Updating search results...

Search Resources

486 Results

View
Selected filters:
  • Computer Science
CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - Confidentiality, Integrity, Availability
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Chowdhury, Fahad
NYC Tech-in-Residence Corps,
Date Added:
04/01/2020
CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - Encryption and Hashing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Chowdhury, Fahad
NYC Tech-in-Residence Corps,
Date Added:
04/01/2020
CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - Hackers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Chowdhury, Fahad
NYC Tech-in-Residence Corps,
Date Added:
04/01/2020
CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - Vulnerabilities and Exploits
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Chowdhury, Fahad
Corps, NYC Tech-in-Residence
Date Added:
04/01/2020
CIS 4400 Data Warehousing: Lecture 1 - "Overview"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Kok, Royce
Madhusudan, B
NYC Tech-in-Residence Corps,
Date Added:
04/01/2020
CIS 440 UNIX
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

This document is a topical outline of the CIS 440 UNIX Course. This course is mostly based on lab assignments that are performed by students using their home computers (desktops or laptops). The home computers are configured as virtual machines by installing the Oracle Virtual Box Version 6.12 The Ubuntu Desktop Operating System (version 20.04) is then installed on these virtual machines, which are then used to run the course labs. The first Unit of the syllabus covers the virtual machine configuration for the lab environment and subsequent Units are a topical outline of the course. The detailed content is on a companion Blackboard website.

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Provider:
CUNY Academic Works
Provider Set:
Borough of Manhattan Community College
Author:
Nossa, George A
Date Added:
10/01/2021
CISC 1050: Introduction to Computer Applications
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Introduction to the use of the computer in the home and office. Computer literacy. Word processing, database systems, and spreadsheets. Examination and evaluation of computer peripherals and software for personal computers.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Bibliography
Reading
Syllabus
Author:
Amy Wolfe
Miriam Briskman
Date Added:
09/20/2022
CISC 3130 Data Structures
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Stacks and their implementations. Prefix, postfix, and infix notation. Queues and linked lists and their implementations. Binary and general trees and their implementations and traversals. Sorting and searching techniques. Graph algorithms.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Homework/Assignment
Lecture Notes
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Katherine Chuang
Date Added:
12/08/2020
CISC 3140 Design and Implementation of Software Applications II
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Overview of full-stack implementation of large scale web applications. Team-based software development methodologies, tools and practice. Introduction to modern HTML, CSS. Separation of structure, style and behavior. JavaScript, dynamic types, functional programming, prototypal classes, and closures. HTTP client-server communication, synchronous and asynchronous communication. Java Server Pages, simple database creation, programmatic queries and updates.

Primary objective of this course is to provide the student with the experience of working in a fast-track development environment that requires a shifting balance between collaboration and autonomy. The student will be exposed to a wide range of software tooling across multiple eras of computing history. The student should plan for a considerable amount of focused attention outside of the classroom to complete assignments. Online resources will be provided for all lecture topics. You will get more out of the course if you have experience with some larger development projects, for example, through internships, or open-source contributions.

Tied to "Tools and Techniques in Software Engineering" textbooks at the URL: https://opened.cuny.edu/courses/tools-and-techniques-in-software-engineering

Subject:
Applied Science
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Bibliography
Lecture
Lecture Notes
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Katherine Chuang
Date Added:
12/08/2020
CISC 3140 Tools and Techniques in Software Engineering
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A collection of handbooks to various topics related to CISC 3140 Design and Implementation of Software Applications II, at Brooklyn College and beyond.

Use with CISC 3140 Design and Implementation of Software Applications II at URL
https://opened.cuny.edu/courses/cisc-3140-design-and-implementation-of-software-applications-ii

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Diagram/Illustration
Simulation
Teaching/Learning Strategy
Textbook
Tutorial
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Katherine Chuang
Date Added:
12/08/2020
CISC 3142 Programming Paradigms in C++
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

An introduction to C++ and its roles providing support for object-oriented programming, generic programming, procedural programming, and low-level programming. The C++ memory model, and topics in explicit memory management. Storage classes, scope, and compilation stages. The Standard Template Library. Comparison with Java.

Subject:
Applied Science
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Homework/Assignment
Reading
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Rebecca (Rivka) Levitan
Date Added:
03/08/2021
CISC 3310 Principles of Computer Architecture
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Introduction to digital logic. Basic digital circuits. Boolean algebra and combinational logic, data
representation and transfer, digital arithmetic. Instruction sets. Introduction to assembly
languages: ALU and memory reference instructions, flow control. Memory. I/O systems.
Performance. After successful completion of this course, students will have a thorough
understanding of the structure and behavior of computer systems and the logical and abstract
aspects of system implementation as seen by the programmer.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Vivek Sharma
Date Added:
07/18/2022
CISC 3320 Operating Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Design and implementation of operating systems for large computers. Multiprogramming, multiprocessing, time sharing. Resource allocation and scheduling. Communications, conversational computing, computer networks. Memory protection, interrupts, segmentation, paging, and virtual memories.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Activity/Lab
Reading
Syllabus
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Miriam Briskman
Date Added:
09/20/2022
CISC 3320 Operating Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

After successful completion of this course, students will have a thorough understanding of the features and functionality of operating systems that enable both end users and trained computer programming professionals to leverage the almost unlimited computing and storage capabilities of modern computers.

Subject:
Applied Science
Computer Science
Material Type:
Bibliography
Diagram/Illustration
Reading
Syllabus
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Harry Goldberg
Date Added:
11/17/2021
CISC 3325 Information Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Principles and practices of computer and network security. Fundamental concepts and principles of computer security, basic cryptography, authentication and access control, Internet vulnerability (malware, DoS attacks, etc), intrusion detection systems, firewalls, software and operating system security, database security, web and wireless security, managerial and ethical issues in computer security. Lab and project activities such as the use of network probing for illustrative and diagnostic purposes; security tool choice, deployment and configuration; secure programming techniques.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Full Course
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Emily Fairey
Miriam Briskman
Date Added:
09/29/2023
CISC 3810 Database Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Introduction to database systems. Comparison to file processing systems. Data models. Relational, hierarchical, and network systems. Database design. Normal forms. Study of several real-world database management systems, with an emphasis on microcomputer applications. Database recovery query and transaction processing, concurrency. Distributed and object-oriented databases. After successful completion of this course, students will have achieved proficiency in data modeling use the Entity-Relationship Model, Relational Database Design Techniques, Basic and Intermediate SQL query creation, and Database access techniques from current programming languages.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Activity/Lab
Bibliography
Diagram/Illustration
Reading
Syllabus
Provider:
CUNY
Provider Set:
Brooklyn College
Author:
Amy Wolfe
Harry Goldberg
Date Added:
06/02/2021