Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 171 - 180 of total 531 results.- 171DATA WAREHOUSE ETL TOOLKIT: PRACTICAL TECHNIQUES FOR EXTRACTING, CLEANING, CONFORMING, AND DELIVERING DATA
Author(s): RALPH KIMBALL
Publisher: JOHN WILEY (Publication Year:2004)
Subject(s): DATA WAREHOUSING, DATABASE DESIGN, DATA CLEANING
Call No: 005.74 KIM
Accession No: 71531 - 172BUILDING THE DATA WAREHOUSE
Author(s): W. H. INMON
Publisher: JOHN WILEY (Publication Year:2005)
Subject(s): DATABASE MANAGEMENT AND DESIGN, DATA WAREHOUSING, DECISION SUPPORT SYSTEMS
Call No: 005.74 INM
Accession No: 84745 - 173CISSP VIDEO COURSE: (DVD-ROM)
Author(s): SHON HARRIS
Publisher: PEARSON (Publication Year:2009)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY, COMPUTER CERTIFICATION
Call No: 005.8 HAR
Accession No: 82922 - 174RED HAT RHCSA/RHCE 7 CERT GUIDE: RED HAT ENTERPRISE LINUX 7 (EX200 AND EX300)
Author(s): SANDER VAN VUGT
Publisher: PEARSON (Publication Year:2016)
Subject(s): OPERATING SYSTEM (COMPUTER), LINUX, EXAMINATIONS
Call No: 005.43 VAN
Accession No: 98075 - 175R FOR MICROSOFT EXCEL USERS: MAKING THE TRANSITION FOR STATISTICAL ANALYSIS
Author(s): CONRAD CARLBERG
Publisher: QUE PUBLISHING (Publication Year:2017)
Subject(s): STATISTICS, MICROSOFT EXCEL, R COMPUTER PROGRAMME LANGUAGE
Call No: 005.55 CAR
Accession No: 94769 - 176COMPUTER AND CYBER SECURITY: PRINCIPLES, ALGORITHM, APPLICATIONS, AND PERSPECTIVES
Author(s): BRIJ B. GUPTA, DHARMA P. AGRAWAL, HAOXIANG WANG
Publisher: CRC PRESS (Publication Year:2019)
Subject(s): COMPUTER SECURITY
Call No: 005.8 GUP
Accession No: 98967 - 177HOW TO ACHIEVE 27001 CERTIFICATION: AN EXAMPLE OF APPLIED COMPLIANCE MANAGEMENT
Author(s): KEITH D. WILLETT, SIGURJON THOR ARNASON
Publisher: SOCIAL INSURANCE ADMINISTRATION (Publication Year:2008)
Subject(s): STUDY AND TEACHING, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 ARN
Accession No: 77920 - 178INFORMATION SECURITY: DESIGN, IMPLEMENTATION, MEASUREMENT AND COMPLIANCE
Author(s): TIMOTHY P. LAYTON
Publisher: TAYLOR AND FRANCIS (Publication Year:2007)
Subject(s): INFORMATION SECURITY, COMPUTER SECURITY, DATA PROTECTION
Call No: 005.8 LAY
Accession No: 80238 - 179DATA MINING METHODS AND APPLICATIONS
Author(s): STEPHAN KUDYBA, KENNETH D. LAWRENCE, RONALD .K KLIMBERG
Publisher: AUERBACH PUBLISHERS (Publication Year:2008)
Subject(s): DATA MINING
Call No: 005.74 LAW
Accession No: 78984 - 180BRIDGING THE COMMUNICATION GAP: SPECIFICATION BY EXAMPLE AND AGILE ACCEPTANCE TESTING
Author(s): GOJKO ADZIC
Publisher: NEURI LIMITED (Publication Year:2009)
Subject(s): COMMUNICATION, COMPUTER SOFTWARE, TECHNICAL INFORMATION, SPECIFICATION WRITING
Call No: 005.14 ADZ
Accession No: 86220