Tag Archives: Computers

What do peanuts, alcohol, and sugar cane have in common?


Did you know…following the arrival of the automobile, scientists immediately turned to biofuels? The German inventor Rudolf Diesel fueled his engine with peanut oil, while Henry Ford predicted that the fuel of choice would be alcohol-based. Now, all these years later, this interest in biofuels has been reawakened among the scientific community. Learn more about the options and our progress toward making them a reality in Achieving Sustainability, available on GVRL.Check it out!

——————————————————————————————-
GVRL (Gale Virtual Reference Library) is a wonderful eReference source available through your Ivy Tech Library. GVRL offers students thousands of full-text proprietary titles Subject areas include:

  • Arts & Entertainment
  • Biography & Genealogy
  • Business& Economics
  • Computing & IT
  • Education
  • Professional Development
  • Fiction
  • General Reference, Interests & Hobbies
  • Health & Nursing
  • History
  • Humanities & Social Sciences
  • Language
  • Law, Government & Politics
  • Literature
  • Mathematics & Science
  • Philosophy & Psychology
  • Religion & Mythology

Office 365 : migrating and managing your business in the cloud / Matthew Katzer, Don Crawford

Call number: HF5548.4.M525 K38 2013

Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services.  Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it.

The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization.  This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services.

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365.  This is a practical look at cloud migration and the use of different technologies to support that migration.  Numerous examples of cloud migration with technical migration details are included.
What you’ll learn-Overview of Microsoft Office 365’s operation and usage for any size enterprise
-Methods of planning and migration
-Office 365 management best practices
-Using Office 365 SharePoint to improve business processes
-Troubleshooting Office 365 installations
-Using Compliance, eDiscovery and Data Loss Prevention tools
-Office 365-site management best practices for IT administrators and business owners
Who this book is for Small-enterprise IT professionals and business owners who have the admin responsibilities for their business-IT needs. These people need refined reference information on basic set-up and configuration for their Office 365 installations, as well as best-practice-driven instruction on managing and troubleshooting their systems. (From Google Books)

Go! with Microsoft office 2013 / Shelley Gaskin

Call number: HF5548.4.M525 G36725 2014

The primary goal of the GO! Series, aside from teaching computer applications, is ease of implementation, with an approach that is based on clearly defined projects for students and a one-of-a-kind supplements package. Teaching and Learning Experience This program will provide a better teaching and learning experience—for you and your students. Here’s how: Personalize Learning: MyITLab delivers proven results in helping students succeed, provides engaging experiences that personalize learning, and comes from a trusted partner with educational expertise and a deep commitment to helping students and instructors achieve their goals. Engage Students with a Project-Based Approach: GO!’s project-based approach teaches students to solve real problems as they practice and learn the features. Motivate Students with Clear Instruction: Based on professor and student feedback, this text has been designed to offer clear instruction for full student comprehension. Teach the Course You Want in Less Time: The GO! series’ one-of-a kind instructional system provides you with everything you need to prepare for class, teach the material, and assess your students.(From Google Books)

New Library Technology Video Tutorials from Books 24X7

Books 24X7 has added a new feature–videos!  Most of these videos, over 1,000 of them, are only a few minutes long.  Desktop video topics include Business Applications, Graphics and Design, Internet, Microsoft Office 2003, Microsoft Office 2010, Microsoft Office 2013, Microsoft Office 365, Mobile Devices and Computer Skills, and Operating Systems.  IT and Technical video topics include Cloud Computing and Virtualization, Data and Databases, Operating Systems and Servers, Software Design and Development, and Web Development and Graphic Design.  If you want to learn how to use Microsoft Office or Adobe products, among others, this is the place to go.

CEH, Certified Ethical Hacker : exam guide : all-in-one / Matt Walker

Call number: QA76.3 .W3344 2012

Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
COVERS ALL EXAM TOPICS, INCLUDING:

  • Introduction to ethical hacking
  • Cryptography
  • Reconnaissance and footprinting
  • Network scanning
  • Enumeration
  • System hacking
  • Evasion techniques
  • Social engineering and physical security
  • Hacking web servers and applications
  • SQL injection
  • Viruses, trojans, and other attacks
  • Wireless hacking
  • Penetration testing

(From Google Books)

How to design websites / Alan Pipes

Call number: TK5105.888 .P57 2011

There are books on the nuts and bolts of web design and there are books about website aesthetics, showcasing examples of good design. This book contains the essentials of both, addressing the skillsets required to produce websites that are functional and elegant, but from a graphic designer’s perspective. It demonstrates that you can design a working website in minutes without the need for expensive programs. Chapters include Code, Layout, Text and Typography, and Images and Colour Schemes. Useful “tips and tricks” panels are included, as well as step by step projects such as how to produce a portfolio site, that will be of interest to design students and to graduates of all disciplines. Inspirational “Trailblazer” case studies showcase the best of contemporary designers and their work. Blogs, Facebook, Flickr and HTML5, and new ways of using the web, such as mobile phones and netbooks, are also discussed.(From Google Books)

Talking back to Facebook : a common sense guide to raising kids in the digital age / James P. Steyer

Call number: HQ784.I58 S75 2012

Now, more than ever, parents need help in navigating their kids’ online, media-saturated lives. Jim Steyer, founder and CEO of Common Sense Media, the nation’s leading kids-and media organization, and the father of four children, knows that many parents and teachers— unlike their technology-savvy kids—may be tourists in the online world. In this essential book, Steyer—a frequent commentator on national TV and radio—offers an engaging blend of straightforward advice and anecdotes that address what he calls RAP, the major pitfalls relating to kids’ use of media and technology: relationship issues, attention/ addiction problems, and the lack of privacy. Instead of shielding children completely from online images and messages, Steyer’s practical approach gives parents essential tools to help filter content, preserve good relationships with their children, and make common sense, value-driven judgments for kids of all ages.
Not just about Facebook, this comprehensive, no-nonsense guide to the online world, media, and mobile devices belongs in the hands of all parents and educators raising kids in today’s digital age. (From Google Books)

Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure

Call number: TK5105.59 .M48 2012

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself

(From Google Books)

Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz

Call number: TK5105.59 .M48 2012

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.(Google Books)