging
- 4.13: Functions (Exercises)
- 4.14: Functions (Glossary)
- 5: Iterations
- 5.1: Updating Variables
- 5.2: The while Statement
- 5.3: Infinite Loops
- 5.4: "Infinite loops" and break
- 5.5: Finishing iterations with continue
- 5.6: Definite loops using for
- 5.7: Loop patterns
- 5.8: Counting and Summing Loops
- 5.9: Maximum and Minimum Loops
- 5.10: Debugging
- 5.11: Iterations (Exercises)
- 5.12: Iterations (Glossary)
- 6: Strings
- 6.1: A string is a sequence
- 6.2: Getting the length of a string using len
- 6.3: Traversal through a string with a loop
- 6.4: String Slices
- 6.5: Strings are immutable
- 6.6: Looping and Counting
- 6.7: The in operator
- 6.8: String Comparison
- 6.9: String Methods
- 6.10: Parsing strings
- 6.11: Format operator
- 6.12: Debugging
- 6.13: Strings (Exercises)
- 6.14: Strings (Glossary)
- 7: Files
- 8: Lists
- 8.1: A list is a sequence
- 8.2: Lists are mutable
- 8.3: Traversing a List
- 8.4: List operations
- 8.5: List Slices
- 8.6: List Methods
- 8.7: Deleting Elements
- 8.8: Lists and Functions
- 8.9: Lists and Strings
- 8.10: Parsing lines
- 8.11: Objects and Values
- 8.12: Aliasing
- 8.13: List arguments
- 8.14: Debugging
- 8.15: Lists (Exercises)
- 8.16: Lists (Glossary)
- 9: Dictionaries
- 10: Tuples
- 10.1: Tuples are Immutable
- 10.2: Comparing Tuples
- 10.3: Tuple Assignment
- 10.4: Dictionaries and Tuples
- 10.5: Multiple assignment with dictionaries
- 10.6: The most common words
- 10.7: Using Tuples as Keys in Dictionaries
- 10.8: Sequences: strings, lists, and tuples - Oh My!
- 10.9: Debugging
- 10.10: Tuples (Exercises)
- 10.11: Tuples (Glossary)
- 11: Regular Expressions
- 11.1: Regular Expressions
- 11.2: Character matching in regular expressions
- 11.3: Extracting data using regular expressions
- 11.4: Combining searching and extracting
- 11.5: Escape Character
- 11.06: Bonus section for Unix
- 11.7: Debugging
- 11.8: Regular Expressions (Exercises)
- 11.9: Regular Expressions (Glossary)
- 11.10: Regular Expressions (Summary)
- 12: Networked Programs
- 12.1: HyperText Transfer Protocol - HTTP
- 12.2: The World's Simplest Web Browser
- 12.3: Retrieving an image over HTTP
- 12.4: Retrieving web pages with urllib
- 12.5: Parsing HTML and scraping the web
- 12.6: Parsing HTML using regular expressions
- 12.7: Parsing HTML using BeautifulSoup
- 12.8: Reading binary files using urllib
- 12.9: Networked Programs (Exercises)
- 12.10: Networked Programs (Glossary)
- 13: Python and Web Services
- 13.1: eXtensible Markup Language - XML
- 13.2: Looping through Nodes
- 13.3: JavaScript Object Notation - JSON
- 13.4: Parsing JSON
- 13.5: Application Programming Interfaces
- 13.6: Google geocoding web service
- 13.7: Security and API usage
- 13.8: Python and Web Services (Exercises)
- 13.9: Python and Web Services (Glossary)
- 14: Object-Oriented Programming
- 14.1: Managing Larger Programs
- 14.2: Getting Started
- 14.3: Using Objects
- 14.4: Starting with Programs
- 14.5: Subdividing a Problem - Encapsulation
- 14.6: Our First Python Object
- 14.7: Classes as Types
- 14.8: Many Instances
- 14.9: Object Lifecycle
- 14.10: Inheritance
- 14.11: Object-Oriented Programming (Glossary)
- 14.12: Object-Oriented Programming (Summary)
- 15: Using Databases and SQL
- Front Matter
- 15.1: What is a database?
- 15.2: Database Concepts
- 15.3: Database Browser for SQLite
- 15.4: Creating a database table
- 15.5: Structured Query Language summary
- 15.6: Spidering Twitter using a database
- 15.7: Basic data modeling
- 15.8: Programming with Multiple Tables
- 15.9: Constraints in Database Tables
- 15.10: Retrieve and
- 15.11: Storing the friend relationship
- 15.12: Three Kinds of Keys
- 15.13: Using JOIN to retrieve data
- 15.14: Degugging
- 15.15: Using Databases and SQL (Glossary)
- 15.16: Using Databases and SQL (Summary)
- Back Matter
- 16: Visualizing data
- Back Matter
- C++ Programming I (McClanahan)
- Front Matter
- 1: Building and Running C++ Code
- 2: C++ Basics
- 3: Program Planning and Design
- 4: Data and Operators
- 4.1: We Begin to Code...
- 4.2: Data Types in C++
- 4.3: Identifier Names
- 4.4: Constants and Variables
- 4.5: Data Manipulation
- 4.6: Assignment Operator
- 4.7: L Value and R Value
- 4.8: Sizeof Operator
- 4.9: Arithmetric Operators
- 4.10: Data Type Conversions
- 4.11: Operator Overloading
- 4.12: Unary Positive and Negative Operators
- 4.13: Bitwise Operators
- 5: Common Data Types
- 6: Conditional Execution
- 7: Conditional Loops
- 8: Counting Loops
- 9: Introduction to Arrays
- 10: Functions
- 11: C++ Input and Output
- 12: Pointers
- 13: Object Oriented C++
- 14: Overloading in C++
- 15: Polymorphism
- 16: Inheritance
- 19: Handling Errors
- this is a test
- Back Matter
- C++ Data Structures
- Front Matter
- 1: OOP Concepts
- 2: C++ Pointers
- 3: Dynamic Memory Allocation and Arrays
- 4: Inheritence
- 4.1: The Concept of Inheritance
- 4.2: Why and when to use inheritance?
- 4.3: Implementing inheritance in C++
- 4.4: Modes of Inheritance
- 4.5: Types of Inheritance in C++
- 4.6: Types of Inheritance in C++
- 4.7: Types of Inheritance
- 4.8: Types of Inheritance
- 4.9: Types of Inheritance
- 4.10: Programming Assignment- Inheritance
- 5: Polymorphism
- 6: Abstraction / Encapsulation
- 7: Linked Lists
- 8: Recursion
- 9: Stack Data Structure
- 10: Queues Data Structures
- 11: Hashing
- 12: Heap
- 13: Sorting
- 14: Binary Trees
- Back Matter
- Operating System: The Basics
- 1: The Basics - An Overview
- 2: Operating System Overview
- 3: Processes - What and How
- 4: Threads
- 5: Concurrency and Process Synchronization
- 6: Concurrency: Deadlock and Starvation
- 7: Memory Management
- 8: Virtual Memory
- 9: Uniprocessor CPU Scheduling
- 10: Multiprocessor Scheduling
- 12: File Management
- Information Security
- Front Matter
- 1: Information Security Defined
- 2: Authenticate and Identify
- 3: Authorize and Access Control
- 4: Accountability and Auditing
- 5: Cryptography
- 6: Compliance , Laws and Regulations
- 7: Network Fundamentals
- 8: Web Application and Wireless Network Attacks
- 9: Malware and Security Attacks
- 10: Social Engineering
- 11: Secure Software Design
- 12: Malware, Viruses & Other Threats
- 13: Application Security
- 14: Assessing Security
- Back Matter
- Web Animation
- Front Matter
- 1: Values, Types, and Operators
- 2: Program Structure
- 3: Functions
- 4: Objects and Arrays
- 5: The Secret Life of Objects
- 6: Bugs and Errors
- 7: Regular Expressions
- 8: Modules
- 9: Asynchronous Programming
- 10: JavaScript and the Browser
- 11: The Document Object Model
- 12: Handling Events
- 13: Drawing on Canvas
- 14: Projects
- 15: Node
- 16: Uncovered Chapters
- Back Matter
- Computer Science from the Bottom Up (Wienand)
- 0.01: Implementing abstraction
- 0.02: File Descriptors
- 0.03: Types and Number Representation
- 0.04: Memory
- 0.05: Peripherals and buses
- 0.06: Small to big systems
- 0.07: Operating System Organisation
- 0.08: System Calls
- 0.09: Privileges
- 0.10: Elements of a process
- 0.11: Process Hierarchy
- 0.12: Fork and Exec
- 0.13: Context Switching
- 0.14: Scheduling
- 0.15: The Shell
- 0.16: Signals
- 0.17: What virtual memory is
- 0.18: Pages
- 0.19: Physical Memory
- 0.20: Pages + Frames = Page Tables
- 0.21: Virtual Addresses
- 0.22: Consequences of virtual addresses, pages and page tables
- 0.23: Hardware Support
- 0.24: Linux Specifics
- 0.25: Hardware support for virtual memory
- 0.26: Building an executable
- 0.27: Compiling
- 0.28: Assembler
- 0.29: Linker
- 0.30: A practical example
- 0.31: Representing executable files
- 0.32: ELF
- 0.33: ELF Executables
- 0.34: Libraries
- 0.35: Extending ELF concepts
- 0.36: ABIs
- 0.37: Starting a process
- 0.38: The Dynamic Linker
- 0.39: Global Offset Tables
- 0.40: Libraries
- 0.41: Working with libraries and the linker
- Front Matter
- Behind the process
- Binary and Number Representation
- Computer Architecture
- Computer Science from the Bottom Up
- Dynamic Linking
- General Unix and Advanced C
- Glossary
- Introduction
- The Operating System
- The Process
- The Toolchain
- Untitled Page 01
- Virtual Memory
- Back Matter
- Introduction to Operating Systems
- Front Matter
- 1: Binary and Number Representation
- 2: The Basics - An Overview
- 3: The Operating System
- 4: Computer Architecture - the CPU
- 5: Computer Architecture - Memory
- 6: Computer Architecture - Peripherals and Buses
- 7: Small to Big Systems
- 8: Processes
- 9: Threads
- 10: Concurrency and Process Synchronization
- 11: Concurrency- Deadlock and Starvation
- 12: Memory Management
- 13: Virtual Memory
- 14: Uniprocessor CPU Scheduling
- 15: Multiprocessor Scheduling
- 16: I/O and Disk Management
- 17: File Management
- Back Matter
- Introduction to Information Systems
- Front Matter
- 1: Information Systems - Introduction
- 2: Information Systems - Hardware
- 3: Information Systems - Software
- 4: Information Systems - Data and Databases
- 5: Information Systems - Networking and Communication
- 6: Information Systems - Security
- 7: Information Systems - Does IT Matter
- 8: Information Systems - Business Processes
- 9: Information Systems - People
- 10: Information Systems - Development
- 11: Information Systems - Globalization and the Digital Divide
- 12: Information Systems - Ethical and Legal Implications
- 13: Information systems - Future Trends
- Back Matter
- Database Design - NOT GOOD
- Front Matter
- Chapter 1 - Before the Advent of Database Systems
- Chapter 2 - Fundamental Concepts
- Chapter 3 - Characteristics and Benefits of a Database
- Chapter 4 - Types of Data Models
- Chapter 5 - Data Modelling
- Chapter 6 - Classification of Database Management Systems
- Chapter 7 - The Relational Data Model
- Chapter 8 - The Entity Relationship Data Model
- Chapter 9 - Integrity Rules and Constraints
- Chapter 10 - ER Modelling
- Chapter 11 - Functional Dependencies
- Chapter 12 - Normalization
- Chapter 13 - Database Development Process
- Chapter 14 - Database Users
- Chapter 15 - SQL Structured Query Language
- Chapter 16 - SQL Data Manipulation Language
- Back Matter
- Introduction to Database Systems
- Front Matter
- 1: Introduction to Database Systems and SQL
- 1.1: Introduction and Background
- 1.2: Limitations of Conventional File Processing
- 1.3: Data Redundancy
- 1.4: Data Accuracy
- 1.5: Data Security
- 1.6: Advantages of Databases
- 1.7: Costs and Risks of Database Approach
- 1.8: Components of a Database Environment
- 1.9: Database Systems Development Life Cycle
- 1.10: Single-User and Multi-user Database Applications
- 1.11: Concise Summary
- 1.12: Extended Resources
- 1.13: References
- 2: Data Modelling
- 3: The Relational Data Model
- 4: Integrity Rules, Constraints and Functional Dependencies
- 5: ER Modeling
- 6: Relationship Diagram for Data Analysis-ER and SQL
- 6.1: Introduction and Background
- 6.2: Understanding the Importance of Data Modeling
- 6.3: Naming and Definitions
- 6.4: Modeling
- 6.5: Business Intelligence Systems and Data Warehouse
- 6.6: Introduction to Structure Query Language (SQL)
- 6.7: Submitting SQL Statement to the DBMS
- 6.8: Concise Summary
- 6.9: Extended Resources
- 6.10: References
- 7: Mapping ER to Schema, Normalization
- 8: SQL and ER
- 9: SQL - Structured Query Language
- 10: SQL Data Manipulation Language
- 11: Client/Server Architecture
- 11.1: Introduction and Background to Client/Server Systems and Multi-tier Architecture
- 11.2: Three Components of Client/Server Systems
- 11.3: Two-tier and Three-tier Architectural Distinctions
- 11.4: Connecting to databases in three-tier applications
- 11.5: Concise Summary
- 11.6: Extended Resources
- 11.7: References
- 12: Physical Database Design and Database Security
- 13: Data Warehouse
- 14: Virtual Desktop and Implementing SQL Queries
- Back Matter
- Web Site Design - HTML (2022)
- Web Site Design
- Master CS11 POCR
- Front Matter
- 1: Information Systems - Introduction
- 2: Technology Enabled Strategy
- 3: Hardware
- 4: Software
- 5: Data
- 6: Networks
- 7: Systems Development
- 8: Information Systems - Security
- 9: Impacts of Information Systems
- 10: E-Business
- 11: Business Process Solutions
- 12: Decision Support
- 12.1: Chapter Introduction
- 12.2: Big Data
- 12.3: Managerial Decision Making
- 12.4: Decision Types
- 12.5: Decision Support Systems
- 12.6: Business Intelligence and Data Analytics
- 12.7: Data Analysis Projects
- 12.8: Analysis and Reporting Tools
- 12.9: Data Repositories
- 12.10: Summary
- 12.11: Key Terms
- 12.12: Knowledge Check
- 13: Emerging Technology
- Back Matter
- CS11 - Informations Systems
- Diablo Valley College
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Front Matter
- 1: Overview Of CNC Machining
- 2: Introduction To G-code Programming
- 3: CNC Control Systems
- 4: CNC Milling Machine Setup For Part Production
- 5: Introduction To Cutting Tool Characteristics
- 6: Post-Processing Part Files For Machining
- 7: 3D Modeling Of Parts And Components (CAD)
- 8: Introduction to Computer Aided Machining (CAM) Software
- 8.1: Graphic user interface and operating environment
- 8.2: Tools menu
- 8.3: Lab - Tool libraries and tool length offsets
- 8.4: Lab - Types of tool paths
- 8.5: Cartesian coordinate systems
- 8.6: Graphic standards and representation methods
- 8.7: Creating part geometry
- 8.8: Creating points, lines, and arcs using CAM software
- 8.9: Lab - Creating tool paths in 2D
- 8.10: Lab - Creating tool paths in 3D
- 8.11: Assembly design workflow
- 8.12: Lab - Additional instructions and operations
- 8.13: Lab - Previewing a tool path
- Back Matter
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Folsom Lake College
- Fresno City College
- Hawaii Community College
- Arkansas Tech University