You're browsing: Computer Science.

1259 results in your language, .


Showing results 1 through 10.

This course is Part II of a two-part mathematical introduction to the mechanics and control of robots that can be modeled as kinematic chains. Topics covered include the concept of a robot’s configuration space...
This course is Part II of a two-part mathematical introduction to the mechanics and control of robots that can be...

Have you ever wondered how software architects, requirements engineers and business analysts sketch and draw out their plans for a software system? In this computer science course, you will gain an in-depth...
Have you ever wondered how software architects, requirements engineers and business analysts sketch and draw out their...

Modern computer technology requires an understanding of both hardware and software, as the interaction between the two offers a framework for mastering the fundamentals of computing. The purpose of this course...
Modern computer technology requires an understanding of both hardware and software, as the interaction between the two...

While CS403: Introduction to Modern Database Systems covered many of the core concepts behind database management systems, there are many other considerations that should be addressed if you intend to pursue a...
While CS403: Introduction to Modern Database Systems covered many of the core concepts behind database management...

Cryptography is essentially the science of writing in secret code.  In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality,...
Cryptography is essentially the science of writing in secret code.  In data and telecommunications, cryptography...

This course will introduce you to modern operating systems. We will focus on UNIX-based operating systems, though we will also learn about alternative operating systems, including Windows. The course will begin...
This course will introduce you to modern operating systems. We will focus on UNIX-based operating systems, though we...

The World Wide Web (WWW) has become the primary means by which we conduct searches and perform billing transactions-events that can only occur with the support of specific applications. The purpose of this...
The World Wide Web (WWW) has become the primary means by which we conduct searches and perform billing...

Though we may not recognize them in our everyday activities, databases are everywhere. They are hidden behind your online banking profile, airline reservation systems, medical records, and even employment...
Though we may not recognize them in our everyday activities, databases are everywhere. They are hidden behind your...

The Internet has become one of the most important components of our life. We browse the Web, check e-mails, make VoIP phone calls, and have video conferences via computers. All of these applications are made...
The Internet has become one of the most important components of our life. We browse the Web, check e-mails, make VoIP...

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in...
This course focuses on the fundamentals of information security that are used in protecting both the information...

Showing results 1 through 10.

Next

Browse: Subjects