Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 211 - 220 of total 523 results.- 211SPSS STATISTICS FOR DATA ANALYSIS AND VISUALIZATION
Author(s): JOHN PECK, KEITH MCCORMICK, JESUS SALCEDO
Publisher: JOHN WILEY (Publication Year:2016)
Subject(s): SOCIAL SCIENCES--STATISTICAL METHODS--COMPUTER PROGRAMS, SPSS (COMPUTER FILE)
Call No: 005.55 MCC
Accession No: 95518 - 212CISSP (ISC)2: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE
Author(s): JAMES B. STWEART, DARRIL GIBSON, MIKE CHAPPLE
Publisher: SYBEX (Publication Year:2015)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 STE
Accession No: 93079 - 213WINDOWS 10 SIMPLIFIED
Author(s): PAUL MCFEDRIES
Publisher: VISUAL EDITIONS (Publication Year:2015)
Subject(s): MICROSOFT WINDOWS (COMPUTER FILE), OPERATING SYSTEMS (COMPUTER)
Call No: 005.446 MCF
Accession No: 91952 - 214OFFICE 2016 SIMPLIFIED
Author(s): ELAINE MARMEL
Publisher: VISUAL EDITIONS (Publication Year:2016)
Subject(s): MICROSOFT ACCESS, MICROSOFT WORD, MICROSOFT WINDOWS (COMPUTER FILE), MICROSOFT EXCEL, MICROSOFT OFFICE, MICROSOFT OUTLOOK
Call No: 005.5 MAR
Accession No: 97615 - 215INCREMENTAL SOFTWARE ARCHITECTURE: A METHOD FOR SAVING FAILING IT IMPLEMENTATIONS
Author(s): MICHAEL BELL
Publisher: JOHN WILEY (Publication Year:2016)
Subject(s): SOFTWARE ARCHITECTURE, CONTINUOUS IMPROVEMENT PROCESS
Call No: 005 BEL
Accession No: 94818 - 216BIG DATA IN PRACTICE: HOW 45 SUCCESSFUL COMPANIES USED BIG DATA ANALYTICS TO DELIVER EXTRAORDINARY RESULTS
Author(s): BERNARD MARR
Publisher: JOHN WILEY (Publication Year:2016)
Subject(s): CONSUMER BEHAVIOR, STRATEGIC PLANNING, BIG DATA
Call No: 005.74 MAR
Accession No: 92930 - 217CISSP OFFICIAL (ISC)2 PRACTICE TESTS
Author(s): MIKE CHAPPLE, DAVID SEIDL
Publisher: SYBEX (Publication Year:2016)
Subject(s): COMPUTER SECURITY, SECURITY MEASURES
Call No: 005.8 SEI
Accession No: 93517 - 218CYBERSECURITY ESSENTIALS
Author(s): CHARLES J. BROOKS, CHRISTOPHER GROW, PHILIP CRAIG, DONALD SHORT
Publisher: SYBEX (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BRO
Accession No: 98559 - 219HACKING THE HACKER: LEARN FROM THE EXPERTS WHO TAKE DOWN HACKERS
Author(s): ROGER A. GRIMES
Publisher: JOHN WILEY (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING
Call No: 005.8 GRI
Accession No: 96498 - 220THE OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK REFERENCE
Author(s): JOHN WARSINSKE
Publisher: SYBEX (Publication Year:2019)
Subject(s): TELECOMUNICATIONS, COMPUTER NETWORKS SECURITY MEASURES, ENGINEERING
Call No: 005.8 WAR
Accession No: 102939