One of the greatest fears of anyone using a computer, smartphone, or tablet is the loss of their data. But there is hope, even in the worst situations. This book, written by a long-time computer science professor, department chair, and author, shows how the very complexity of modern computing devices helps make data recovery possible. Most “lost” data can be recovered easily by the average user. The book contains numerous simple examples that illustrate the step-by-step data recovery process for the most popular computer operating systems and software. We’ll also show you how to help recover your lost data from smartphones and tablets, as well as any data you may have stored in “the cloud.” In some cases, the problems are more complex than can reasonably be resolved by the typical user. The book also provides information on how to tell if you need expert help to solve your data recovery problems - and you’ll have enough technical background information how to judge the capability of that supposedly expert help to make sure that the data is recovered as much as humanly possible.
"synopsis" may belong to another edition of this title.
Ronald J. Leach recently retired as Professor and Chair Emeritus from the Department of Systems and Computer Science at Howard University, where he had taught since 1969. He received the B.S., M.S., and Ph.D. degrees from the University of Maryland at College Park and the M. S. degree in Computer Science from Johns Hopkins University. His research interests include distributed systems, performance modeling and capacity planning; and most areas of software engineering, especially software reuse, fault-tolerance, and software performance measurement and their empirical foundations. Much of this book is based on his 27 years of UNIX experience as a researcher in fault-tolerance; a teacher of operating systems, emphasizing UNIX; and as a consultant, who has analyzed hundreds of thousands of lines of UNIX code. Some of his current work includes the application of computing to the social sciences, especially in the area of name matching within historical documents, using both his computer search skills and genealogical knowledge. He is a frequent member of ABET site visit teams. He is an experienced lecturer, with special emphasis on identity theft and computer forensics. He also lectures to other groups. Ron Leach is the author of seven print books: "Using C in Software Design," Academic Press Professional,"Advanced Topics in UNIX," John Wiley; "Object-Oriented Design and Programming in C++," Academic Press Professional, Software Reuse: Methods, Models, and Costs," McGraw-Hill, "Introduction to Software Engineering," CRC Press, "Genealogy for the Information Age," Disruptive Publishing, and "Relative Genealogy," Disruptive Publishing. He has published two books on the subject of identity theft: "Twelve and a Half Steps to Avoid Identity Theft," as an ebook, and "Identity Theft in the Cyber Age," which is available as both an ebook and in print. Revised editions of many of these are available as ebooks. Dr. Leach has offered technical training and seminars on software reuse, reengineering, and testing on three continents. He has lectured on a variety of other topics between continents! He is also the author or co-author of more than one hundred technical papers. In his spare time, he is the co-Editor of the Maryland Genealogical Society Journal and is webmaster for its newly designed website.
"About this title" may belong to another edition of this title.
Book Description Ronald J Leach, 2013. Paperback. Book Condition: New. book. Bookseller Inventory # M1939142342
Book Description Ronald J Leach, 2013. Paperback. Book Condition: Brand New. 224 pages. 9.00x6.00x0.51 inches. In Stock. Bookseller Inventory # zk1939142342