計(jì)算機(jī)新技術(shù)教程(計(jì)算機(jī)系列教材)
定 價(jià):29 元
- 作者:湯曉兵、徐遵義、 趙洪鑾、白彧、袁衛(wèi)華
- 出版時(shí)間:2016/7/15
- ISBN:9787302434108
- 出 版 社:清華大學(xué)出版社
- 中圖法分類:TP3
- 頁碼:192
- 紙張:膠版紙
- 版次:1
- 開本:16K
本書精選和提煉了目前計(jì)算機(jī)專業(yè)領(lǐng)域新的研究成果和學(xué)術(shù)進(jìn)展,內(nèi)容取材廣泛,難易適中,每單元各具特色。通過對文章中專業(yè)詞匯、語法結(jié)構(gòu)的介紹和分析,為讀者將來在信息技術(shù)以及相關(guān)研究方向的英文資料的閱讀、翻譯和寫作等能力提供了重要的支撐和保證。本書結(jié)合作者多年計(jì)算機(jī)教學(xué)和科研中的寶貴經(jīng)驗(yàn),以及與國外學(xué)術(shù)交流的體會(huì)總結(jié),在保證本書專業(yè)知識領(lǐng)先的同時(shí),更著重體現(xiàn)了內(nèi)容的實(shí)用性和針對性。讀者在提高專業(yè)英語讀、寫、譯水平的同時(shí),可通過本書及時(shí)地跟蹤IT領(lǐng)域內(nèi)的首屈一指的技術(shù),把握學(xué)術(shù)上的研究熱點(diǎn),確立未來的學(xué)習(xí)和科研方向。
本書面向的讀者是高校信息技術(shù)相關(guān)專業(yè)的本科生、大專生或是從事軟、硬件開發(fā)及相關(guān)領(lǐng)域的工程技術(shù)人員,通過對每個(gè)單元中英文文獻(xiàn)專題的引入、分析和解決問題的過程,培養(yǎng)和提高讀者在專業(yè)英語方面的閱讀、翻譯和寫作的綜合能力。本書封面貼有清華大學(xué)出版社防偽標(biāo)簽,無標(biāo)簽者不得銷售。
1、取材新穎,專業(yè)優(yōu)勢突出,均系信息技術(shù)的熱點(diǎn)領(lǐng)域,代表新成果和研究方向;
2、涵蓋計(jì)算機(jī)硬、軟件范疇,深入淺出,涉及大量常用專用詞匯、語法和知識點(diǎn);
3、每個(gè)單元均帶有自編練習(xí),圍繞主題,形式多樣,適合互動(dòng),激發(fā)讀者學(xué)習(xí)興趣;
4、通過引入、分析和解決問題的過程,形成完整的學(xué)習(xí)體系,增強(qiáng)專業(yè)英語自學(xué)技能;
5、內(nèi)容圖文并茂,循序漸進(jìn),培養(yǎng)和提高專業(yè)英語的閱讀、翻譯和寫作等綜合應(yīng)用能力。
Unit 1Hardware—Microwave Integrated Circuits/1
1.1Classification of Microwave Integrated
Circuits/1
1.2Microwave Circuits in a Communication
System/6
1.3Summary/9
1.4New Words and Expressions/10
1.5Questions/10
1.6Problems/12Unit 2Software—Microsoft Project 2013 and the Project
Management Domain/13
2.1History of Project Management/13
2.2Exploring Project Management Industry
Standards/14
2.2.1Project Management Body of Knowledge
(PMBOK)/14
2.2.2PRINCE2/18
2.3WBS, Phases and Control Points, Methodologies,
and Life Cycles/20
2.3.1Work Breakdown Structure(WBS)/20
2.3.2Managerial Control/21
2.3.3Phases and Gates/21
2.3.4Methodologies/22
2.3.5Life Cycles/22
2.4Using Microsoft Project with Methodologies and
Life Cycles/22
2.4.1Waterfall Development Process/23
2.4.2Iterative Development/23
2.4.3Research Project/27
2.5Accommodating Teaming Styles/27
2.6Consultants Tips/28
2.6.1Determine the Approach to Use in
Managing Your Project/28
2.6.2Use WBS as a First Step in Project
Definition/28
2.6.3Use the 5×9 Checklist for Planning/29
2.7New Words and Expressions/29
2.8Questions/30
2.9Problems/31Unit 3Database—NoSQL Databases: An Overview /32
3.1NoSQL: What does it mean/32
3.2Why NoSQL Databases/32
3.3Aggregate Data Models/33
3.4Distribution Models/34
3.5CAP theorem/35
3.6Types of NoSQL Databases/36
3.6.1KeyValue databases/36
3.6.2Document databases/37
3.6.3Column family stores/38
3.6.4Graph Databases/38
3.7Why choose NoSQL database/40
3.8Choosing NoSQL database/41
3.9Schemaless ramifications/41
3.10Conclusion/42
3.11New Words and Expressions/42
3.12Questions/42
3.13Problems/45Unit 4Programming—What Software Architects Need to
Know About DevOps /46
4.1What Software Architects Need to Know About
DevOps/46
4.2Defining DevOps/46
4.3DevOps Practices and Architectural Implications/48
4.4Organizational Aspects of DevOps/50
4.5Implications for Software Architecture:
Microservices/51
4.6Summary/52
4.7New Words and Expressions/53
4.8Questions/53
4.9Problems/56Unit 5Office Computing—The Ultimate Players Guide to
MinecraftXbox Edition: Gathering Resources /57
5.1Introducing the HUD/57
5.2Avoiding Getting Lost/60
5.3Improving Your Tools/61
5.4Chests: Safely Stashing Your Stuff/63
5.5Avoiding Monsters/64
5.6Hunger Management/66
5.7Your Mission: Food, Resources, and
Reconnaissance/67
5.7.1Food on the Run/68
5.7.2Finding a Building Site/70
5.8A Resourceful Guide to the Creative Mode
Inventory/72
5.9The Bottom Line/74
5.10New Words and Expressions/74
5.11Questions/75
5.12Problems/77Unit 6Networking—Troubleshooting Methods for Cisco IP
Networks/78
6.1Troubleshooting Principles/78
6.2Structured Troubleshooting Approaches/81
6.2.1The TopDown Troubleshooting
Approach/83
6.2.2The BottomUp Troubleshooting
Approach/84
6.2.3The DivideandConquer Troubleshooting
Approach/85
6.2.4The FollowthePath Troubleshooting
Approach/86
6.2.5The CompareConfigurations Troubleshooting
Approach/87
6.2.6The SwapComponents Troubleshooting
Approach/88
6.3Troubleshooting Example Using Six Different
Approaches/89
6.4Summary/91
6.5New Words and Expressions/91
6.6Questions/92
6.7Problems/94Unit 7Mobile Application—Whats Special about Mobile
Testing? /95
7.1User Expectations/96
7.2Mobility and Data Networks/97
7.3Mobile Devices/98
7.4Mobile Release Cycles/100
7.5Mobile Testing Is Software Testing/101
7.6Summary/102
7.7New Words and Expressions/102
7.8Questions/103
7.9Problems/105Unit 8Web Development—The Mobile Commerce Revolution
and the Current State of Mobile/106
8.1Americans and Smartphones/106
8.2Mobile Around the World/109
8.3Mobile Commerce/110
8.4Beyond the Numbers/110
8.5The Bottom Line/113
8.6New Words and Expressions/113
8.7Questions/114
8.8Problems/116Unit 9Security—Information Security Principles of
Success/117
9.1Introduction/117
9.2Principle 1: There Is No Such Thing As Absolute
Security/117
9.3Principle 2: The Three Security Goals Are
Confidentiality, Integrity, and Availability/119
9.3.1Integrity Models/119
9.3.2Availability Models/120
9.4Principle 3: Defense in Depth as Strategy/120
9.5Principle 4: When Left on Their Own, People
Tend to Make the Worst Security Decisions/122
9.6Principle 5: Computer Security Depends on Two
Types of Requirements: Functional and
Assurance/122
9.7Principle 6: Security Through Obscurity Is Not
an Answer/123
9.8Principle 7: Security = Risk Management/124
9.9Principle 8: The Three Types of Security
Controls Are Preventative, Detective, and
Responsive/126
9.10Principle 9: Complexity Is the Enemy of
Security/127
9.11Principle 10: Fear, Uncertainty, and Doubt Do
Not Work in Selling Security/127
9.12Principle 11: People, Process, and Technology
Are All Needed to Adequately Secure a System
or Facility/127
9.13Principle 12: Open Disclosure of Vulnerabilities
Is Good for Security!/128
9.14Summary/129
9.15New Words and Expressions/129
9.16Questions/130
9.17Problems/131Unit 10Web Services—Designing Software in a Distributed
World/132
10.1Visibility at Scale/133
10.2The Importance of Simplicity/134
10.3Composition/134
10.3.1Load Balancer with Multiple Backend
Replicas/134
10.3.2Server with Multiple Backends/136
10.3.3Server Tree/138
10.4Distributed State/139
10.5The CAP Principle/142
10.5.1Consistency/142
10.5.2Availability/143
10.5.3Partition Tolerance/143
10.6Loosely Coupled Systems/145
10.7Speed/147
10.8Summary/150
10.9New Words and Expressions/151
10.10Questions/151
10.11Problems/153Unit 11Big Data—Big Data Computing/154
11.1Introduction/154
11.2Apache Hadoop Data modelling/156
11.3NoSQL Big Data systems/157
11.3.1Key Value stores/157
11.3.2Document databases/157
11.3.3Graph databases/158
11.3.4XML databases/158
11.3.5Distributed Peer Stores/158
11.3.6Object stores/159
11.4Definitions of Data Management /159
11.4.1Data management/159
11.4.2Big data management (BDM)/160
11.5The State of Big Data Management/160
11.6Big Data Tools/162
11.6.1Big data tools: Jaspersoft BI Suite/162
11.6.2Big data tools: Pentaho Business
Analytics/163
11.6.3Big data tools: Karmasphere Studio and
Analyst/163
11.6.4Big data tools: Talend Open Studio/164
11.6.5Big data tools: Skytree Server/164
11.6.6Big data tools: Tableau Desktop and
Server/165
11.6.7Big data tools: Splunk/165
11.7New Words and Expressions/166
11.8Questions/166
11.9Problems/168Unit 12Cloud Computing—The Practice of Cloud
System Administration: Operations in a
Distributed World/169
12.1Distributed Systems Operations/170
12.1.1SRE versus Traditional Enterprise
IT/170
12.1.2Change versus Stability/171
12.1.3Defining SRE/173
12.1.4Operations at Scale/174
12.2Service Life Cycle/177
12.2.1Service Launches/178
12.2.2Service Decommissioning/180
12.3Organizing Strategy for Operational Teams/180
12.3.1Team Member Day Types/183
12.3.2Other Strategies/185
12.4Virtual Office/186
12.4.1Communication Mechanisms/187
12.4.2Communication Policies/187
12.5Summary/188
12.6New Words and Expressions/189
12.7Questions/190
12.8Problems/191Answers to Questions/193References/194