My Library

   
Limit search to available items
236 results found. sorted by date .
Result Page   Prev 1 2 3 4 5 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (51-100 of 236)
51
Book
Book Cover

C# programming : from problem analysis to program design


Doyle, Barbara
Australia: Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.73.C154 D58 2016    Available
52
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
53
Text-Book
Book Cover

Start programming using HTML, CSS, and JavaScript


Fajfar, Iztok
Boca Raton : CRC Press, Taylor & Francis Group, CRC Press is an imprint of the Taylor & Francis Group, an Informa business, c2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.625.F355 2016    Available
 Female Library  QA76.625.F355 2016    Available
54
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  TK5105.8857.D545 2016    Available
 Female Library  TK5105.8857.D545 2016    Available
55
Book
Book Cover

Online-Public-Relations = Eine empirische analyse


Gasser, David A.
[Norderstedt, Germany] : Genios Verlag, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD59.G377 2016    Available
 Female Library  HD59.G377 2016    Available
56
Book
Book Cover

Social media campaigns : strategies for public relations and marketing


Kim, Carolyn Mae
New York ; London : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD59.K56 2016    Available
 Female Library  HD59.K56 2016    Available
57
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
58
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
59
Book
Book Cover

CISSP guide to security essentials


Gregory, Peter H
Australia ; Boston, MA : Course Technology/Cengage Learning, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G7497 2015    Available
60
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Clifton Park, NY : Cengage Learning, 2015 2015

Rating:

Copies

Location Call No. Status
 Female Library  TK 5105.59 C52 2015    Available
61
Book
Book Cover

Digital business and e-commerce management : strategy, implementation and practice


Chaffey, Dave
Upper Saddle River, NJ : Pearson Education International, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.32 D574 2015    Available
 Male Library  HF5548.32 D574 2015    Available
62
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
63
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
64
Text-Book
Book Cover

Programming the World Wide Web


Sebesta, Robert W.
Boston : Pearson, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.625.S42 2015    Available
 Male Library  QA76.625.S42 2015 c.2  Available
 Female Library  QA76.625.S42 2015    Available
There are additional copies/volumes of this item
65
Text-Book
Book Cover

Case studies in secure computing : achievements and trends



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C426 2015    Available
 Female Library  QA76.9.A25 C426 2015    Available
66
Text-Book
Book Cover

Identity management for internet of things


Mahalle, Parikshit N.
Aalborg, Denmark : River Publishers, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.5915.M34 2015    Available
 Female Library  QA76.5915.M34 2015    Available
67
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearsonl, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S725 2014    Available
 Female Library  TK5105.59 S725 2014 c.2  Available
68
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Stamford, CT, USA : Cengage Learning, 2014 2014

Rating:

Copies

69
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Australia ; Boston, MA, USA : Course Technology, Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W415 2014    Available
70
Book
Book Cover

Teacher leadership : new conceptions for autonomous student learning in the age of the internet


Katyal, Kokila Roy
London ; New York : Routledge, Taylor & Francis Group, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  LB2806 .K275 2014    Available
 Male Library  LB2806 .K275 2014    Available
71
Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress is an imprint of Elsevier, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C9183 2014    Available
 Male Library  QA76.9.A25 C9183 2014    Available
72
Book
Book Cover

Network security through data analysis : building situational awareness


Collins, Michael (Michael Patrick)
Beijing : O'Reilly, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C64 2014    Available
 Female Library  TK5105.59 C64 2014 c.2  Available
73
Book
Book Cover

Cyber operations and the use of force in international law


Roscini, Marco
Oxford : Oxford University Press 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  K564.C6 R67 2014    Available
 Male Library  K564.C6 R67 2014    Available
74
Book
Book Cover

Computer security and penetration testing


Basta,Alfred
Stamford, Connecticut : Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B366 2014    Available
 Female Library  TK5105.59 B366 2014 c.2  Available
75
Text-Book
Book Cover

HTML5 game development from the ground up with Construct 2


Dillon, Roberto
Boca Raton : CRC Press, Taylor & Francis Group, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.76.C672 D534 2014    Available
 Female Library  QA76.76.C672 D534 2014    Available
76
Book
Book Cover

Everybody writes : your go-to guide to creating ridiculously good content


Handley, Ann, 1963-
Hoboken, United States : Wiley, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5415.1265 .H3578 2014    Available
77
Book
Book Cover

Eleventh hour CISSP : study guide


Conrad, Eric, 1967-, author
Amsterdam : Elsevier, 2017. 2014

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.3.C65666 2017    Available
 Female Library  QA76.3.C65666 2017    Available
78
Text-Book
Book Cover

E-marketing


Strauss, Judy
Boston : Pearson , 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5415.1265 S73 2014    Available
 Female Library  HF5415.1265 S73 2014 c.2  Available
 Male Library  HF5415.1265 S73 2014    Available
There are additional copies/volumes of this item
79
Book
Book Cover

Information security for managers


Workman, Michael D., 1957-
Burlington, MA : Jones & Bartlett Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.37 W67 2013    Available
 Female Library  HF5548.37 W67 2013 c.2  Available
 Female Library  HF5548.37 W67 2013 c.3  Available
There are additional copies/volumes of this item
80
Book
Book Cover

Internet marketing : integrating online and offline strategies


Roberts, Mary Lou
Mason, OH : South-Western Cengage Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5415.1265 R617 2013    Available
81
Book
Book Cover

Information security : the complete reference


Rhodes-Ousley, Mark
Emeryville, Calif. : McGraw-Hill/Osborne ; London : McGraw-Hill [distributor], 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 R463 2013    Available
 Female Library  QA76.9.A25 R463 2013 c.2  Available
 Male Library  QA76.9.A25 R463 2013    Available
There are additional copies/volumes of this item
82
Book
Book Cover

Guide to network security



Boston, MA : Course Technology/Cengage Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
83
Book
Book Cover

From tribe to Facebook : the transformational role of social networks


Suwaidi, Jamal S
Abu Dhabi : The Emirates Center for Strategic Studies and Research, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HM741 S89 2013    Available
 Female Library  HM741 S89 2013 c.2  Available
 Male Library  HM741 S89 2013    Available
There are additional copies/volumes of this item
84
Book
Book Cover

Guide to network security


Whitman, Michael E
Boston, MA : Course Technology, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
85
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
86
Text-Book
Book Cover

A gift of fire : social, legal, and ethical issues for computing technology


Baase, Sara
Upper Saddle River, NJ : Pearson, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.C66 B3 2013    Available
 Male Library  QA76.9.C66 B3 2013    Available
 Male Library  QA76.9.C66 B3 2013 c.2  Available
There are additional copies/volumes of this item
87
Book
Book Cover

Networking essentials


Beasley, Jeffrey S., 1955-
Indianapolis, Ind. : Pearson, c2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 B39 2012    Available
 Female Library  TK5105.5 B39 2012 c.2  Available
88
Book
Book Cover

Digital marketing : strategy, implementation and practice


Chaffey, Dave
Harlow ; New York : Pearson , 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5415.1265 C43 2012    Available
89
Book
Book Cover

Computer security : principles and practice


Stallings, William
Boston : Pearson, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2012    Available
90
Book
Book Cover

Computer networks : a top-down approach


Forouzan, Behrouz A
New York, NY : McGraw-Hill, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 .F577 2012    Available
 Male Library  TK5105.5 .F577 2012    Available
91
Book
Book Cover

New media and public relations



New York, United States : Peter Lang, 2012. 2012

Rating:

 

Copies

Location Call No. Status
 Male Library  HM1221.N47 2012    Available
92
Book
Book Cover

Advanced wireless communications & Internet : future evolving technologies


Glisic, Savo G
Chichester, West Sussex, U.K. ; Hoboken, N.J. : Wiley , 2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5103.2 G548 2011    Available
93
Book
Book Cover

Security strategies in Web applications and social networking


Harwood, Mike
Sudbury, MA : Jones & Bartlett Learning, 2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  HM742 H38 2011    Available
 Female Library  HM742 H38 2011 c.2  Available
 Female Library  HM742 H38 2011 c.3  Available
There are additional copies/volumes of this item
94
Book
Book Cover

Copies

Location Call No. Status
 Female Library  HM742 L23 2011    Available
 Female Library  HM742 L23 2011 c.2  Available
95
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Boston : Prentice Hall, c2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .S713 2011    Available
 Male Library  TK5105.59 .S713 2011    Available
96
Text-Book
Book Cover

IT auditing : using controls to protect information assets


Kegerreis, Mike
New York : McGraw-Hill, c2020. 2011

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A93 K44 2020    Available
 Male Library  QA76.9.A93 K44 2020 c.2  Available
 Female Library  QA76.9.A93 K44 2020    Available
There are additional copies/volumes of this item
97
Book
Book Cover

Corporate computer and network security


Panko, R. R
Boston : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P36 2010    Available
98
Book
Book Cover

The management of network security : technology, design, and management control


Carr, Houston H., 1937-
Upper Saddle River, N.J. : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C3655 2010    Available
 Female Library  TK5105.59 C3655 2010 c.2  Available
99
Book
Book Cover

CCNA Cisco certified network associate security study guide (Exam 640-553)


Deal, Richard A
San Francisco : McGraw-Hill Professional, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 D428 2009    Available
100
Book
Book Cover

Guide to firewalls and network security : intrusion detection and VPNs.



Clifton Park, N.Y. : Course Technology/Cengage Learning, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 G85 2009    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   Prev 1 2 3 4 5 Next