توضیحاتی در مورد کتاب Inside the World of Computing: Technologies, Uses, Challenges
نام کتاب : Inside the World of Computing: Technologies, Uses, Challenges
ویرایش : 1
عنوان ترجمه شده به فارسی : درون دنیای محاسبات: فناوریها، کاربردها، چالشها
سری :
نویسندگان : Jean-Loic Delhaye (editor)
ناشر : Wiley-ISTE
سال نشر : 2021
تعداد صفحات : 257
ISBN (شابک) : 9781786306654 , 1786306654
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 12 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Cover\nHalf-Title Page\nTitle Page\nCopyright page\nContents\nForeword\nPreface\nAcknowledgments\nChapter 1: From the Calculator to the Supercomputer\n 1.1. Introduction\n 1.2. Some important concepts\n 1.2.1. Information and data\n 1.2.2. Binary system\n 1.2.3. Coding\n 1.2.4. Algorithm\n 1.2.5. Program\n 1.3. Towards automation of calculations\n 1.3.1. Slide rule\n 1.3.2. The Pascaline\n 1.3.3. The Jacquard loom\n 1.3.4. Babbage’s machine\n 1.3.5. The first desktop calculators\n 1.3.6. Hollerith’s machine\n 1.4. The first programmable computers\n 1.4.1. Konrad Zuse’s machines\n 1.4.2. Colossus\n 1.4.3. ENIAC\n 1.5. Generations of computers\n 1.5.1. First generation: the transition to electronics\n 1.5.2. Second generation: the era of the transistor\n 1.5.3. Third generation: the era of integrated circuits\n 1.5.4. Fourth generation: the era of microprocessors\n 1.6. Supercomputers\n 1.6.1. Some fields of use\n 1.6.2. History of supercomputers\n 1.6.3. Towards exaflops\n 1.7. What about the future?\n 1.7.1. An energy and ecological challenge\n 1.7.2. Revolutions in sight?\nChapter 2: Computer Networks and Their Applications\n 2.1. Introduction\n 2.2. A long history\n 2.3. Computer network infrastructure\n 2.3.1. Geographic coverage: from PAN to WAN\n 2.3.2. Communication media\n 2.3.3. Interconnection equipment and topologies\n 2.3.4. Two other characteristics of computer networks\n 2.3.5. Quality of service\n 2.4. Communication protocols and the Internet\n 2.4.1. The first protocols\n 2.4.2. The OSI model\n 2.4.3. The history of the Internet\n 2.4.4. The TCP/IP protocol\n 2.4.5. IP addressing\n 2.4.6. Management and use of the Internet\n 2.4.7. Evolving technologies\n 2.4.8. What future?\n 2.5. Applications\n 2.5.1. The World Wide Web\n 2.5.2. Cloud computing\n 2.5.3. The Internet of Things\n 2.5.4. Ubiquitous computing and spontaneous networks\n 2.6. Networks and security\n 2.6.1. Vulnerabilities\n 2.6.2. The protection of a network\n 2.6.3. Message encryption\n 2.6.4. Checking its security\nChapter 3: Software\n 3.1. Introduction\n 3.2. From algorithm to computer program\n 3.2.1. Programs and subprograms\n 3.2.2. Programming languages\n 3.3. Basic languages and operating systems\n 3.3.1. Basic languages\n 3.3.2. Operating system functions\n 3.3.3. A bit of history\n 3.3.4. Universal operating systems\n 3.3.5. Targeted operating systems\n 3.4. “High-level” programming and applications\n 3.4.1. Imperative languages\n 3.4.2. Functional languages\n 3.4.3. Object programming\n 3.4.4. Other programming languages\n 3.4.5. The most used languages\n 3.5. Software development\n 3.5.1. Software categories\n 3.5.2. Software quality\n 3.5.3. Development methods\n 3.5.4. Software engineering\n 3.6. Software verification and validation\n 3.6.1. Errors with sometimes tragic consequences\n 3.6.2. Software testing\n 3.6.3. Formal methods\n 3.6.4. Software certification\n 3.7. Legal protection and distribution of software\n 3.7.1. Legal protection of software\n 3.7.2. Licenses\n 3.7.3. Free software and open source\n 3.8. The software market\nChapter 4: Data: From Binary Element to Intelligence\n 4.1. Introduction\n 4.2. Data and information\n 4.2.1. Digitization of data\n 4.2.2. Data compression\n 4.3. The structuring of data towards information\n 4.3.1. Structured data\n 4.3.2. Semi-structured data and the Web\n 4.4. Files and their formats\n 4.5. Databases\n 4.5.1. The main characteristics\n 4.5.2. DBMS models\n 4.5.3. Database design\n 4.5.4. Enterprise resource planning (ERP) systems\n 4.5.5. Other types of databases\n 4.5.6. Data protection in a database\n 4.6. Intelligence and Big Data\n 4.7. Data ownership and Open Data\n 4.7.1. Personal data\n 4.7.2. Opening up public data: Open Data\nChapter 5: Technology Building Blocks\n 5.1. Embedded systems\n 5.1.1. Specific architectures\n 5.1.2. Some fields of use\n 5.2. Artificial intelligence (AI)\n 5.2.1. A bit of history\n 5.2.2. Intelligence or statistics?\n 5.2.3. Important work around automatic learning\n 5.2.4. A multiplication of applications\n 5.2.5. The challenges of AI\n 5.2.6. What about intelligence?\n 5.3. The Internet\n 5.3.1. Mobility\n 5.3.2. Social networks\n 5.3.3. The Internet of Things\n 5.3.4. The Cloud\n 5.3.5. Blockchain\n 5.3.6. Vulnerabilities\n 5.4. Image processing and vision\n 5.4.1. A bit of history\n 5.4.2. Image sources and their uses\n 5.4.3. The digital image\n 5.4.4. Image storage and compression\n 5.4.5. Computing and images\n 5.4.6. Some applications\n 5.5. Conclusion\nChapter 6: Some Areas of Application\n 6.1. Robots\n 6.1.1. A bit of history\n 6.1.2. Fields of use regarding robots today\n 6.1.3. Communication in the world of robots\n 6.1.4. Fear of robots\n 6.1.5. Challenges for researchers\n 6.2. Virtual reality and augmented reality\n 6.2.1. A bit of history\n 6.2.2. Hardware configurations of virtual reality\n 6.2.3. Fields of use of virtual reality\n 6.2.4. Augmented reality\n 6.3. Health\n 6.3.1. Health informatics\n 6.3.2. Information technology at the service of our health\n 6.4. The connected (and soon autonomous?) car\n 6.4.1. Levels of autonomy\n 6.4.2. Challenges associated with the autonomous car\n 6.4.3. Advantages and disadvantages of the autonomous car\n 6.5. The smart city\n 6.5.1. Smart energy\n 6.5.2. Smart buildings\n 6.5.3. Smart infrastructure\n 6.5.4. Smart governance\n 6.5.5. Dangers\n 6.6. Smart mobility\n 6.7. The factory of the future\n 6.7.1. Technologies\n 6.7.2. Issues\n 6.7.3. The place of the human\nChapter 7: Societal Issues\n 7.1. Security\n 7.1.1. Specific characteristics\n 7.1.2. Some great threats\n 7.1.3. Acting to protect oneself\n 7.2. The respect of private life\n 7.2.1. Our personal data\n 7.2.2. Uses of our data\n 7.2.3. What about the future?\n 7.3. Influence on social life\n 7.3.1. The development of social ties\n 7.3.2. Citizen participation\n 7.3.3. The socialization of knowledge\n 7.4. Dangers to democracy\n 7.4.1. The liberation of speech\n 7.4.2. Private life under surveillance\n 7.4.3. Job insecurity\n 7.4.4. The power of the big Internet firms\n 7.5. The digital divide\n 7.5.1. From division to exclusion\n 7.5.2. Digital technology and education\n 7.6. Mastering the use of artificial intelligence\n 7.7. The intelligent prosthesis and the bionic man\n 7.8. Transhumanism\n 7.9. What kind of society for tomorrow?\nBibliography\nIndex\nOther titles from iSTE in Computer Engineering\nEULA