Practical engineering ebooks that cover areas of electrical engineering, materials science, information security, communications, radar, remote sensing, and other areas of emerging technology. [2000-2018]
Full text of every article ever published by the Association for Computing Machinery (ACM) and bibliographic citations from major publishers in computing. [1954 - present]
Provides full-text access to journals, magazines, transactions, conference proceedings and newsletters published by the ACM (Association of Computing Machinery). Includes most historical and all current publications.
An interdisciplinary search through 22 of the the social sciences indexes on the ProQuest platform.
An interdisciplinary metasearch through 22 of the the social sciences indexes on the ProQuest platform. Includes EconLit, International Bibliography of the Social Sciences (IBSS), Linguistics and Language Behavior Abstracts, PAIS, PsycInfo, Sociological Abstracts, Worldwide Political Science Abstracts and more.
Online learning platform with videos and full courses covering software, technology, business and creative skills. Includes courses on Adobe and Microsoft tools, as well as a variety of other web, audio, video, IT, and education topics.
SAGE Research Methods’ coverage spans the full range of research methods used in the social and behavioral sciences, plus a wide range of methods commonly used in science, technology, medicine, and the humanities.
This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets.
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.
Digital technologies are deeply embedded in everyday life with opportunities for information access and perpetual social contact now mediating most of our activities and relationships. This book expands the lens of Cyberpsychology to consider how digital experiences play out across the various stages of people's lives.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions.
How the interface has moved from the PC into cultural platforms, as seen in a series of works of net art, software art and electronic literature. The computer interface is both omnipresent and invisible, at once embedded in everyday objects and characterized by hidden exchanges of information between objects.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security.
A timely call-to-arms from a Silicon Valley pioneer. You might have trouble imagining life without your social media accounts, but virtual reality pioneer Jaron Lanier insists that we're better off without them. In Ten Arguments for Deleting Your Social Media Accounts Right Now, Lanier, who participates in no social media, offers powerful and personal reasons for all of us to leave these dangerous online platforms.
Your essential guide to the biggest revolution of the past century. David Fagan was at the forefront of this revolution as he helped take one of Australia's largest media organisations from print to digital. In Wake Up, he explores the challenges and opportunities of the digital age from his position on the front line.
Off-campus users are prompted to login via CalNet for online resources from library sites, including OskiCat and guides. Install the EZproxy bookmarklet to jump to the Cal login site when you encounter licensed library resources via Google or the open web.
VPN (Virtual Private Network)
Install the VPN client software on your computer. Open and connect to the "Library VPN" to establish a secure connection with the campus network each time you want to access any library-licensed resources.
A guide to library resources that allow some kind of support for text analysis applications. New
The UC Berkeley Library maintains a research-level collection of materials which support the research and teaching programs of the School of Information (I School). The I School is a graduate research and education community "committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy. This requires the insights of scholars from diverse fields—information and computer science, design, social sciences, management, law, and policy."
Photo credit: Berkeley, South Hall (in 1961, now home of the I School) by Roger Wollstadt on Flickr.