Understanding the Digital World : : What You Need to Know about Computers, the Internet, Privacy, and Security / / Brian W. Kernighan.
The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and securityComputers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equip...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2017 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2017] ©2017 |
Year of Publication: | 2017 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (256 p.) :; 38 color illus. 51 line illus. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781400884803 |
---|---|
ctrlnum |
(DE-B1597)479655 (OCoLC)969965645 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kernighan, Brian W., author. aut http://id.loc.gov/vocabulary/relators/aut Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / Brian W. Kernighan. Princeton, NJ : Princeton University Press, [2017] ©2017 1 online resource (256 p.) : 38 color illus. 51 line illus. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface -- Introduction -- Part I: Hardware -- 1. What's in a Computer? -- 2. Bits, Bytes, and Representation of Information -- 3. Inside the CPU -- Wrapup on Hardware -- Part II: Software -- 4. Algorithms -- 5. Programming and Programming Languages -- 6. Software Systems 7. Learning to Program -- 7. Learning to Program -- Wrapup on Software -- Part III: Communications -- 8. Networks -- 9. The Internet 10. The World Wide Web -- 10. The World Wide Web 11. Data and Information -- 11. Data and Information -- 12. Privacy and Security -- 13. Wrapping Up -- Notes -- Glossary -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and securityComputers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords.Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) Computer networks Security measures Popular works. Computer science Popular works. COMPUTERS / Computer Science. bisacsh Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2017 9783110543322 print 9780691176543 https://doi.org/10.1515/9781400884803?locatt=mode:legacy https://www.degruyter.com/isbn/9781400884803 Cover https://www.degruyter.com/cover/covers/9781400884803.jpg |
language |
English |
format |
eBook |
author |
Kernighan, Brian W., Kernighan, Brian W., |
spellingShingle |
Kernighan, Brian W., Kernighan, Brian W., Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / Frontmatter -- Contents -- Preface -- Introduction -- Part I: Hardware -- 1. What's in a Computer? -- 2. Bits, Bytes, and Representation of Information -- 3. Inside the CPU -- Wrapup on Hardware -- Part II: Software -- 4. Algorithms -- 5. Programming and Programming Languages -- 6. Software Systems 7. Learning to Program -- 7. Learning to Program -- Wrapup on Software -- Part III: Communications -- 8. Networks -- 9. The Internet 10. The World Wide Web -- 10. The World Wide Web 11. Data and Information -- 11. Data and Information -- 12. Privacy and Security -- 13. Wrapping Up -- Notes -- Glossary -- Index |
author_facet |
Kernighan, Brian W., Kernighan, Brian W., |
author_variant |
b w k bw bwk b w k bw bwk |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Kernighan, Brian W., |
title |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / |
title_sub |
What You Need to Know about Computers, the Internet, Privacy, and Security / |
title_full |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / Brian W. Kernighan. |
title_fullStr |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / Brian W. Kernighan. |
title_full_unstemmed |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / Brian W. Kernighan. |
title_auth |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / |
title_alt |
Frontmatter -- Contents -- Preface -- Introduction -- Part I: Hardware -- 1. What's in a Computer? -- 2. Bits, Bytes, and Representation of Information -- 3. Inside the CPU -- Wrapup on Hardware -- Part II: Software -- 4. Algorithms -- 5. Programming and Programming Languages -- 6. Software Systems 7. Learning to Program -- 7. Learning to Program -- Wrapup on Software -- Part III: Communications -- 8. Networks -- 9. The Internet 10. The World Wide Web -- 10. The World Wide Web 11. Data and Information -- 11. Data and Information -- 12. Privacy and Security -- 13. Wrapping Up -- Notes -- Glossary -- Index |
title_new |
Understanding the Digital World : |
title_sort |
understanding the digital world : what you need to know about computers, the internet, privacy, and security / |
publisher |
Princeton University Press, |
publishDate |
2017 |
physical |
1 online resource (256 p.) : 38 color illus. 51 line illus. Issued also in print. |
contents |
Frontmatter -- Contents -- Preface -- Introduction -- Part I: Hardware -- 1. What's in a Computer? -- 2. Bits, Bytes, and Representation of Information -- 3. Inside the CPU -- Wrapup on Hardware -- Part II: Software -- 4. Algorithms -- 5. Programming and Programming Languages -- 6. Software Systems 7. Learning to Program -- 7. Learning to Program -- Wrapup on Software -- Part III: Communications -- 8. Networks -- 9. The Internet 10. The World Wide Web -- 10. The World Wide Web 11. Data and Information -- 11. Data and Information -- 12. Privacy and Security -- 13. Wrapping Up -- Notes -- Glossary -- Index |
isbn |
9781400884803 9783110543322 9780691176543 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276 K476 42017 |
genre_facet |
Popular works. |
url |
https://doi.org/10.1515/9781400884803?locatt=mode:legacy https://www.degruyter.com/isbn/9781400884803 https://www.degruyter.com/cover/covers/9781400884803.jpg |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
004 - Data processing & computer science |
dewey-full |
004 |
dewey-sort |
14 |
dewey-raw |
004 |
dewey-search |
004 |
doi_str_mv |
10.1515/9781400884803?locatt=mode:legacy |
oclc_num |
969965645 |
work_keys_str_mv |
AT kernighanbrianw understandingthedigitalworldwhatyouneedtoknowaboutcomputerstheinternetprivacyandsecurity |
status_str |
n |
ids_txt_mv |
(DE-B1597)479655 (OCoLC)969965645 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2017 |
is_hierarchy_title |
Understanding the Digital World : What You Need to Know about Computers, the Internet, Privacy, and Security / |
container_title |
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2017 |
_version_ |
1770176762355908608 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04987nam a22006975i 4500</leader><controlfield tag="001">9781400884803</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20172017nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)984651111</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400884803</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400884803</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)479655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)969965645</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76</subfield><subfield code="b">.K476 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kernighan, Brian W., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding the Digital World :</subfield><subfield code="b">What You Need to Know about Computers, the Internet, Privacy, and Security /</subfield><subfield code="c">Brian W. Kernighan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (256 p.) :</subfield><subfield code="b">38 color illus. 51 line illus.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Part I: Hardware -- </subfield><subfield code="t">1. What's in a Computer? -- </subfield><subfield code="t">2. Bits, Bytes, and Representation of Information -- </subfield><subfield code="t">3. Inside the CPU -- </subfield><subfield code="t">Wrapup on Hardware -- </subfield><subfield code="t">Part II: Software -- </subfield><subfield code="t">4. Algorithms -- </subfield><subfield code="t">5. Programming and Programming Languages -- </subfield><subfield code="t">6. Software Systems 7. Learning to Program -- </subfield><subfield code="t">7. Learning to Program -- </subfield><subfield code="t">Wrapup on Software -- </subfield><subfield code="t">Part III: Communications -- </subfield><subfield code="t">8. Networks -- </subfield><subfield code="t">9. The Internet 10. The World Wide Web -- </subfield><subfield code="t">10. The World Wide Web 11. Data and Information -- </subfield><subfield code="t">11. Data and Information -- </subfield><subfield code="t">12. Privacy and Security -- </subfield><subfield code="t">13. Wrapping Up -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and securityComputers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords.Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Popular works.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science</subfield><subfield code="v">Popular works.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2017</subfield><subfield code="z">9783110543322</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691176543</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400884803?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400884803</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400884803.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-054332-2 Princeton University Press Complete eBook-Package 2017</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |