Skip to Main Content

Computer Science & Information Technology

 

Begin Your Search Here

 

 

 

 

Recommended Books

Artificial intelligence : modern magic or dangerous future? - Head with a half human and half robot face
Disinformation : the nature of facts and lies in the post-truth era - Title in red and white letters on a black background
Unmasking AI : my mission to protect what is human in a world of machines - A person holding a mask up to their face
Your face belongs to us : a secretive startup's quest to end privacy as we know it - Blurred faces
Generative deep learning : teaching machines to paint, write, compose, and play - Bird on a branch
Deter, disrupt, or deceive : assessing cyber conflict as an intelligence contest - Distorted eyes on a computer screen
How AI works : from sorcery to science - A hand peeking under a witches hat to reveal a robot
The myth of artificial intelligence : why computers can't think the way we do - White background with black dots
Cybersecurity and information security analysts : a practical career guide - People in front of computer screens
Working with AI : real stories of human-machine collaboration - Animation of people communicating with computers
Exploring careers in cybersecurity and digital forensics - Animated Image of computers

Recommended eBooks

Brain-computer interface : using deep learning applications - Scanned image or a head that shows the brain and the bone in the neck
Eye Tracking and Visual Analytics - Pixelated image of an eye
Cryptography and network security - Image of a padlock
Robotic Process Automation - Gears and Cogwheels
Digital transformations : new tools and methods for mining technological intelligence - Computerized scan of a city
Business database technology - projected image of a map
Evolving networking technologies : developments and future directions - Image of a control board behind the title
Information security practices for the Internet of Things, 5G, and next-generation wireless networks - Image of a padlock in a shield hovering over a keyboard
Cyber deception techniques, strategies, and human aspects - Abstract colors at the top
Technology and (dis)empowerment : a call to technologists - Two men sitting on the ground, one man holding a cell phone and looking at a flyer