Dr. Bob Nielson, Tenured Associate Professor of Computer Science and Information Technology
E-MAIL: nielson@dixie.edu
PHONE: 435.652.7978
OFFICE HOURS: MWF 9:00 - 9:50 or by appointment

Dixie State Univeristy -- Courses Bob Teaches Spring 2017

Computer Science
High School Honors CS -- Problem Solving with a computer -- How to solve problems with a computer.
CS 1400 -- Introduction to Computer Programming.
CS 1410 -- Object Oriented Programming -- Second Semester computer programming.
CS 2450 -- Software Engineering (IT4450) -- Programming as a team.
CS 4991 -- Competitive Programming -- Prepare for programming contests.

Information Technology
IT 1100 -- Introduction to Operating Systems -- Linux, Windows, MAC-OS.
IT 1200 -- Computer Hardware (CJ2500) -- Hardware and Windows.
IT 3150 -- Windows Servers -- Installation and Configuration of Windows Server 2012.
IT 4300 -- Database Systems (CS4307) Installation, Design, and Programming of Database Systems.
IT 4310 -- Database Administration -- noSQL and Oracle Databases.

More About Bob
Bob has been a computer consultant and programmer throughout southern Utah for the last 30 years.
Bob has been teaching at Dixie State University for ten years now.

Academic Credentials and Degrees:
A+ - Comptia
Network + - Comptia
PCPRO - TestOut
BS - Mathematics - Southern Utah University
MS - Computer Science - Utah State University
DCS - Computer Science - Colorado Technical University

Finding a job in today's times can be challenging. Here is a power point presentation on the careers in the computer industry. It contains the job outlook and the salaries for each job in the industry.
Computer Careers 2013
Computer Careers 2014

Research Interests & Publications
Examining Database Security Methods -- Strategies to Prevent Inference-Based Snooping in Database Tables.
One of the primary reasons for a database is to capture data for future statistical analysis. But savvy users can use this information to deduce the confidential information that is contained in a database. A real need exists to allow for general statistical analysis from a database while still preventing the disclosure of detailed confidential information. This paper discusses several methods that attempt to do just that including query restriction, data perturbation, output perturbation, conceptual, partitioning, and hybrid methods.
Conference Paper Disertation Defense Presentation