目录
第2版前言
第1版前言Chapter One The Fundamental of Computers
1-1Computers Types
1-2The Year 2038 Problem
Reading Material 1-1 History of Electronic Digital Computers
Reading Material 1-2 Quantum Computer
Exercises
Chapter Two Computer Architecture
2-1Computer Motherboard
2-2Memory Hierarchy in Cache-Based Systems
Reading Material 2-1 Multi-core (computing)
Reading Material 2-2 CPHASH: A Cache-Partitioned Hash Table
Exercises
Chapter Three Data Structure44
3-1Balanced Tree Data Structures
3-2Quicksort
Reading Material 3-1 Linked List
Reading Material 3-2 Managed Data: Modular Strategies for Data Abstraction
Exercises
Chapter Four Operating System
4-1 Operating System Structure
4-2 Free-Space Management
Reading Material 4-1 Linux
Reading Material 4-2 What Are the Differences between iOS and Android?
Exercises
Chapter Five Programming Languages
5-1 History of Programming Languages
5-2 Object-Oriented Programming
Reading Material 5-1 Introduction to the C# Language and the NET Framework
Reading Material 5-2 Pair Programming
Exercises
Chapter Six Database Systems
6-1 Introduction to Database Systems
6-2 Distributed Database117
Reading Material 6-1 From Databases to Dataspaces
Reading Material 6-2 Oracle Database
Exercises
Chapter Seven Computer Network
7-1 Smarter Cities Are Built on the Internet of Things
7-2 Sliding Window Protocols
Reading Material 7-1 IPv6
Reading Material 7-2 WiFi-Nano: Reclaiming WiFi Efficiency Through 800 ns Slots
Exercises
Chapter Eight Internet
8-1 TCP/IP
8-2 Introduction of IPv6
Reading Material 8-1 A Basic Guide to the Internet
Reading Material 8-2 What Is Web 2.0
Exercises
Chapter Nine Geographic Information System
9-1 GIS Introduction174
9-2 GIS Data180
Reading Material 9-1 Application of GIS Techniques in Hong Kongs Population Census
Reading Material 9-2 Demystifying the Persistent Ambiguity of GIS as “Tool Versus “Science”
Exercises
Chapter Ten Information Security
10-1 Security and Precaution on Computer Network
10-2 Computer Virus
Reading Material 10-1 A National Cyberspace Security Response System
Reading Material 10-2 How to Implement Trusted Computing
Exercises
Chapter Eleven Information Security Technologies
11-1 Introducing Firewalls to IPv6
11-2 An Introduction to Information Security
Reading Material 11-1 Intrusion Detection Systems and Intrusion Response Mechanism
Reading Material 11-2 Internet Security Architecture
Exercises
Chapter Twelve Digital Image Processing
12-1 A Basic Introduction to Image Processing
12-2 An Evaluation of Popular Copy-Move Forgery Detection Approaches (Part I)
Reading Material 12-1An Evaluation of Popular Copy-Move Forgery Detection Approaches (Part II)
Reading Material 12-2An Overview of JPEG-2000
Exercises
Chapter Thirteen Management Information System
13-1 Data Warehouse
13-2 Challenges of Big Data for Development
Reading Material 13-1 The Opportunity of Big Data for Development
Reading Material 13-2 Steps Involved in Building a Data Warehouse
Exercises
Chapter Fourteen E-Commerce
14-1 Electronic Commerce
14-2 E-Commerce and Its Impact in Logistic Management: A State of Art
Reading Material 14-1 Seven Practical Trends in B2B Marketing
Reading Material 14-2 Chinas E-Commerce Service Industry
Exercises
Chapter Fifteen The Future of Information Technology
15-1 Location-Based Social Networks: Users
15-2 Native XML Databases
Reading Material 15-1 3G Technology
Reading Material 15-2 Microsoft Azure for Research Overview
Exercises
References