|
|
Computer science -- Mathematics -- Textbooks : Goodaire, Edgar G
|
|
|
Discrete mathematics with graph theory / Edgar G. Goodaire, Michael M. Parmenter.
QA39.3 G66 2006
;
Female Library:Available
|
|
2006
|
|
Computer science -- Study and teaching
|
|
|
Connecting with computer science / Greg Anderson, David Ferro, Robert Hilton.
QA76.27 A533 2005
;
Female Library:Available
|
|
2005
|
Objects first with java : a practical introduction using blue J / David J. Barnes, Michael Kolling.
QA76.64 B385 2005
;
Female Library:Available, store1:Available
|
|
2005
|
Objects first with java : a practical introduction using blue J / David J. Barnes, Michael Kolling.
QA76.64 B385 2006
;
Female Library:Available
|
|
2006
|
|
Computer securitry -- Computer programs : Dangerfield, Steven
|
|
|
Check point fire wall - 1 administration and CCSA study guide / Steven Dangerfield.
QA76.9A25 D33 2002
;
Female Library:Available
|
|
2002
|
|
Computer securitry -- Study guides : Dangerfield, Steven
|
|
|
Check point fire wall - 1 administration and CCSA study guide / Steven Dangerfield.
QA76.9A25 D33 2002
;
Female Library:Available
|
|
2002
|
|
Computer security
|
|
|
Authentication : from passwords to public keys / Richard E. Smith.
QA76.9.A25 S65 2002
|
|
2002
|
Building secure software : how to avoid security problems the right way / John Viega,McGraw Gary.
QA76.76.D47 V857 2002
;
Female Library:Available
|
|
2002
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
QA76.585 .C5825 2017
;
Male Library:Available, Female Library:Available
|
|
2017
|
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.
QA76.9.A25 V59145 2006
;
Female Library:Available
|
|
2006
|
62 additional entries
|
|
|
|
Computer security -- Case studies
|
|
|
Case studies in secure computing : achievements and trends / edited by Biju Issac and Nauman Israr.
QA76.9.A25 C426 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
|
Computer security -- Examinations -- Study guides
|
|
|
CISSP: Certified Information Systems Security Professional study guide / Ed Tittel, Mike Chapple, James Michael Stewart.
QA76.3 T5735 2003
;
Female Library:Available
|
|
2003
|
CompTIA cybersecurity analyst (CSA+) cert guide / Troy McMillan.
QA76.9.A25 M36 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
Eleventh hour CISSP : study guide / by Eric Conrad, Seth Misenar, Joshua Feldman ; technical editor Bryan Simon.
QA76.3 .C65666 2017
;
Male Library:Available, Female Library:Available
|
|
2014
|
Security+ guide to network security fundamentals / Mark Ciampa.
QA76.9.A25 C35 2009
;
Female Library:Available
|
|
2009
|
Security+ : study guide / Mike Pastore and Emmett Dulaney.
QA76.3 P38 2004
;
Female Library:Available
|
|
2004
|
|
Computer security -- Law and legislation : Tschider, Charlotte A.,
|
|
|
International cybersecurity and privacy law in practice / Charlotte A. Tschider.
K3264.C65 T73 2018
;
Male Library:Available, Female Library:Available
|
|
2018
|
|
Computer security -- Law and legislation -- United States : Elvy, Stacy-Ann,
|
|
|
A commercial law of privacy and security for the internet of things / Stacy-Ann Elvy.
KF390.5.C6 E48 2021
;
Male Library:Available
|
|
2021
|
|
Computer security -- Management
|
|
|
Hands-on information security lab manual / by Michael Whitman, Herbert J. Mattord, Andrew Green.
TK5105.59 .W5354 2014
;
Female Library:Available
|
|
2014
|
Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi.
HF5548.37 .W67 2013
;
Female Library:Available, Male Library:Available
|
|
2013
|
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.
TK5105.59 C3655 2010
;
Female Library:Available
|
|
2010
|
Readings and cases in the management of information security / Michael E. Whitman, Herbert J. Mattord.
TK5105.59 W45 2006
;
Female Library:Available
|
|
2006
|
|
Computer security -- Management -- Handbooks, manuals, etc
|
|
|
Information security management handbook / edited by Harold F. Tipton, Micki Krause.
QA76.9.A25 I541 2004
;
Female Library:Available
|
|
2004
|
|
Computer security -- Study guides : Gregory, Peter H
|
|
|
CISSP guide to security essentials / Peter H. Gregory.
QA76.9.A25 G7497 2015
;
Female Library:Available
|
|
2015
|
|
Computer security -- Textbooks : Shoemaker, Dan
|
|
|
Cybersecurity : the essential body of knowledge / Dan Shoemaker , Wm. Arthur Conklin.
QA76.9.A25 S56 2012
;
Male Library:Available, Female Library:Available
|
|
2012
|
|
Computer security -- United States : Shoemaker, Dan
|
|
|
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0) / Dan Shoemaker, Anne Kohnke, Ken Sigler.
QA76.9.A25 S493 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer security -- United States -- Management : Brotherston, Lee
|
|
|
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin.
QA76.9.A25 B7747 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
|
Computer security -- United States -- Planning : Brotherston, Lee
|
|
|
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin.
QA76.9.A25 B7747 2017
;
Female Library:Available, Male Library:Available
|
|
2017
|
|
Computer service industry -- Management : Taylor, Sharon,
|
|
|
Service intelligence : improving your bottom line with the power of IT service management / Sharon Taylor.
HD9696.67.A2 T39 2012
;
Female Library:Available, Male Library:Available
|
|
2012
|
|
Computer simulation
|
|
|
Computational and numerical simulations/ edited by Jan Awrejcewicz.
QA76.9 C66 2014
;
Female Library:Available
|
|
2014
|
Modeling and simulation of systems using MATLAB and Simulink / Devendra K. Chaturvedi .
TA168 C474 2010
;
Female Library:Available
|
|
2010
|
|
Computer simulation -- Textbooks : Leemis, Lawrence M
|
|
|
Discrete-event simulation : a first course / Lawrence M.Leemis, Steve K. Park.
QA402 L44 2006
;
Female Library:Available
|
|
2006
|
|
Computer software
|
|
|
Introduction to computer graphics : design professional / by Daniel Bouweraerts.
T385 B68 2005
;
Female Library:Available
|
|
2005
|
Peter Norton's computing fundamentals / Peter Norton.
QA76.5 N675 2003
;
Male Library:Available
|
|
2003
|
Peter Norton's computing fundamentals.
QA76.5 N675 2006
;
Female Library:Available, Male Library:Available
|
|
2006
|
Peter Norton's introduction to computers / Peter Norton.
QA76.5 N6818 2001
;
Female Library:Available, Male Library:Available
|
|
2001
|
3 additional entries
|
|
|
|
Computer software -- Developmen : Burd, Barry
|
|
|
Android application development all-in-one for dummies / by Barry Burd.
QA76.76.A65 B863 2015
;
Female Library:Available, Male Library:Available
|
|
2015
|
|
Computer software -- Development
|
|
|
ARM system developer's guide : designing and optimizing system software / Andrew N. Sloss, Dominic Symes, Chris Wright, with a contribution by John Rayfield.
QA76.76.D47 S565 2004
;
Female Library:Available
|
|
2004
|
Building Delphi 6 applications / Paul Kimmel.
QA76.76.D47 K55 2001
;
Female Library:Available
|
|
2001
|
Building secure software : how to avoid security problems the right way / John Viega,McGraw Gary.
QA76.76.D47 V857 2002
;
Female Library:Available
|
|
2002
|
Developer testing : building quality into software / Alexander Tarlinder.
QA76.76.D47 T37 2016
;
Female Library:Available, Male Library:Available
|
|
2016
|
18 additional entries
|
|
|
|
Computer software -- Development -- Examinations -- Study guides
|
|
|
Software development fundamentals : exam 98-361.
QA76.76.D47 S6374 2012
;
Female Library:Available
|
|
|
|
Computer software -- Development -- Management
|
|
|
Architecture-centric software project management : a practical guide / Daniel J. Paulish.
QA76.76.D47 P378 2002
;
Female Library:Available
|
|
2002
|
Managing software projects / Frank Tsui.
QA76.76.D47 T78 2004
;
Male Library:DUE 10-01-05 11:59PM Billed
|
|
2004
|
Managing software requirements : a use case approach / Dean Leffingwell, Don Widrig.
QA76.76.D47 L45 2003
|
|
2003
|
Quality software project management / Robert T. Futrell, Donald F. Shafer, Linda I. Shafer.
QA76.76.D47 F88 2002
|
|
2002
|
|
Computer software -- Evaluation
|
|
|
Evaluating software architectures : methods and case studies / Paul Clements, Rick Kazman, Mark Klein.
QA76.754 .C47 2002
;
Female Library:Available
|
|
2002
|
Software metrics : a rigorous and practical approach / Norman Fenton, James Bieman.
QA76.758 .F46 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
|
Computer software -- Quality control
|
|
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
Metrics and models in software quality engineering / Stephen H. Kan.
QA76.76.Q35 K35 2003
;
Female Library:Available
|
|
2003
|
Software quality assurance : integrating testing, security, and audit / Abu Sayed Mahfuz.
QA76.76.Q35 M34 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer software -- Reliability : Duvall, Paul M
|
|
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
|
Computer software -- Reusability
|
|
|
An introduction to design patterns in C++ with Qt 4 / Alan Ezust, Paul Ezust.
QA76.73.C153 E94 2007
;
Female Library:Available
|
|
2007
|
Stable analysis patterns for systems / Mohamed Fayad.
QA76.76.R47 F39 2017
;
Male Library:Available, Female Library:Available
|
|
2017
|
|
Computer software -- Testing
|
|
|
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson, David Kennedy, Technical Editor.
QA76.9.A25 E5443 2013
;
Female Library:Available
|
|
2013
|
Continuous integration : improving software quality and reducing risk / Paul M. Duvall, Steve Matyas, Andrew Glover.
QA76.76.Q35 D89 2007
;
Female Library:Available
|
|
2007
|
The hacker playbook 2 : practical guide to penetration testing / Peter Kim.
QA76.9.A25 K56 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
Lessons learned in software testing : a context-driven approach / Cem Kaner, James Bach, Bret Pettichord.
QA76.76.T48 K34 2002
;
Female Library:Available
|
|
2002
|
Software quality assurance : integrating testing, security, and audit / Abu Sayed Mahfuz.
QA76.76.Q35 M34 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
|
Computer software -- Verification
|
|
|
Systems and software verification : model-checking techniques and tools / B. Berard,...{et al.}.
QA76.76.V47 S97 2001
;
Female Library:Available
|
|
2001
|
|
Computer sound processing
|
|
|
A DSP primer : with applications to digital audio and computer music / Ken Steiglitz.
TK5102.9 .S74 1995
;
Male Library:Available
|
|
1995
|
Introduction to digital signal processing : computer musically speaking / Tae Hong Park.
TK5102.9 P37 2010
;
Female Library:Available
|
|
2010
|
Sound blaster : the official book / Peter M. Ridge ... [et al.].
MT723 .S55 1994
;
Male Library:Available
|
|
1994
|
|
Computer storage devices : Clark, Tom.,
|
|
|
Designing storage area networks : a practical reference for implementing fibre channel and IP SANs / Tom Clark.
TK5105.5 C547 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems
|
|
|
Computer systems / J. Stanley Warford
QA76 .W2372 2017
;
Male Library:Available
|
|
2017
|
Computer systems : a programmer's perspective / Randal E. Bryant, David R. O'Hallaron.
QA76.5 .B795 2016
;
Female Library:DUE 04-02-20 Billed, Female Library:Available
|
|
2016
|
The practice of system and network administration / Thomas A. Limoncelli and Christine Hogan.
TK5105.5 L53 2002
;
Female Library:Available
|
|
2002
|
The practice of system and network administration / Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup.
TK5105.5 L53 2007
;
Female Library:Available
|
|
2007
|
Principles of network and system administration / Mark Burgess.
TK5105.5 B874 2004
;
Female Library:Available, Male Library:Available
|
|
2004
|
|
Computer systems -- Evaluation : Fortier, Paul J
|
|
|
Computer systems performance evaluation and prediction / Paul J. Fortier, Howard E. Michel.
QA76.9.E94 F67 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems -- Reliability : Fortier, Paul J
|
|
|
Computer systems performance evaluation and prediction / Paul J. Fortier, Howard E. Michel.
QA76.9.E94 F67 2003
;
Female Library:Available
|
|
2003
|
|
Computer systems -- Verification
|
|
|
Systems and software verification : model-checking techniques and tools / B. Berard,...{et al.}.
QA76.76.V47 S97 2001
;
Female Library:Available
|
|
2001
|
|
Computer technicians -- Certification : Brooks, Charles J
|
|
|
A+ certification : concepts & practice / Charles Brooks.
QA76.3 B76 2002
|
|
2002
|
|
Computer technicians -- Certification -- Study guides
|
|
|
A+ certification study guide / Syngress Media, Inc.
QA76.3 .A174 2001
|
|
2001
|
CompTIA A+ complete study guide / Quentin Docter, Emmett Dulaney, Toby Skandier.
TK7885.54 .D63 2012
;
Male Library:Available
|
|
2012
|
Security+ guide to network security fundamentals / Mark Ciampa.
QA76.9.A25 C35 2009
;
Female Library:Available
|
|
2009
|
|
Computer terminals -- remote terminals : Fritz, Jeffrey N. ,
|
|
|
Remote LAN access : a guide for networkers and the rest of us / Jeffrey Neil Fritz.
TK5105.7 F76 1996
|
|
1996
|
|
Computer vision
|
|
|
Algorithms for image processing and computer vision / J.R. Parker.
TA1637 P37 1996
;
Female Library:Available
|
|
1996
|
Computer and machine vision : theory, algorithms, practicalities / E.R. Davies.
TA1634 .D386 2012
;
Male Library:Available, Female Library:Available
|
|
2012
|
Computer vision / Linda G. Shapiro, George C. Stockman.
TA1634 S48 2001
;
Female Library:Available, Male Library:Available
|
|
2001
|
Computer vision : a first course / R.D. Boyle, R.C. Thomas.
TA1632 .B69 1988
|
|
1988
|
12 additional entries
|
|
|
|
Computer vision -- Problems, exercises, etc : Forsyth, David
|
|
|
Computer vision : a modern approach / David A. Forsyth, Jean Ponce.
TA1634 .F65 2012
;
Male Library:Available, Female Library:Available
|
|
2012
|
|
Computers
|
|
|
African Data Privacy Laws / edited by Alex B. Makulilo.
KQC646 .A37 2016
;
Male Library:Available, Female Library:Available
|
|
2016
|
Computer fundamentals and programming in C / Pradip Dey, Manas Ghosh.
QA76 .D49 2013
;
Female Library:Available, Male Library:Available
|
|
|
Computer systems : a programmer's perspective / Randal E. Bryant, David R. O'Hallaron.
QA76.5 .B795 2016
;
Female Library:DUE 04-02-20 Billed, Female Library:Available
|
|
2016
|
Computers in guidance, counseling, and psychotherapy / by Harry P. Bluhm.
BF637.C6 B49 1988
;
Male Library:Available
|
|
1988
|
14 additional entries
|
|
|
|
Computers -- Access control
|
|
|
Identity management for internet of things / Parikshit N. Mahalle, Poonam N. Railkar.
QA76.5915 .M34 2015
;
Male Library:Available, Female Library:Available
|
|
2015
|
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
QA76.9.A25 K345 2002
;
Male Library:Available
|
|
|
|
Computers -- Acronyms : Brown, Phil
|
|
|
Dictionary of electrical, electronics, and computer abbreviations / Phil Brown.
TK9 .B76 1985
;
Female Library:Available
|
|
1985
|
|
Computers and children : Druin, Allison,
|
|
|
Designing multimedia environments for children / Allison Druin and Cynthia Solomon.
LB1028.5 D78 1996
;
Male Library:Available
|
|
1996
|
|
Computers and civilization
|
|
|
Computers, ethics, and society / edited by M. David Ermann, Michele S. Shauf.
QA76.9.C66 C572 2003
;
Female Library:Available
|
|
2003
|
Computers in society : privacy, ethics, and the Internet / edited by Joey F. George.
QA76.9.C66 C585 2004
;
Female Library:Available
|
|
2004
|
CyberCyberethics : morality and law in cyberspace / Richard A. Spinello.
TK5105.875.I57 S68 2014
;
Female Library:Available, Male Library:Available
|
|
|
CyberEthics : morality and law in cyberspace / Richard A. Spinello.
TK5105.875.I57 S68 2003
;
Female Library:Available
|
|
2003
|
2 additional entries
|
|
|
|
Computers and civilization -- Case studies
|
|
|
Global networks, linked cities / edited by Saskia Sassen.
HT321 G55 2002
;
Female Library:Available
|
|
2002
|
|
Computers and civilization -- Forecasting : Schmidt, Eric
|
|
|
The new digital age : reshaping the future of people, nations and business / Eric Schmidt and Jared Cohen.
HM851 .S263 2013
;
Female Library:Available
|
|
2013
|
|
Computers and IT.--ukslc : Conrad, Eric,
|
|
|
Eleventh hour CISSP : study guide / by Eric Conrad, Seth Misenar, Joshua Feldman ; technical editor Bryan Simon.
QA76.3 .C65666 2017
;
Male Library:Available, Female Library:Available
|
|
2014
|
|
Computers and literacy
|
|
|
Literacy and language teaching / Richard Kern.
P53 K42 2000
;
Male Library:Available
|
|
2000
|
Page to screen : taking literacy into the electronic era / edited by Ilana Snyder.
LC149.5 P35 1998
;
Male Library:Available
|
|
1998
|
Add Marked to Bag
Add All On Page
Add Marked to My Lists
|