CT Textbook Site

CT eyeCT Headlines

CT:Abstract Away (page 5)

CT:Add Security Layers (page 159)

CT:All for One and One for All (page 171)

CT:Apply Domain Knowledge (page 18)

CT:Apply the Recursion Magic (page 186)

CT:Backup in the Cloud (page 117)

CT:Be Aware of the Implicit Context (page 126)

CT:Be Careful with Online Information (page 131)

CT:Believe It or Not (page 140)

CT:Better Control Better System (page 92)

CT:Beware of Bugs (page 162)

CT:Beware of Semantics (page 10)

CT:Bootstrapping (page 241)

CT:Bottom Up (page 51)

CT:Break It Down (page 19)

CT:Breakthrough (page 160)

CT:Build It Up (page 181)

CT:Cache for Speed (page 138)

CT:Capture the State (page 86)

CT:Check before Proceeding (page 12)

CT:Combine Basic Components (page 61)

CT:Combine Web and Database (page 224)

CT:Compartmentalize (page 242)

CT:Compression Is Not Encryption (page 217)

CT:Configure and Enjoy (page 234)

CT:Consider Extreme Cases (page 14)

CT:Coordinate or Else (page 235)

CT:Create a Virtuous Cycle (page 52)

CT:Customize for Efficiency (page 220)

CT:Cut It Down (page 180)

CT:Data Context (page 40)

CT:Data Is Application Dependent (page 211)

CT:Data to Insight (page 225)

CT:Decentralize (page 112)

CT:Deliver the Message (page 44)

CT:Develop for Users (page 139)

CT:Devise Heuristics (page 197)

CT:Evaluate Different Options (page 30)

CT:Expose Only the Interface (page 244)

CT:First Things First (page 12)

CT:Follow Protocol (page 104)

CT:Follow the Logic (page 58)

CT:Form Tree Structures (page 195)

CT:Free from Surveillance (page 169)

CT:Garbage in, Garbage Out (page 201)

CT:Google It (page 140)

CT:Guard Personal Data (page 226)

CT:Indirection Adds Flexibility (page 110)

CT:Install That App (page 231)

CT:Interoperate (page 107)

CT:Interpreting Data (page 210)

CT:Keep It in Context (page 85)

CT:Know Your Arena (page 75)

CT:Learn That App (page 233)

CT:Learn from Trees (page 83)

CT:Logic Checks (page 56)

CT:Make It an Algorithm (page 14)

CT:Mark It Up (page 130)

CT:Markup for Interoperability (page 215)

CT:Meaning of Symbols (page 29)

CT:Mind Resource Limitations (page 35)

CT:Mind the Trade-Off (page 80)

CT:No App, No Way (page 233)

CT:Notice the Logic (page 48)

CT:One and All (page 101)

CT:Pay Attention to Details (page 76)

CT:Perform Everyday Programming (page 66)

CT:Prevent Illicit Login (page 151)

CT:Promote Free and Open (page 72)

CT:Ready for All Contingencies (page 12)

CT:Really Use Your Website (page 131)

CT:Redundancy for Safety (page 100)

CT:Remember Recursion (page 183)

CT:Remind Yourself (page 231)

CT:Reprogram Your Brain (page 249)

CT:Safeguard Security Realms (page 149)

CT:Save Trees with PDF (page 211)

CT:Secure Sensitive Files (page 159)

CT:Sign Digitally (page 164)

CT:Small Is Beautiful (page 205)

CT:Start from the End (page 37)

CT:Step by Step (page 17)

CT:Stepwise Refinement (page 181)

CT:Symbols Can Be Deceiving (page 35)

CT:Synthesize and Simplify (page 222)

CT:Timesharing (page 90)

CT:Version 2.0 (page 182)

CT:Wear Different Hats (page 127)

CT:Weigh Speed vs. Complexity (page 196)