计算机科学概论(英文版·第5版)
作者 : (美)Nell Dale得克萨斯大学奥斯汀分校 John Lewis弗吉尼亚理工大学 著
丛书名 : 经典原版书库
出版日期 : 2015-01-27
ISBN : 978-7-111-44813-6
定价 : 69.00元
教辅资源下载
扩展信息
语种 : 英文
页数 : 692
开本 : 32
原书名 : Computer Science Illuminated,Fifth Edition
原出版社: Jones and Bartlet Publishers
属性分类: 教材
包含CD :
绝版 :
图书简介

本书由两位知名的计算机科学教育家编写,全面而细致地介绍了计算机科学的各个方面。书中,计算系统的每个分层都以剖析,从住处层开始,历经硬件层、程序设 计层、操作系统层、应用程序层的通信层,最后讨论了计算的限制。此外,正文中穿插了大量的人物传记、历史注释、道德问题和最新的技术发展信息,有助于你进 一步了解计算机科学。每章后面都附带有大量的练习,可以帮助你即时重温并掌握这一章所述的内容。

图书特色

操作系统课程是计算机及相关专业一门重要的专业课程,强调理论与实践的结合,特别是要通过实践深入理解操作系统的核心内容以及经典算法。本书基于作者多年的操作系统课程教学实践,充分考虑教学对象的差异性和教学计划的多样性,精心安排实践内容,旨在提供独立于任何操作系统理论教材的系统化实践参考。
本书特色
理论基础翔实。本书虽为实践教材,但作者不仅在书中回顾了操作系统理论课程中重要的知识点,还对实践项目中用到的开发环境、编程语言、调试技术等内容进行了介绍,为实践活动的进行奠定了扎实的理论基础。
层次化的实践内容。本书先介绍实践所需要的理论知识,接下来通过8个最能代表操作系统核心功能及特性的实验项目,帮助读者巩固理论知识;最后通过剖析一个小型的教学用操作系统Nachos的源代码,使读者透彻理解操作系统的功能和实现机制。
完善的实践架构。针对每一个实践内容,本书作者搭建出可行且易扩展的框架,涵盖实践的目的、要求、准备工作、所需的基本理论、实践内容、实践总结、实践报告及小组任务,最后还给出参考代码和相关的模板,流程清晰,任务明确,能适应不同水平读者的实践需求。
本书提供丰富的教学参考资源,包括PPT、实验题目源代码和Nachos系统源码,授课教师可登录华章网站下载。

上架指导

计算机科学及应用

封底文字

本书由当今该领域备受赞誉且经验丰富的教育家Nell Dale和John Lewis共同编写,全面介绍计算机科学领域的基础知识,为广大学生勾勒了一幅生动的画卷。就整体而言,全书内容翔实、覆盖面广,旨在向读者展示计算机科学的全貌;从细节上看,本书层次清晰、描述生动,基于计算机系统的洋葱式结构,分别介绍信息层、硬件层、程序设计层、操作系统层、应用程序层和通信层,涉及计算机科学的各个层面。
本书贯穿了计算机系统的各个方面,非常适合作为计算机专业的计算机导论课程教材,为后续专业课程打下坚实的基础;同时还适合作为非计算机专业的计算机总论课程教材,提供计算机系统全面完整的介绍。
第5版经过全面的修订和更新,具有以下特色:
●彻底更新了名人传记、历史点评以及技术发展的前沿知识,并就科技发展对人类社会伦理道德的影响进行了探讨。
●新增了计算机安全方面的最新信息,以及社会网络和云计算方面的介绍。
●更新了计算机科学的最新发展现状的内容。
●包含大量练习和思考题,方便教学。
本书的配套网站(go.jblearning.com/csilluminated5)集学术性及趣味性于一体,提供了大量教学资源:幻灯片、章末习题答案、部分实验练习答案、在线术语表、互动学习、填字游戏等,以更灵活的方式多方位地加深读者对本书知识的理解。

作者简介

(美)Nell Dale得克萨斯大学奥斯汀分校 John Lewis弗吉尼亚理工大学 著:Nell Dale 计算机科学领域广受推崇的教育家。在得克萨斯大学奥斯汀分校执教的二十多年中,她编写了四十多本计算机科学方面的本科生教材。她于得克萨斯大学奥斯汀分校获得了硕士学位和计算机科学博士学位。由于在计算机科学领域做出了卓越贡献,她于1996年获得了ACM SIGCSE计算机科学教育杰出贡献奖,于2001年获得了ACM Karl Karlston杰出教师奖。她于2010年被选为ACM会士。
John Lewis 计算机科学领域著名的教育家和作家。他编写的java软件及程序设计教材十分畅销。他于弗吉尼亚理工大学获得博士学位,并曾在维拉诺瓦大学计算机科学系执教14年,现任教于弗吉尼亚理工大学。执教期间,他获奖无数,包括大学卓越教学奖和Goff杰出教学奖。他的研究兴趣包括面向对象技术、多媒体和软件工程。

图书目录

Laying the Groundwork ..................................2

Chapter 1 The Big Picture 3
1.1 Computing Systems 4
Layers of a Computing System 4
Abstraction 6

1.2 The History of Computing 8
A Brief History of Computing Hardware 8
A Brief History of Computing Software 17
Predictions 23
1.3 Computing as a Tool and a Discipline 24
Summary 27Ethical Issues: The Tenth Strand 27
Key Terms 28
Exercises 28
Thought Questions 31
The Information Layer ..................................32

Chapter 2 Binary Values and Number Systems 33
2.1 Numbers and Computing 34
2.2 Positional Notation 34
Binary, Octal, and Hexadecimal 36
Arithmetic in Other Bases 39
Power-of-2 Number Systems 40
Converting from Base 10 to Other Bases 42
Binary Values and Computers 43
Summary 45
Ethical Issues: Knowledge Units for the Tenth Strand 46
Key Terms 46
Exercises 47 Thought Questions 51
Chapter 3 Data Representation 53
3.1 Data and Computers 54
Analog and Digital Data 55
Binary Representations 57
3.2 Representing Numeric Data 59
Representing Negative Values 59
Representing Real Numbers 63
3.3 Representing Text 66
The ASCII Character Set 67
The Unicode Character Set 67
Text Compression 69
3.4 Representing Audio Data 73
Audio Formats 75
The MP3 Audio Format 76
3.5 Representing Images and Graphics 76
Representing Color 76
Digitized Images and Graphics 78
Vector Representation of Graphics 79
3.6 Representing Video 80
Video Codecs 80
Summary 82 Ethical Issues: Codes of Ethics 82
Key Terms 84
Exercises 84
Thought Questions 89
The Hardware Layer .....................................90
Chapter 4 Gates and Circuits.91
4.1 Computers and Electricity.92
4.2 Gates.94
NOT Gate 94AND Gate 95
OR Gate 96
XOR Gate 96
NAND and NOR Gates 97
Review of Gate Processing 98
Gates with More Inputs 98
4.3 Constructing Gates.99
Transistors 99
4.4 Circuits.101
Combinational Circuits 102
Adders 105
Multiplexers 107
4.5 Circuits as Memory.108
4.6 Integrated Circuits.109
4.7 CPU Chips.110
Summary.110
Ethical Issues: Has a Professional Code of Ethics Been
Violated .111
Key Terms.111
Exercises.112
Thought Questions.117
Chapter 5 Computing Components.119
5.1 Individual Computer Components.120
5.2 Stored-Program Concept.125
von Neumann Architecture 125
The Fetch-Execute Cycle 130
RAM and ROM 132Secondary Storage Devices 133
Touch Screens 137
5.3 Embedded Systems.139
5.4 Parallel Architectures.140
Parallel Computing 140
Classes of Parallel Hardware 142
Summary.143 Ethical Issues: The Digital Divide.144
Key Terms.144Exercises.145
Thought Questions.148

The Programming Layer .............................150
Chapter 6 Low-Level Programming Languages and Pseudocode.151
6.1 Computer Operations.152
6.2 Machine Language.152
Pep/8: A Virtual Computer 153
6.3 A Program Example.160
Hand Simulation 161
Pep/8 Simulator 163
6.4 Assembly Language.165
Pep/8 Assembly Language 166
Assembler Directives 167
Assembly-Language Version of Program Hello 167
A New Program 168
A Program with Branching 170
A Program with a Loop 173
6.5 Expressing Algorithms.175
Pseudocode Functionality 175
Following a Pseudocode Algorithm 179
Writing a Pseudocode Algorithm 181
Translating a Pseudocode Algorithm 184
6.6 Testing.186
Summary.187 Ethical Issues: Copyrighting and Software Piracy 188
Key Terms.188 Exercises.189
Thought Questions.193
Chapter 7 Problem Solving and Algorithms.195
7.1 How to Solve Problems.196
Ask Questions 196
Look for Familiar Things 197
Divide and Conquer 198
Algorithms 198
Computer Problem-Solving Process 200
Summary of Methodology 202
Testing the Algorithm 202
7.2 Algorithms with Simple Variables.203
An Algorithm with Selection 203
Algorithms with Repetition 204
7.3 Composite Variables.210
Arrays 210
Records 211
7.4 Searching Algorithms.212
Sequential Search 212
Sequential Search in a Sorted Array 213
Binary Search 215
7.5 Sorting.218
Selection Sort 218Bubble Sort 221
Insertion Sort 222
7.6 Recursive Algorithms.223
Subprogram Statements 224
Recursive Factorial 225
Recursive Binary Search 226
Quicksort 227
7.7 Important Threads.232
Information Hiding 232
Abstraction 233
Naming Things 234
Testing 235
Summary.235
Ethical Issues: Open-Source Software 236
Key Terms.237
Exercises.237
Thought Questions.243
Chapter 8 Abstract Data Types and Subprograms.245
8.1 What Is an Abstract Data Type .246
8.2 Stacks.246
8.3 Queues.247
8.4 Lists.248
8.5 Trees.251
Binary Trees 251
Binary Search Trees 254
Other Operations 259
8.6 Graphs.260
Creating a Graph 262
Graph Algorithms 263
8.7 Subprograms.268
Parameter Passing 269
Value and Reference Parameters 271
Summary.274
Ethical Issues: Workplace Monitoring.275
Key Terms.276Exercises.276
Thought Questions.283
Chapter 9 Object-Oriented Design and High-Level Programming Languages.285
9.1 Object-Oriented Methodology.286
Object Orientation 286
Design Methodology 287
Example 290
9.2 Translation Process.295
Compilers 295
Interpreters 295
9.3 Programming Language Paradigms.298
Imperative Paradigm 298
Declarative Paradigm 299
9.4 Functionality in High-Level Languages.301
Boolean Expressions 301
Data Typing 303Input/Output Structures 308
Control Structures 310
9.5 Functionality of Object-Oriented Languages.317
Encapsulation 317Classes 318
Inheritance 320
Polymorphism 321
9.6 Comparison of Procedural and Object-Oriented Designs.322

Summary.324Ethical Issues: Hoaxes and Scams.325
Key Terms.326
Exercises.326
Thought Questions.331
The Operating Systems Layer ...................332
Chapter 10 Operating Systems.333
10.1 Roles of an Operating System.334
Memory, Process, and CPU Management 336
Batch Processing 337
Timesharing 338
Other OS Factors 339
10.2 Memory Management.340
Single Contiguous Memory Management 341
Partition Memory Management 343
Paged Memory Management 345
10.3 Process Management.347
The Process States 347
The Process Control Block 349
10.4 CPU Scheduling.349
First Come, First Served 350
Shortest Job Next 351
Round Robin 351
Summary.353
Ethical Issues: Medical Privacy: HIPAA.354
Key Terms.355
Exercises.355
Thought Questions.361
Chapter 11 File Systems and Directories.363
11.1 File Systems.364
Text and Binary Files 364
File Types 365
File Operations 367
File Access 368
File Protection 369
11.2 Directories.370
Directory Trees 371
Path Names 372
11.3 Disk Scheduling.375
First-Come, First-Served Disk Scheduling 377
Shortest-Seek-Time-First Disk Scheduling 377
SCAN Disk Scheduling 378
Summary.379
Ethical Issues: Privacy: Opt-In or Opt-Out .379
Key Terms.380
Exercises.380
Thought Questions.385
The Applications Layer ..............................386
12.1 Managing Information.388
12.2 Spreadsheets.389
Spreadsheet Formulas 391
Circular References 394
Spreadsheet Analysis 397
12.3 Database Management Systems.398
The Relational Model 398
Relationships 401
Structured Query Language 402
Database Design 404
12.4 E-Commerce.405
Summary.406
Ethical Issues: Politics and the Internet: The Candidate's
View.408
Key Terms.408Exercises.409
Thought Questions.413
Chapter 13 Artificial Intelligence 415
13.1 Thinking Machines.416
The Turing Test 417
Aspects of AI 419
13.2 Knowledge Representation.419
Semantic Networks 420
Search Trees 422
13.3 Expert Systems.424
13.4 Neural Networks.427
Biological Neural Networks 427
Artificial Neural Networks 429
13.5 Natural Language Processing.430
Voice Synthesis 431
Voice Recognition 432
Natural Language Comprehension 433
13.6 Robotics.435
The Sense-Plan-Act Paradigm 435
Subsumption Architecture 438
Physical Components 439
Summary.439
Ethical Issues: Politics and the Internet: The Public's View.440
Key Terms.441
Exercises.441
Thought Questions.445
Chapter 14 Simulation, Graphics, Gaming, and Other Applications.447
14.1 What Is Simulation .448
Complex Systems 448Models 449
Constructing Models 449
14.2 Specific Models.451
Queuing Systems 451
Meteorological Models 454
Computational Biology 460
Other Models 460
Computing Power Necessary 461
14.3 Computer Graphics.461
How Light Works 464
Object Shape Matters 465
Simulating Light 466
Modeling Complex Objects 468
Getting Things to Move 474
14.4 Gaming.475
History of Gaming 476
Creating the Virtual World 477
Game Design and Development 478
Game Programming 479
Summary.480
Ethical Issues: Gaming as an Addiction.481
Key Terms.482
Exercises.482
Thought Questions.485
The Communications Layer ......................486

15.1 Networking.488
Types of Networks 489
Internet Connections 491
Packet Switching 494
15.2 Open Systems and Protocols.495
Open Systems 495
Network Protocols 496
TCP/IP 496
High-Level Protocols 497
MIME Types 498
Firewalls 498
15.3 Network Addresses.500
Domain Name System 501
15.4 Cloud Computing.503
Summary.504
Ethical Issues: Effects of Social Networking.506
Key Terms.507
Exercises.507
Thought Questions.511
Chapter 16 The World Wide Web.513
16.1 Spinning the Web.514
Search Engines 515
Instant Messaging 516
Weblogs 516
Cookies 517
16.2 HTML.518
Basic HTML Formatting 521
Images and Links 522
HTML5 524
16.3 Interactive Web Pages.525
Java Applets 525
Java Server Pages 526
16.4 XML.527
16.5 Social Networks 530
Summary.532
Ethical Issues: Gambling and the Internet.534
Key Terms.534
Exercises.535
Thought Questions.539
Chapter 17 Computer Security.541
17.1 Security at All Levels.542
Information Security 542
17.2 Preventing Unauthorized Access.544
Passwords 545
CAPTCHA 547
Fingerprint Analysis 548
17.3 Malicious Code.549
Antivirus Software 550
Security Attacks 551
17.4 Cryptography.552
17.5 Protecting Your Information Online 555
Security and Portable Devices 557
WikiLeaks 558
Summary.559Ethical Issues: Blogging.561
Key Terms.562
Exercises.563
Thought Questions.565
In Conclusion ...............................................566
Chapter 18 Limitations of Computing.567
18.1 Hardware.568
Limits on Arithmetic 568
Limits on Components 574
Limits on Communications 575
18.2 Software.576
Complexity of Software 577
Current Approaches to Software Quality 578
Notorious Software Errors 582
18.3 Problems.585
Comparing Algorithms 585 Turing Machines 592
Halting Problem 595
Classification of Algorithms 597
Summary.599
Ethical Issues: Therac-25: Anatomy of a Disaster.600
Key Terms.600
Exercises.601
Thought Questions.605
Glossary...607
Endnotes...625
Index...633
Photo Credits.663

教学资源推荐
作者: Michael Miller
作者: Behrouz Forouzan;Firouz Mosharraf
作者: (印度) Ranjan Bose 著
作者: 陈守孔 胡潇琨 李玲 冯广慧 编著
参考读物推荐
作者: [希]帕诺斯·卢里达斯(Panos Louridas) 著
作者: 杨剑 张璞 陈火红
作者: 华诚科技 编著
作者: 张云泉 袁良 著