Library - State Bank of Pakistan

Computer Software

⇐ Back to Main Subjects

Sort results by:

Showing 231 - 240 of total 537 results.
  • 231
    SCRUM FOR DUMMIES
    Author(s): MARK C. LAYTON, DAVID MORROW
    Publisher: FOR DUMMIES (Publication Year:2018)
    Subject(s): PROJECT MANAGEMENT, AGILE SOFTWARE DEVELOPMENT, SCRUM (COMPUTER SOFTWARE DEVELOPMENT)
    Call No: 005.1 LAY
    Accession No: 100771
  • 232
    CISSP CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL OFFICIAL (ISC)2 PRACTICE TESTES
    Author(s): MIKE CHAPPLE, DAVID SEIDL
    Publisher: SYBEX (Publication Year:2018)
    Subject(s): COMPUTERS, COMPUTER NETWORKS, COMPUTER SECURITY, SECURITY MEASURES
    Call No: 005.8 CHA
    Accession No: 97997
  • 233
    (ISC)2 CISSP CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE
    Author(s): DARRIL GIBSON, MIKE CHAPPLE, JAMES MICHAEL STEWART
    Publisher: SYBEX (Publication Year:2018)
    Subject(s): ELECTRONIC DATA PROCESSING-SECURITY MEASURES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, EXAMINATIONS
    Call No: 005.8 CHA
    Accession No: 97878
  • 234
    HACKING FOR DUMMIES
    Author(s): KEVIN BEAVER
    Publisher: JOHN WILEY (Publication Year:2018)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 BEA
    Accession No: 99844
  • 235
    LINUX ALL-IN-ONE FOR DUMMIES
    Author(s): EMMETT A DULANEY
    Publisher: FOR DUMMIES (Publication Year:2018)
    Subject(s): COMPUTER SCIENCE, OPERATING SYSTEM (COMPUTER), LINUX
    Call No: 005.446 DUL
    Accession No: 102291
  • 236
    CYBER SMART: FIVE HABITS TO PROTECT YOUR FAMILY, MONEY, AND IDENTITY FROM CYBER CRIMINALS
    Author(s): BART R. MCDONOUGH
    Publisher: JOHN WILEY (Publication Year:2019)
    Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 MCD
    Accession No: 101869
  • 237
    CYBERSECURITY FOR DUMMIES
    Author(s): JOSEPH B STEINBERG
    Publisher: FOR DUMMIES (Publication Year:2020)
    Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
    Call No: 005.8 STE
    Accession No: 102628
  • 238
    COMMERCIALIZING BLOCKCHAIN: STRATEGIC APPLICATIONS IN THE REAL WORLD
    Author(s): ANTONY WELFARE
    Publisher: WILEY BLACKWELL (Publication Year:2019)
    Subject(s): FINANCIAL SERVICES, BLOCKCHAIN
    Call No: 005.74 WEL
    Accession No: 101567
  • 239
    AGILE PROJECT MANAGEMENT FOR DUMMIES
    Author(s): MARK C. LAYTON, STEVEN J. OSTERMILLER, DEAN J. KYNASTON
    Publisher: FOR DUMMIES (Publication Year:2020)
    Subject(s): HANDBOOK MANUALS, COMPUTER SOFTWARE, PROJECT MANAGEMENT, AGILE SOFTWARE DEVELOPMENT
    Call No: 005.1 LAY
    Accession No: 103502
  • 240
    OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE
    Author(s): STEVEN DEFINO
    Publisher: COURSE TECHNOLOGY - THOMSON LEARNING (Publication Year:2013)
    Subject(s): ELECTRONIC DATA PROCESSING-SECURITY MEASURES, COMPUTER SECURITY
    Call No: 005.8 DEF
    Accession No: 92812
Showing 231 - 240 of total 537 results.