Section Menu

CPSC 1100 Fundamental of Computer Science (Non-IA course)

Course Description:

(4) Credit Hours 

An introduction to computer science concepts and computer software development using a higher level language. Algorithms, flowcharting, programming, and documentation of numerical and non-numerical problems. Introduction to computer science terminology and concepts such as computer hardware and computer application areas. Lecture 2 hours, laboratory 3 hours. Prerequisite: MATH 1130 or MATH 1710 or MATH 1720 or MATH 1830 or MATH 1910 or MATH 1920 with a minimum grade of C or department head approval.

 

Texts

  • A guide to Working with Visual Logic, Thad Crews & Chip Murphy, Course Technology (available at www.course.com), ISBN-10: 0-324-60119-0
  • Visual Logic, ISBN-10: 1-4188-3773-3 (software)
  • Big Java, Cay Hortsman, Wiley, ISBN: 978-0-470-50948-7

 

Lecture Notes

 

 

CPSC 1100 Labs

 

Syllabus

References

Journal

  • ACM SIGCOMM Computer Communication Review. ACM, New York, NY, USA.
  • Computer science. (2008). Berlin: Springer.
  • Computer science review. (2007). New York: Elsevier Inc.
  • (n.d.). Journal of Computer Science and Technology. http://www.intute.ac.uk/sciences/cgi-bin/fullrecord.pl?handle=lesa.1110376257.
  • (1988). Social science computer review. [Thousand Oaks, Calif.], Sage Publications.
  • (1981). Science of computer programming. [Amsterdam], Elsevier Science. http://www.sciencedirect.com/science/journal/01676423.
  • IEEE Computer Society., & American Institute of Physics. (1999). Computing in science & engineering. College Park, Md: AIP.

Article

  • Computability, complexity, and languages: fundamentals of theoretical computer science. (September 01, 1994). Choice Reviews Online, 32, 1, 32-356.
  • Denning, P. J., & McGettrick, A. (January 01, 2005). Recentering computer science. Communications of the Acm, 48, 11.)
  • Technology, knowledge and learning. (2011). Dordrecht: Springer.

Book

  • Saff, E. B., & Snider, A. D. (1976). Fundamentals of complex analysis for mathematics, science, and engineering. Prentice-Hall.
  • Cardenas, A. F., Presser, L., & Marin, M. A. (1972). Computer science. New York: Wiley-Interscience.
  • Reilly, E. D., Ralston, A., & Hemmendinger, D. (2000). Encyclopedia of computer science. London: Nature Pub. Group.
  • Henderson, H. (2003). Encyclopedia of computer science and technology. New York, NY: Facts On File.
  • Dale, N. B., & Lewis, J. (2011). Computer science illuminated. Sudbury, Mass: Jones and Bartlett Publishers.

Resources

Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 
TEMPEST 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 
Remanence 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 

Incidents

Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams

CERT 

Configuration

Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management 

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomolies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 

Administration

Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On 

 

IA Sites

©