Catalog Search Results
Technology resources and online guides are provided alongside the Library’s Learning Lab class materials.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Use the knowledge you’ve gained so far to design a grid-based matching game—an entertaining way to practice top-down development of more complex programs using functions. You’ll see how rough-and-ready lines of code known as stubs come in very handy as you tackle such projects.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
One of the key ideas in computer science is abstraction—using simple interfaces to manage complex procedures. See how functions can simplify away the details of complex process, freeing attention to focus on what goes into a function and what comes out. Learn when to use functions and the side effects that sometimes occur.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
"Hello, World!"Following tradition, write a program that produces this greeting as your first exercise in coding a computer program. Learn why Python is the ideal computer language for beginners and many others. After this lesson, follow the onscreen instructions for installing Python and the programming editor PyCharm.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
One of the major trends in the present and future of computing is parallel processing. Put this clever technique to work in Python. Then close the course with Professor Keyser’s suggestions for your further explorations of programming, along with his reflections on the personal benefits of this remarkable human achievement.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Enter the realm of algorithms, the heart of computer science. See how a well-designed algorithm—a general set of steps that accomplish a task—allows you to work out the logic of a program before you commit it to code. Try this with search and sort exercises.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Discover the remarkable programming tools called modules that you have at your fingertips with Python. Modules are ready-made programs that can be imported into your code as you write it, enhancing your creativity, expanding your options, and saving you time. Bundles of modules are called packages.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Python makes it very easy to create lists and perform a wide range of operations on them. Learn the fundamentals of building lists. Then experiment with indexing into lists, looping over lists, and making slices of lists, lists of lists, and list-like structures called tuples.
Author
Publisher
Alfred A. Knopf
Pub. Date
2003
Language
English
Description
The author combines the latest advances in mathematics and physics with groundbreaking computer science to examine the possibility for the development of the quantum computer, a breakthrough that could allow a shortcut through time.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key challenges in the process.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful measures in the 1970s.
32) Anonymity
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of political speech and the privacy of personal searches and communication. Take a look at two tools people use in pursuit of Internet anonymity: TOR networks and Bitcoin currency.
Publisher
TV Choice
Pub. Date
2016.
Language
English
Description
Google has grown from nothing in 1998 to a multinational tech giant. We tell that story, we identify the drivers of success. Founders Larry Page and Sergey Brin didn’t want to sell advertising at first. Now Google search is a giant advertising cash cow...MODEL EMPLOYER We go inside the Googleplex near San Francisco to find the people and projects. Google prides itself on being a model employer, offering great pay and benefits to its staff whose...
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance—physical, electronic and data—and see how each type works. Case studies of the Osama Bin Laden raid and U.S. airport screening show the tension between security and transparency.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten"principle. Although Europe and America’s approach toward privacy is generally similar, here you’ll compare the legal state of data collection in both the public and private realms to find out where the differences lie.
37) Geolocation
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
You are where you go—at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given (such as a social media check-in) to the improperly acquired (such as cell phone spying). Then see what investigators can do with such data.
38) Metadata
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Dig deeper into the government’s electronic surveillance programs. Here, you’ll learn about "metadata”—or data about data. After reviewing what metadata is and how it works, you’ll examine the thorny legal issues surrounding metadata gathering in the years after 9/11, and whether collecting it violates the 4th Amendment protection against search and seizure.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall"between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after 9/11.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
What happens when we know we are under observation? Or when we know we are anonymous? The "observer effect"has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on social media. Consider the psychological implications of observation—on both the observed and the observer.
Interlibrary Loans
Didn't find what you need? Items not owned by Arcadia Public Library can be requested from other libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request