Practical engineering ebooks that cover areas of electrical engineering, materials science, information security, communications, radar, remote sensing, and other areas of emerging technology. [2000-2018]
Full text of every article ever published by the Association for Computing Machinery (ACM) and bibliographic citations from major publishers in computing. [1954 - present]
Provides full-text access to journals, magazines, transactions, conference proceedings and newsletters published by the ACM (Association of Computing Machinery). Includes most historical and all current publications.
An interdisciplinary search through 22 of the the social sciences indexes on the ProQuest platform.
An interdisciplinary metasearch through 22 of the the social sciences indexes on the ProQuest platform. Includes EconLit, International Bibliography of the Social Sciences (IBSS), Linguistics and Language Behavior Abstracts, PAIS, PsycInfo, Sociological Abstracts, Worldwide Political Science Abstracts and more.
Online learning platform with videos and full courses covering software, technology, business and creative skills. Includes courses on Adobe and Microsoft tools, as well as a variety of other web, audio, video, IT, and education topics.
SAGE Research Methods’ coverage spans the full range of research methods used in the social and behavioral sciences, plus a wide range of methods commonly used in science, technology, medicine, and the humanities.
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. It begins with maps, diagrams, and charts -- but must push further than dry defaults to be truly effective. How do we attract attention? How can we offer audiences valuable experiences worth their time? How can we help people access complexity? Dark and mysterious, but full of potential, data is the raw material from which new understanding can emerge. Become a hero of the information age as you learn how to dip into the chaos of data and emerge with new understanding that can entertain, improve, and inspire. Whether you call the craft data storytelling, data visualization, data journalism, dashboard design, or infographic creation -- what matters is that you are courageously confronting the chaos of it all in order to improve how people see the world. Info We Trust is written for everyone who straddles the domains of data and people: data visualization professionals, analysts, and all who are enthusiastic for seeing the world in new ways.
From visionary Silicon Valley entrepreneur Tom Siebel comes a penetrating examination of the new technologies that are disrupting business and government--and how organizations can harness them to transform into digital enterprises. The confluence of four technologies--elastic cloud computing, big data, artificial intelligence, and the internet of things --writes Siebel, is fundamentally changing how business and government will operate in the 21st century. Siebel masterfully guides readers through a fascinating discussion of the game-changing technologies driving digital transformation and provides a roadmap to seize them as a strategic opportunity. He shows how leading enterprises such as Enel, 3M, Royal Dutch Shell, the U.S. Department of Defense, and others are applying AI and IoT with stunning results. Digital Transformation is the guidebook every business and government leader needs to survive and thrive in the new digital age.
Digital technologies are deeply embedded in everyday life with opportunities for information access and perpetual social contact now mediating most of our activities and relationships. This book expands the lens of Cyberpsychology to consider how digital experiences play out across the various stages of people's lives.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions.
How the interface has moved from the PC into cultural platforms, as seen in a series of works of net art, software art and electronic literature. The computer interface is both omnipresent and invisible, at once embedded in everyday objects and characterized by hidden exchanges of information between objects.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security.
A timely call-to-arms from a Silicon Valley pioneer. You might have trouble imagining life without your social media accounts, but virtual reality pioneer Jaron Lanier insists that we're better off without them. In Ten Arguments for Deleting Your Social Media Accounts Right Now, Lanier, who participates in no social media, offers powerful and personal reasons for all of us to leave these dangerous online platforms.
Your essential guide to the biggest revolution of the past century. David Fagan was at the forefront of this revolution as he helped take one of Australia's largest media organisations from print to digital. In Wake Up, he explores the challenges and opportunities of the digital age from his position on the front line.
Off-campus users are prompted to login via CalNet for online resources from library sites, including OskiCat and guides. Install the EZproxy bookmarklet to jump to the Cal login site when you encounter licensed library resources via Google or the open web.
VPN (Virtual Private Network)
Install the VPN client software on your computer. Open and connect to the "Library VPN" to establish a secure connection with the campus network each time you want to access any library-licensed resources.
A guide to library resources that allow some kind of support for text analysis applications. New
The UC Berkeley Library maintains a research-level collection of materials which support the research and teaching programs of the School of Information (I School). The I School is a graduate research and education community "committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy. This requires the insights of scholars from diverse fields—information and computer science, design, social sciences, management, law, and policy."
Photo credit: Berkeley, South Hall (in 1961, now home of the I School) by Roger Wollstadt on Flickr.