|
|
Computer networks -- Security measures -- Textbooks
|
|
|
Cisco Networking Academy Program : fundamentals of network security companion guide / Cisco Systems, Inc., Cisco Networking Academy Program.
TK5105.59 .C5737 2004
;
Female Library:Available
|
|
2004
|
|
Computer networks -- Security measures -- United States : Brotherston, Lee
|
|
|
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin.
QA76.9.A25 B7747 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
|
Computer networks -- Study guides : Gregory, Peter H
|
|
|
CISSP guide to security essentials / Peter H. Gregory.
QA76.9.A25 G7497 2015
;
Female Library:Available
|
|
2015
|
|
Computer networks -- Textbooks : Elahi, Ata
|
|
|
Data, network, and Internet communications technology / Ata Elahi, Mehran Elahi.
TK5105.5 E388 2006
;
Female Library:Available
|
|
2006
|
|
Computer organization
|
|
|
Computer organization / V.Carl Hamacher, Zvonko G. Vranesic, Safwat G. Zaky.
QA76.9C643 H36 1996
|
|
1996
|
Computer organization and architecture : designing for performance / William Stallings.
QA76.9.C643 S73 2003
;
Male Library:Available
|
|
2003
|
Computer organization and architecture : designing for performance / William Stallings.
QA76.9.C643 S73 1996
|
|
1996
|
Computer organization and architecture : designing for performance / William Stallings.
QA76.9.C643 S73 2016
;
Female Library:Available, Male Library:Available
|
|
2016
|
9 additional entries
|
|
|
|
Computer programmers -- Fiction : Updike, John
|
|
|
Villages / John Updike.
PS3571.P4 V55 2006
;
Male Library:Available
|
|
2006
|
|
Computer programming
|
|
|
Advanced Java programming / Uttam K. Roy (Assistent Professor, Department of Information Technology, Jadavpur University, Kolkata).
QA76.73J38 R69 2015
;
Female Library:Available, Male Library:Available
|
|
2015
|
Algorithms sequential and parallel : a unified approach / Russ Miller and Laurence Boxer.
QA76.9.A43 M55 2005
;
Female Library:Available
|
|
2005
|
Algorithms, sequential & parallel : a unified approach / Russ Miller, Laurence Boxer.
QA76.9.A43 M55 2013
;
Female Library:Available
|
|
2013
|
C# programming : from problem analysis to program design / Barbara Doyle.
QA76.73.C154 D58 2016
;
Female Library:Available
|
|
2016
|
20 additional entries
|
|
|
|
Computer programs -- Great Britain -- Patents : Bainbridge, David I
|
|
|
Information technology and intellectual property law / David I. Bainbridge, BSc, LLB, PhD, MBCS, Chartered IT Professional, Barrister Emeritus Professor of Intellectual Property Law, Aston University, Honorary Member, Hardwicke Chambers, Lincoln's Inn.
KD1303.C65 B35 20142014
;
Female Library:Available, Male Library:Available
|
|
|
|
Computer science
|
|
|
3ds Max projects : a detailed guide to modeling, texturing, rigging, animation and lighting.
TR897.7 .A14 2014
;
Male Library:Available
|
|
2014
|
Autodesk 3DS MAX 2016 : essentials / Randi L. Derakhshani, Dariush Derakhshani.
TR897.7 .D4862 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
The computer continuum / Kurt F. Lauckner, Mildred D. Lintner.
QA76 L2963 2001
;
Male Library:Available
|
|
2001
|
Digital planet : tomorrow's technology and you, introductory. / George Beekman, Ben Beekman.
QA76 B3357 2012
;
Female Library:Available, Male Library:Available
|
|
2012
|
7 additional entries
|
|
|
|
Computer science -- Dictionaries : الشامي ، أحمد محمد
|
|
|
الموسوعة العربية لمصطلحات علوم المكتبات و المعلومات و الحاسبات = Arabic encyclopedia of library, information, and computer terms, English-Arabic : إنجليزي-عربي / أحمد محمد الشامي ، سيد حسب الله.
Z1006 S34 2001
;
Male Library:Available
|
|
2001
|
|
Computer science -- Mathematics
|
|
|
Discrete mathematics / Richard Johnsonbaugh.
QA39.2 J65 2001
;
Male Library:Available
|
|
2001
|
Discrete mathematics / Richard Johnsonbaugh.
QA39.2 J65 2005
;
Male Library:Available
|
|
2005
|
Discrete mathematics / S.K. Chakraborty, B.K. Sarkar.
QA76.9.M35 C483 2011
;
Female Library:Available
|
|
2011
|
Discrete mathematics and its applications / Kennth H. Rosen.
QA39.3 R67 2003
;
Male Library:Available
|
|
2003
|
16 additional entries
|
|
|
|
Computer science -- Mathematics -- Textbooks : Goodaire, Edgar G
|
|
|
Discrete mathematics with graph theory / Edgar G. Goodaire, Michael M. Parmenter.
QA39.3 G66 2006
;
Female Library:Available
|
|
2006
|
|
Computer science -- Study and teaching
|
|
|
Connecting with computer science / Greg Anderson, David Ferro, Robert Hilton.
QA76.27 A533 2005
;
Female Library:Available
|
|
2005
|
Objects first with java : a practical introduction using blue J / David J. Barnes, Michael Kolling.
QA76.64 B385 2005
;
Female Library:Available, store1:Available
|
|
2005
|
Objects first with java : a practical introduction using blue J / David J. Barnes, Michael Kolling.
QA76.64 B385 2006
;
Female Library:Available
|
|
2006
|
|
Computer securitry -- Computer programs : Dangerfield, Steven
|
|
|
Check point fire wall - 1 administration and CCSA study guide / Steven Dangerfield.
QA76.9A25 D33 2002
;
Female Library:Available
|
|
2002
|
|
Computer securitry -- Study guides : Dangerfield, Steven
|
|
|
Check point fire wall - 1 administration and CCSA study guide / Steven Dangerfield.
QA76.9A25 D33 2002
;
Female Library:Available
|
|
2002
|
|
Computer security
|
|
|
Authentication : from passwords to public keys / Richard E. Smith.
QA76.9.A25 S65 2002
|
|
2002
|
Building secure software : how to avoid security problems the right way / John Viega,McGraw Gary.
QA76.76.D47 V857 2002
;
Female Library:Available
|
|
2002
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
QA76.585 .C5825 2017
;
Male Library:Available, Female Library:Available
|
|
2017
|
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.
QA76.9.A25 V59145 2006
;
Female Library:Available
|
|
2006
|
62 additional entries
|
|
|
|
Computer security -- Case studies
|
|
|
Case studies in secure computing : achievements and trends / edited by Biju Issac and Nauman Israr.
QA76.9.A25 C426 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
|
Computer security -- Examinations -- Study guides
|
|
|
CISSP: Certified Information Systems Security Professional study guide / Ed Tittel, Mike Chapple, James Michael Stewart.
QA76.3 T5735 2003
;
Female Library:Available
|
|
2003
|
CompTIA cybersecurity analyst (CSA+) cert guide / Troy McMillan.
QA76.9.A25 M36 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
Eleventh hour CISSP : study guide / by Eric Conrad, Seth Misenar, Joshua Feldman ; technical editor Bryan Simon.
QA76.3 .C65666 2017
;
Male Library:Available, Female Library:Available
|
|
2014
|
Security+ guide to network security fundamentals / Mark Ciampa.
QA76.9.A25 C35 2009
;
Female Library:Available
|
|
2009
|
Security+ : study guide / Mike Pastore and Emmett Dulaney.
QA76.3 P38 2004
;
Female Library:Available
|
|
2004
|
|
Computer security -- Law and legislation : Tschider, Charlotte A.,
|
|
|
International cybersecurity and privacy law in practice / Charlotte A. Tschider.
K3264.C65 T73 2018
;
Male Library:Available, Female Library:Available
|
|
2018
|
|
Computer security -- Law and legislation -- United States : Elvy, Stacy-Ann,
|
|
|
A commercial law of privacy and security for the internet of things / Stacy-Ann Elvy.
KF390.5.C6 E48 2021
;
Male Library:Available
|
|
2021
|
|
Computer security -- Management
|
|
|
Hands-on information security lab manual / by Michael Whitman, Herbert J. Mattord, Andrew Green.
TK5105.59 .W5354 2014
;
Female Library:Available
|
|
2014
|
Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi.
HF5548.37 .W67 2013
;
Female Library:Available, Male Library:Available
|
|
2013
|
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.
TK5105.59 C3655 2010
;
Female Library:Available
|
|
2010
|
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord.
TK5105.59 W45 2006
;
Female Library:Available
|
|
2006
|
|
Computer security -- Management -- Handbooks, manuals, etc
|
|
|
Information security management handbook / edited by Harold F. Tipton, Micki Krause.
QA76.9.A25 I541 2004
;
Female Library:Available
|
|
2004
|
|
Computer security -- Study guides : Gregory, Peter H
|
|
|
CISSP guide to security essentials / Peter H. Gregory.
QA76.9.A25 G7497 2015
;
Female Library:Available
|
|
2015
|
|
Computer security -- Textbooks : Shoemaker, Dan
|
|
|
Cybersecurity : the essential body of knowledge / Dan Shoemaker , Wm. Arthur Conklin.
QA76.9.A25 S56 2012
;
Male Library:Available, Female Library:Available
|
|
2012
|
|
Computer security -- United States : Shoemaker, Dan
|
|
|
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0) / Dan Shoemaker, Anne Kohnke, Ken Sigler.
QA76.9.A25 S493 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer security -- United States -- Management : Brotherston, Lee
|
|
|
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin.
QA76.9.A25 B7747 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
|
Computer security -- United States -- Planning : Brotherston, Lee
|
|
|
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin.
QA76.9.A25 B7747 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
|
Computer service industry -- Management : Taylor, Sharon,
|
|
|
Service intelligence : improving your bottom line with the power of IT service management / Sharon Taylor.
HD9696.67.A2 T39 2012
;
Female Library:Available, Male Library:Available
|
|
2012
|
|
Computer simulation
|
|
|
Computational and numerical simulations/ edited by Jan Awrejcewicz.
QA76.9 C66 2014
;
Female Library:Available
|
|
2014
|
Modeling and simulation of systems using MATLAB and Simulink / Devendra K. Chaturvedi .
TA168 C474 2010
;
Female Library:Available
|
|
2010
|
|
Computer simulation -- Textbooks : Leemis, Lawrence M
|
|
|
Discrete-event simulation : a first course / Lawrence M.Leemis, Steve K. Park.
QA402 L44 2006
;
Female Library:Available
|
|
2006
|
|
Computer software
|
|
|
Introduction to computer graphics : design professional / by Daniel Bouweraerts.
T385 B68 2005
;
Female Library:Available
|
|
2005
|
Peter Norton's computing fundamentals / Peter Norton.
QA76.5 N675 2003
;
Male Library:Available
|
|
2003
|
Peter Norton's computing fundamentals.
QA76.5 N675 2006
;
Female Library:Available, Male Library:Available
|
|
2006
|
Peter Norton's introduction to computers / Peter Norton.
QA76.5 N6818 2001
;
Female Library:Available, Male Library:Available
|
|
2001
|
3 additional entries
|
|
|
|
Computer software -- Developmen : Burd, Barry
|
|
|
Android application development all-in-one for dummies / by Barry Burd.
QA76.76.A65 B863 2015
;
Female Library:Available, Male Library:Available
|
|
2015
|
|
Computer software -- Development
|
|
|
ARM system developer's guide : designing and optimizing system software / Andrew N. Sloss, Dominic Symes, Chris Wright, with a contribution by John Rayfield.
QA76.76.D47 S565 2004
;
Female Library:Available
|
|
2004
|
Building Delphi 6 applications / Paul Kimmel.
QA76.76.D47 K55 2001
;
Female Library:Available
|
|
2001
|
Building secure software : how to avoid security problems the right way / John Viega,McGraw Gary.
QA76.76.D47 V857 2002
;
Female Library:Available
|
|
2002
|
Developer testing : building quality into software / Alexander Tarlinder.
QA76.76.D47 T37 2016
;
Female Library:Available, Male Library:Available
|
|
2016
|
18 additional entries
|
|
|
|
Computer software -- Development -- Examinations -- Study guides
|
|
|
Software development fundamentals : exam 98-361.
QA76.76.D47 S6374 2012
;
Female Library:Available
|
|
|
|
Computer software -- Development -- Management
|
|
|
Architecture-centric software project management : a practical guide / Daniel J. Paulish.
QA76.76.D47 P378 2002
;
Female Library:Available
|
|
2002
|
Managing software projects / Frank Tsui.
QA76.76.D47 T78 2004
;
Male Library:DUE 10-01-05 11:59PM Billed
|
|
2004
|
Managing software requirements : a use case approach / Dean Leffingwell, Don Widrig.
QA76.76.D47 L45 2003
|
|
2003
|
Quality software project management / Robert T. Futrell, Donald F. Shafer, Linda I. Shafer.
QA76.76.D47 F88 2002
|
|
2002
|
|
Computer software -- Evaluation
|
|
|
Evaluating software architectures : methods and case studies / Paul Clements, Rick Kazman, Mark Klein.
QA76.754 .C47 2002
;
Female Library:Available
|
|
2002
|
Software metrics : a rigorous and practical approach / Norman Fenton, James Bieman.
QA76.758 .F46 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
|
Computer software -- Quality control
|
|
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
Metrics and models in software quality engineering / Stephen H. Kan.
QA76.76.Q35 K35 2003
;
Female Library:Available
|
|
2003
|
Software quality assurance : integrating testing, security, and audit / Abu Sayed Mahfuz.
QA76.76.Q35 M34 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer software -- Reliability : Duvall, Paul M
|
|
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
|
Computer software -- Reusability
|
|
|
An introduction to design patterns in C++ with Qt 4 / Alan Ezust, Paul Ezust.
QA76.73.C153 E94 2007
;
Female Library:Available
|
|
2007
|
Stable analysis patterns for systems / Mohamed Fayad.
QA76.76.R47 F39 2017
;
Male Library:Available, Female Library:Available
|
|
2017
|
|
Computer software -- Testing
|
|
|
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson, David Kennedy, Technical Editor.
QA76.9.A25 E5443 2013
;
Female Library:Available
|
|
2013
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
The hacker playbook 2 : practical guide to penetration testing / Peter Kim.
QA76.9.A25 K56 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
Lessons learned in software testing : a context-driven approach / Cem Kaner, James Bach, Bret Pettichord.
QA76.76.T48 K34 2002
;
Female Library:Available
|
|
2002
|
Software quality assurance : integrating testing, security, and audit / Abu Sayed Mahfuz.
QA76.76.Q35 M34 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer software -- Verification
|
|
|
Systems and software verification : model-checking techniques and tools / B. Berard,...{et al.}.
QA76.76.V47 S97 2001
;
Female Library:Available
|
|
2001
|
|
Computer sound processing
|
|
|
A DSP primer : with applications to digital audio and computer music / Ken Steiglitz.
TK5102.9 .S74 1995
;
Male Library:Available
|
|
1995
|
Introduction to digital signal processing : computer musically speaking / Tae Hong Park.
TK5102.9 P37 2010
;
Female Library:Available
|
|
2010
|
Sound blaster : the official book / Peter M. Ridge ... [et al.].
MT723 .S55 1994
;
Male Library:Available
|
|
1994
|
|
Computer storage devices : Clark, Tom.,
|
|
|
Designing storage area networks : a practical reference for implementing fibre channel and IP SANs / Tom Clark.
TK5105.5 C547 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems
|
|
|
Computer systems / J. Stanley Warford
QA76 .W2372 2017
;
Male Library:Available
|
|
2017
|
Computer systems : a programmer's perspective / Randal E. Bryant, David R. O'Hallaron.
QA76.5 .B795 2016
;
Female Library:DUE 04-02-20 Billed, Female Library:Available
|
|
2016
|
The practice of system and network administration / Thomas A. Limoncelli and Christine Hogan.
TK5105.5 L53 2002
;
Female Library:Available
|
|
2002
|
The practice of system and network administration / Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup.
TK5105.5 L53 2007
;
Female Library:Available
|
|
2007
|
Principles of network and system administration / Mark Burgess.
TK5105.5 B874 2004
;
Female Library:Available, Male Library:Available
|
|
2004
|
|
Computer systems -- Evaluation : Fortier, Paul J
|
|
|
Computer systems performance evaluation and prediction / Paul J. Fortier, Howard E. Michel.
QA76.9.E94 F67 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems -- Reliability : Fortier, Paul J
|
|
|
Computer systems performance evaluation and prediction / Paul J. Fortier, Howard E. Michel.
QA76.9.E94 F67 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems -- Verification
|
|
|
Systems and software verification : model-checking techniques and tools / B. Berard,...{et al.}.
QA76.76.V47 S97 2001
;
Female Library:Available
|
|
2001
|
|
Computer technicians -- Certification : Brooks, Charles J
|
|
|
A+ certification : concepts & practice / Charles Brooks.
QA76.3 B76 2002
|
|
2002
|
|
Computer technicians -- Certification -- Study guides
|
|
|
A+ certification study guide / Syngress Media, Inc.
QA76.3 .A174 2001
|
|
2001
|
CompTIA A+ complete study guide / Quentin Docter, Emmett Dulaney, Toby Skandier.
TK7885.54 .D63 2012
;
Male Library:Available
|
|
2012
|
Security+ guide to network security fundamentals / Mark Ciampa.
QA76.9.A25 C35 2009
;
Female Library:Available
|
|
2009
|
|
Computer terminals -- remote terminals : Fritz, Jeffrey N. ,
|
|
|
Remote LAN access : a guide for networkers and the rest of us / Jeffrey Neil Fritz.
TK5105.7 F76 1996
|
|
1996
|
Add Marked to Bag
Add All On Page
Add Marked to My Lists
|