Главная

Популярная публикация

Научная публикация

Случайная публикация

Обратная связь

ТОР 5 статей:

Методические подходы к анализу финансового состояния предприятия

Проблема периодизации русской литературы ХХ века. Краткая характеристика второй половины ХХ века

Ценовые и неценовые факторы

Характеристика шлифовальных кругов и ее маркировка

Служебные части речи. Предлог. Союз. Частицы

КАТЕГОРИИ:






IX. List of recommended literature




Main literature:

1. Maximizing Mobile // 2012 Information and Communications for Development. World Bank, Washington D.C., 2012, 244 p.

2. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools and Applications (6 Volumes). 2008, pages: 4288

3. June J. Parsons, New Perspectives on Computer Concepts 18th Edition—Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2016; ISBN-10: 1-4239-0610-1, ISBN-13: 978-1-4239-0610-0.

4. Reema Thareja Fundamentals of Computers. – Oxford University press: Oxford, 2014. - 288p

5. George Beekman. Computer Confluence: Exploring Tomorrow's Technology. ISBN 0130661880, 9780130661883. Prentice Hall, 2003

6. Connolly T. M., Begg C. E. Database systems: a practical approach to design, implementation, and management. — Addison-Wesley, 2005. — P. 226.

7. Alison Balter's. Mastering Microsoft Office Access 2007 Development. — М.:«Вильямс», 2008.

8. Simson Garfinkel, Gene Spafford, Practical Unix and Internet Security, 3rd edition (2003), O'Reilly & Associates; ISBN: 0596003234. Chapter 11. Protecting Against Programmed Threats. Required Reading.

9. Sandeep Kumar, and Gene Spafford, "A Generic Virus Scanner in C++," Proceedings of the 8th Computer Security Applications Conference; IEEE Press, Piscataway, NJ; pp. 210-219, 2-4 Dec 1992. [Local copy.pdf] Required Reading.

10. Ozgun Erdogan and Pei Cao, Hash-AV: fast virus signature scanning by cache-resident filters, International Journal of Security and Networks, Volume 2, Number 1-2 / 2007 Pages: 50 - 59. Recommended Reading.

11. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson Education, 2012.

12. Robert. W. Sebesta, "Programming the World Wide Web", Fourth Edition, PearsonEducation, 2007

13. Deitel, Deitel, Goldberg, "Internet & World Wide Web How To Program", ThirdEdition, Pearson Education, 2006.

14. Marty Hall and Larry Brown,”Core Web Programming” Second Edition, Volume I andII, Pearson Education, 2001.

15. Fedorov А. Windows Azure: cloud platform Microsoft/ https://www.facultyresourcecenter.com/curriculum/ru/pfv.aspx?ID=8673&c1=ru-ru&c2=RU

16. Safonov В.О. Architecture, features and methods of use of cloud computing platform Microsoft Windows Azure/ https://www.facultyresourcecenter.com/ curriculum/ru/pfv.aspx?ID=8866&c1=ru-ru&c2=RU

17. Roger Jennings "Cloud Computing with the Windows Azure Platforms". -Wiley publishing, 2009.

18. Katunin, GP Multimedia Basics. Sound and video / GP Katunin: monograph. - Novosibirsk, SibSUTI.

19. Chapman, Nigel. Digital Technology Multimedia / Nigel Chapman, Jenny Chapman. 2nd izd.- AM: Dialectics.

20. Andersen, Bent B. Multimedia in Education / Bent B. Anderson, Kate van den Brink - M.: Bustard.

Additional literature:

1. Thomas M. Connolly, et al. Database Systems: A practical approach to Design, Implementation, and Management. 4th Edition ISBN: 0321210255 Addison-Wesley, 2004

2. H. L. Capron. Computers: Tools for an Information Age. Addison-Wesley, 1998. ISBN: 0201336138 | 9780201336139

3. Roqers Y., H. Sharp, J. Preece. Interaction design beyond human - computer interaction - Third Edition.- Italy: WILEY & Sons Ltd, 2011.- 585 p.

4. Ducket, J. Beginning Web Programming with HTML, XHTML, and CSS: 2th ed. / Jon Ducket.- U.S.A: Wiley Publishing. Inc, 2008.- 739s. ISBN 978-1-0-470-25931-3.

5. Stephen P Borgatti, Martin G. Everett, Jeffrey C. Johnson Analyzing Social Networks Paperback. ISBN: 978-1446247419 - 30 Apr 2013

6. Usha Rani Vyasulu Reddy. A series of textbooks on ICTD for Youth. Tutorial 1: Introduction to ICT for development. UN-APCICT / ESCAP 2011

7. Deitel HM, Deitel PJ., Chofnes DR OS. Part 1: Fundamentals and Principles. - M.: Binom-Press, 2011. - 677 c.

8. Yarochkin VI Information security: Textbook for universities. - M.: Acad. Project, 2008. - 544 c.

9. Golitsyn OL Databases: Textbook. - M.: Forum, 2012. - 400 c.

10. Keith Worden, W.A. Bullough, J. Haywood. Smart Technologies. World Scientific Pub Co Inc (April 14, 2003). ISBN-10: 9810247761 | ISBN-13: 978-9810247768

11.Connolly T. M., Begg C. E. Database systems: a practical approach to design, implementation, and management. — Addison-Wesley, 2005. — P. 226.

12.Alison Balter's. Mastering Microsoft Office Access 2007 Development. — М.:«Вильямс», 2008.


Discipline Policy

All work must be performed and defend within a specified time. Students who do not pass a regular job or received for its implementation less than 50% of points, have the opportunity to work on additional specified job schedule. Students who miss laboratory classes for a good reason, and spend their extra time in the presence of a laboratory, after approval of the teacher. Students who fail to meet all kinds of work, for the exam are not allowed. In addition, when evaluating based on activity and attendance of students during class.

Be tolerant and respect the opinions of others. Objection was formulated in the correct form. Plagiarism and other forms of unfair work unacceptable. Unacceptable prompting and cheating while putting CDS intermediate and final control

exam, copying solved problems by others, passing the exam for another student. Student convicted of falsification of any information rate, unauthorized access to the Intranet using cribs will receive a final evaluation of «F».

For advice on the implementation of independent works (CPC), their delivery and protection, as well as additional information on the material covered and all the other issues that arose in Reading courses, contact the instructor during his office hours.

Table 1

 

 

 

 

 

 

 

 

Alphabetic estimation Digital estimation (GPA) Points (%) Traditional estimation
А 4,0 95-100 «Excellent»
А- 3,67 90-94
В+ 3,33 85-89 «Good»
В 3,0 80-84
В- 2,67 75-79
С+ 2,33 70-74 «Satisfactorily»
С 2,0 65-69
С- 1,67 60-64
D+ 1,33 55-59
D 1,0 50-54
Ғ   0-49 «Unsatisfactorily» (chanceless estimation)

 

Syllabus considered and discussed at a meeting of the Department of " Information and communication technologies "

 

Protocol № ___ ''____'' _________ 2016y.

 

Head of the Department: A.O.Dautbaeva

 

Senior teacher: N.S.Kulmurzayev

B.K.Zhusipbek

Teacher: A.B.Adranova

 






Не нашли, что искали? Воспользуйтесь поиском:

vikidalka.ru - 2015-2024 год. Все права принадлежат их авторам! Нарушение авторских прав | Нарушение персональных данных