Library - State Bank of Pakistan

Computer Software

⇐ Back to Main Subjects

Sort results by:

Showing 221 - 230 of total 536 results.
  • 221
    WINDOWS 10 SIMPLIFIED
    Author(s): PAUL MCFEDRIES
    Publisher: VISUAL EDITIONS (Publication Year:2015)
    Subject(s): MICROSOFT WINDOWS (COMPUTER FILE), OPERATING SYSTEMS (COMPUTER)
    Call No: 005.446 MCF
    Accession No: 91952
  • 222
    OFFICE 2016 SIMPLIFIED
    Author(s): ELAINE MARMEL
    Publisher: VISUAL EDITIONS (Publication Year:2016)
    Subject(s): MICROSOFT ACCESS, MICROSOFT WORD, MICROSOFT WINDOWS (COMPUTER FILE), MICROSOFT EXCEL, MICROSOFT OFFICE, MICROSOFT OUTLOOK
    Call No: 005.5 MAR
    Accession No: 97615
  • 223
    INCREMENTAL SOFTWARE ARCHITECTURE: A METHOD FOR SAVING FAILING IT IMPLEMENTATIONS
    Author(s): MICHAEL BELL
    Publisher: JOHN WILEY (Publication Year:2016)
    Subject(s): SOFTWARE ARCHITECTURE, CONTINUOUS IMPROVEMENT PROCESS
    Call No: 005 BEL
    Accession No: 94818
  • 224
    BIG DATA IN PRACTICE: HOW 45 SUCCESSFUL COMPANIES USED BIG DATA ANALYTICS TO DELIVER EXTRAORDINARY RESULTS
    Author(s): BERNARD MARR
    Publisher: JOHN WILEY (Publication Year:2016)
    Subject(s): CONSUMER BEHAVIOR, STRATEGIC PLANNING, BIG DATA
    Call No: 005.74 MAR
    Accession No: 92930
  • 225
    CISSP OFFICIAL (ISC)2 PRACTICE TESTS
    Author(s): MIKE CHAPPLE, DAVID SEIDL
    Publisher: SYBEX (Publication Year:2016)
    Subject(s): COMPUTER SECURITY, SECURITY MEASURES
    Call No: 005.8 SEI
    Accession No: 93517
  • 226
    CYBERSECURITY ESSENTIALS
    Author(s): CHARLES J. BROOKS, CHRISTOPHER GROW, PHILIP CRAIG, DONALD SHORT
    Publisher: SYBEX (Publication Year:2018)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 BRO
    Accession No: 98559
  • 227
    HACKING THE HACKER: LEARN FROM THE EXPERTS WHO TAKE DOWN HACKERS
    Author(s): ROGER A. GRIMES
    Publisher: JOHN WILEY (Publication Year:2017)
    Subject(s): COMPUTER PROGRAMMING
    Call No: 005.8 GRI
    Accession No: 96498
  • 228
    THE OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK REFERENCE
    Author(s): JOHN WARSINSKE
    Publisher: SYBEX (Publication Year:2019)
    Subject(s): TELECOMUNICATIONS, COMPUTER NETWORKS SECURITY MEASURES, ENGINEERING
    Call No: 005.8 WAR
    Accession No: 102939
  • 229
    SOCIAL ENGINEERING: THE SCIENCE OF HUMAN HACKING
    Author(s): CHRISTOPHER HADNAGY
    Publisher: JOHN WILEY (Publication Year:2018)
    Subject(s): COMPUTER SECURITY, SOCIAL ENGINEERING
    Call No: 005.8 HAD
    Accession No: 99587
  • 230
    SCRUM FOR DUMMIES
    Author(s): MARK C. LAYTON, DAVID MORROW
    Publisher: FOR DUMMIES (Publication Year:2018)
    Subject(s): PROJECT MANAGEMENT, AGILE SOFTWARE DEVELOPMENT, SCRUM (COMPUTER SOFTWARE DEVELOPMENT)
    Call No: 005.1 LAY
    Accession No: 100771
Showing 221 - 230 of total 536 results.