The dozen activities in this book don't require a computer, but will help readers become masters at computational thinking. This volume stars out with activities highlighting the necessity of giving clear, direct instructions. It continues to include instructions that introduce readers to concept of
Build Your Computer Security Skills
โ Scribed by Adam Furgang; Christopher Harris
- Book ID
- 110715118
- Publisher
- Enslow Publishing, LLC
- Year
- 2019
- Tongue
- English
- Weight
- 6 MB
- Series
- Unplugged Activities for Future Coders
- Category
- Fiction
- ISBN-13
- 9781978510661
No coin nor oath required. For personal study only.
โฆ Synopsis
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption, coming up with secure passwords, two-step verification, phishing, and fingerprint identification.
๐ SIMILAR VOLUMES
A single error in a line of code can cause a computer program to go haywire or stop working entirely. Luckily coding has a process for dealing with errors: debugging. Debugging consists of finding and fixing errors in code. You don't have to work as a coder to develop your debugging skills, though.
From the simplest applications to the largest networking centers, algorithms are the heartbeat of computer science. The beauty of computers is their ability to automate processes, and algorithms are the tools coders use to make that possible. They employ core computational thinking skills, including
rity control as one might imagine. Worse yet, part of Windows NT networking is based on old protocols (dating back to the 1970s when networking was in its infancy and when network security was hardly a concern). The fact that the same TCP/IP and UPD/UP services that have introduced so many security-