目录 第2版前言 第1版前言Chapter One The Fundamental of Computers 1-1Computers Types 1-2The Year 2038 Problem Reading Material 1-1 History of Electronic Digital Computers Reading Material 1-2 Quantum Computer Exercises Chapter Two Computer Architecture 2-1Computer Motherboard 2-2Memory Hierarchy in Cache-Based Systems Reading Material 2-1 Multi-core (computing) Reading Material 2-2 CPHASH: A Cache-Partitioned Hash Table Exercises Chapter Three Data Structure44 3-1Balanced Tree Data Structures 3-2Quicksort Reading Material 3-1 Linked List Reading Material 3-2 Managed Data: Modular Strategies for Data Abstraction Exercises Chapter Four Operating System 4-1 Operating System Structure 4-2 Free-Space Management Reading Material 4-1 Linux Reading Material 4-2 What Are the Differences between iOS and Android? Exercises Chapter Five Programming Languages 5-1 History of Programming Languages 5-2 Object-Oriented Programming Reading Material 5-1 Introduction to the C# Language and the NET Framework Reading Material 5-2 Pair Programming Exercises Chapter Six Database Systems 6-1 Introduction to Database Systems 6-2 Distributed Database117 Reading Material 6-1 From Databases to Dataspaces Reading Material 6-2 Oracle Database Exercises Chapter Seven Computer Network 7-1 Smarter Cities Are Built on the Internet of Things 7-2 Sliding Window Protocols Reading Material 7-1 IPv6 Reading Material 7-2 WiFi-Nano: Reclaiming WiFi Efficiency Through 800 ns Slots Exercises Chapter Eight Internet 8-1 TCP/IP 8-2 Introduction of IPv6 Reading Material 8-1 A Basic Guide to the Internet Reading Material 8-2 What Is Web 2.0 Exercises Chapter Nine Geographic Information System 9-1 GIS Introduction174 9-2 GIS Data180 Reading Material 9-1 Application of GIS Techniques in Hong Kongs Population Census Reading Material 9-2 Demystifying the Persistent Ambiguity of GIS as “Tool Versus “Science” Exercises Chapter Ten Information Security 10-1 Security and Precaution on Computer Network 10-2 Computer Virus Reading Material 10-1 A National Cyberspace Security Response System Reading Material 10-2 How to Implement Trusted Computing Exercises Chapter Eleven Information Security Technologies 11-1 Introducing Firewalls to IPv6 11-2 An Introduction to Information Security Reading Material 11-1 Intrusion Detection Systems and Intrusion Response Mechanism Reading Material 11-2 Internet Security Architecture Exercises Chapter Twelve Digital Image Processing 12-1 A Basic Introduction to Image Processing 12-2 An Evaluation of Popular Copy-Move Forgery Detection Approaches (Part I) Reading Material 12-1An Evaluation of Popular Copy-Move Forgery Detection Approaches (Part II) Reading Material 12-2An Overview of JPEG-2000 Exercises Chapter Thirteen Management Information System 13-1 Data Warehouse 13-2 Challenges of Big Data for Development Reading Material 13-1 The Opportunity of Big Data for Development Reading Material 13-2 Steps Involved in Building a Data Warehouse Exercises Chapter Fourteen E-Commerce 14-1 Electronic Commerce 14-2 E-Commerce and Its Impact in Logistic Management: A State of Art Reading Material 14-1 Seven Practical Trends in B2B Marketing Reading Material 14-2 Chinas E-Commerce Service Industry Exercises Chapter Fifteen The Future of Information Technology 15-1 Location-Based Social Networks: Users 15-2 Native XML Databases Reading Material 15-1 3G Technology Reading Material 15-2 Microsoft Azure for Research Overview Exercises References
以下为对购买帮助不大的评价