My Library

   
Limit search to available items
307 results found. sorted by date .
Result Page   1 2 3 4 5 6 7 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-50 of 307)
1
Book
Book Cover

The Cambridge handbook of the law of algorithms



Cambridge, United Kingdom : Cambridge University Press, 2023. 2023

Rating:

 

Copies

Location Call No. Status
 Male Library  K87.C354 2023    Available
2
---
Book Cover

All-in-one CISSP exam guide


Maymi, Fernando
New York [NY] : McGraw-Hill, 2022. 2022

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.5 .M33719 2022    Available
 Female Library  TK5105.5 .M33719 2022    Available
3
Text-Book
Book Cover

Data communications and networking : with TCP/IP protocol suite


Forouzan, Behrouz A.
New York, N.Y. : McGraw Hill , 2022. 2022

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.F6617 2022    Available
 Male Library  TK5105.F6617 2022 c.2  Available
 Female Library  TK5105.F6617 2022    Available
There are additional copies/volumes of this item
4
Text-Book
Book Cover

A first course in fuzzy logic


Nguyen, Hung T., 1944-
Boca Raton : CRC Press, 2022. 2022

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.87.N497 2023    Available
 Female Library  QA76.87.N497 2023 c.2  Available
5
Book
Book Cover

Algorithms and law


Ebers, Martin, 1970-
Cambridge, United Kingdom : Cambridge University Press, 2022. 2022

Rating:

 

Copies

Location Call No. Status
 Male Library  K87.E24 2023    Available
6
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
7
Book
Book Cover

Cyber risk management : prioritize threats, identify vulnerabilities and apply controls


Hodson, Christopher
London : KoganPage, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HD31.2.H637 2019    Available
 Male Library  HD31.2.H637 2019 c.2  Available
 Female Library  HD31.2.H637 2019    Available
8
Text-Book
Book Cover

Neural networks, fuzzy systems and evolutionary algorithms : synthesis and applications


Rajasekaran, Sundaramoorthy
Delhi : PHI Learning Private Limited, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.87.R35 2019    Available
 Male Library  QA76.87.R35 2019 c.2  Available
 Female Library  QA76.87.R35 2019    Available
There are additional copies/volumes of this item
9
Book
Book Cover

GDPR : how to achieve and maintain compliance


Foulsham, Mark, author
London ; New York : Routledge, Taylor & Francis Group, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5548.37.F68 2019    Available
 Male Library  HF5548.37.F68 2019 c.2  Available
 Female Library  HF5548.37.F68 2019    Available
There are additional copies/volumes of this item
10
Text-Book
Book Cover

A first course in fuzzy logic


Nguyen, Hung T., 1944- author
2019

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.87.N497 2019    Available
 Male Library  QA76.87.N497 2019 c.2  Available
11
Book
Book Cover

Neural networks and deep learning : a textbook


Aggarwal, Charu C.
Cham, Switzerland : Springer, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.87.A343 2018    Available
 Male Library  QA76.87.A343 2018 c.2  Available
 Female Library  QA76.87.A343 2018    Available
There are additional copies/volumes of this item
12
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
13
Book
Book Cover

Computer networking : a top-down approach


Kurose, James F
Boston : Pearson,Addison Wesley; 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.875.I57 K88 2017    Available
 Female Library  TK5105.875.I57 K88 2017 c.2  Available
 Male Library  TK5105.875.I57 K88 2017    Available
There are additional copies/volumes of this item
14
Book
Book Cover

Principles of information security


Whitman, Michael E., 1964-
Boston, MA : Cengage, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59 W54 2017    Available
 Female Library  TK5105.59 W54 2017    Available
15
Book
Book Cover

Electronic commerce


Schneider, Gary P. 1952-
Boston, MA : Cengage Learning, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5548.32.S36 2017    Available
 Female Library  HF5548.32.S36 2017    Available
16
Book
Book Cover

Defensive security handbook : best practices for securing infrastructure


Brotherston, Lee
Sebastopol, CA : O'Reilly Media, Inc., 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B7747 2017    Available
 Male Library  QA76.9.A25 B7747 2017    Available
17
Book
Book Cover

CompTIA cybersecurity analyst (CSA+) cert guide


McMillan, Troy
Indianapolis, Indiana : Pearson, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M36 2017    Available
 Male Library  QA76.9.A25 M36 2017    Available
18
Text-Book
Book Cover

Soft computing applications in sensor networks



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK7872.D48 S635 2017    Available
 Female Library  TK7872.D48 S635 2017    Available
19
Text-Book
Book Cover

Space-time computing with temporal neural networks


Smith, James E.
[San Rafael, California] : Morgan & Claypool, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.87.S658 2017    Available
 Female Library  QA76.87.S658 2017    Available
20
Text-Book
Book Cover

Analytical methods for network congestion control


Low, Steven H.
San Rafael, California : Morgan & Claypool, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.597.L69 2015    Available
 Female Library  TK5105.597.L69 2015    Available
21
Text-Book
Book Cover

Neural network methods for natural language processing


Goldberg, Yoav
[San Rafael, California] : Morgan & Claypool, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.N38 G653 2017    Available
 Female Library  QA76.9.N38 G653 2017    Available
22
Book
Book Cover

Blockchain : the blockchain for beginners guide to blockchain technology and leveraging blockchain programming


Thompsons, Josh
[North Charleston, S.C. : CreateSpace Independent Publishing Platform], 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.B56 T466 2017    Available
 Female Library  QA76.9.B56 T466 2017    Available
23
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
24
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S725 2017    Available
 Female Library  TK5105.59.S725 2017    Available
25
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
26
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.B45 A383 2017    Available
 Female Library  QA76.9.B45 A383 2017    Available
27
Text-Book
Book Cover

Security in the private cloud



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.S4435 2017    Available
 Female Library  QA76.585.S4435 2017    Available
28
Book
Book Cover

Principles of information security


Whitman, Michael E
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2016    Available
29
Book
Book Cover

Data communications & computer networks : a business user's approach


White, Curt M
Mason, OH : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 W467 2016    Available
30
Book
Book Cover

Guide to networking essentials


Tomsho, Greg
Australia : Cengage Learning, 2016 2016

Rating:

Copies

Location Call No. Status
 Male Library  TK5105.5 T64 2016    Available
 Female Library  TK5105.5 T64 2016    Available
31
Book
Book Cover

CCNA wireless 200-355 official cert guide


Hucaby, Dave
Indianapolis, IN : Cisco Press, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.3 H83 2016    Available
 Male Library  QA76.3 H83 2016    Available
32
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
33
Text-Book
Book Cover

Cloud computing networking : theory, practice, and development


Chao, Lee, 1951-
Boca Raton ; London : CRC Press/Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C439 2016    Available
 Female Library  QA76.585.C439 2016    Available
34
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
35
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
36
Book
Book Cover

CISSP guide to security essentials


Gregory, Peter H
Australia ; Boston, MA : Course Technology/Cengage Learning, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G7497 2015    Available
37
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Clifton Park, NY : Cengage Learning, 2015 2015

Rating:

Copies

Location Call No. Status
 Female Library  TK 5105.59 C52 2015    Available
38
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
39
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
40
Book
Book Cover

Business data communications and networking


FitzGerald, Jerry, 1936-
Hoboken, NJ : Wiley, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105 F577 2015    Available
 Female Library  TK5105 F577 2015 c.2  Available
41
Book
Book Cover

Introduction to networking : how the Internet works


Severance, Charles R
United States : CreateSpace Independent Publishing Platform, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 S49 2015    Available
 Female Library  TK5105.5 S49 2015 c.2  Available
42
Book
Book Cover

Computer and communication networks


Mir, Nader F
Upper Saddle River, NJ : Prentice Hall, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 M567 2015    Available
 Male Library  TK5105.5 M567 2015    Available
43
Book
Book Cover

Electronic commerce : a managerial perspective and social networks perspective



Upper Saddle River,NJ : Prentice Hall, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.32 E34 2015    Available
 Male Library  HF5548.32 E34 2015    Available
44
Text-Book
Book Cover

Case studies in secure computing : achievements and trends



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C426 2015    Available
 Female Library  QA76.9.A25 C426 2015    Available
45
Text-Book
Book Cover

Big data : a business and legal guide


Kalyvas, James R.
Boca Raton. FL : CRC Press, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  KF390.5.C6 K35 2015    Available
 Female Library  KF390.5.C6 K35 2015    Available
46
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearsonl, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S725 2014    Available
 Female Library  TK5105.59 S725 2014 c.2  Available
47
Book
Book Cover

Data and computer communications


Stallings, William
Boston : Pearson ; 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105 S73 2014    Available
 Female Library  TK5105 S73 2014 c.2  Available
48
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Stamford, CT, USA : Cengage Learning, 2014 2014

Rating:

Copies

49
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Australia ; Boston, MA, USA : Course Technology, Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W415 2014    Available
50
Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress is an imprint of Elsevier, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C9183 2014    Available
 Male Library  QA76.9.A25 C9183 2014    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   1 2 3 4 5 6 7 Next