Main

Welcome!

Welcome to the Erickson Library's Foundations of CIS guide. You'll find tabs at the top that will lead you to additional information with print and online resources. 

The Erickson Library is here to help you find credible and reliable information. Please feel free to call or email with any of your research questions!

Chapter 5: Computer Programming

JavaScript

More about: JavaScript (Wikipedia)
More about: Computer Programming Language (Britannica Academic)


NotePad++

NotePad++ Download


HTML Color Names

HTML Color Names (w3schools)


Document Object Model (DOM)

More about: Document Object Model (Mozilla)
More about: JavaScript HTML DOM (w3schools)


Keyboard Characters

ASCII Code - The Extended ASCII Table

Chapter 6: Cybersecurity

End User Best Practices

HowSecureIsMyPassword.net
1Password


Ciphers

More about: Cryptology (Britannica Academic)
More about: Vigenere Cipher (Britannica Academic)
More about: Data Encryption (Britannica Academic)
More about: Public-key Cryptography (Britannica Academic)
More about: DES (Britannica Academic)
More about: RSA Encryption (Britannica Academic)
More about: AES (Britannica Academic)


Twofish

VeraCrypt
PeaZip
KeePass
OpenPGP Standard


MDS Hash

MDS Hash Generator


SHA-2

SHA-256 Hash Calculator

Background / Definitions

Computer Science (Encyclopedia of Computer Science and Technology)
Computer Science (Oxford Encyclopedia of the History of American Science, Medicine, and Technology)

Encyclopedia of Computer Science and Technology

Books and EBooks

Search the Online Catalog




More Options





Videos

Crash Course: Computer Science

Virtualization Explained (IBM Cloud)

Representing Numbers and Letters with Binary: Crash Course Computer Science #4

Binary Numbers: Math Bites with Danica McKellar

JavaScript Tutorial for Beginners: Learn JavaScript in 1 Hour

Cybersecurity: Crash Course Computer Science #31

Cryptography: Crash Course Computer Science #33

Articles

Keyword Search Tips

1. Useful keywords: computer science, computer programming, cybersecurity
2. Break down your topic into smaller concepts and identify synonyms.
3. Use and to combine keywords, i.e. "computers and history"
4. Use or to expand your results, i.e. "computers or networks"
5. Use "quotaton marks" to search keywords as a phrase, i.e. "computer science"
6. Use an asterik* to search multiple endings, i.e. comput* will search computers, computing, etc.