Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 281 - 290 of total 529 results.- 281DESIGNING DATA-INTENSIVE APPLICATIONS: THE BIG IDEAS BEHIND RELIABLE, SCALABLE AND MAINTAINABLE SYSTEMS
Author(s): MARTIN KLEPPMANN
Publisher: O'REILLY MEDIA (Publication Year:2017)
Subject(s): DATABASE MANAGEMENT AND DESIGN, WEB SITE DEVELOPMENT, APPLICATION SOFTWARE--DEVELOPMENT
Call No: 005.3 KLE
Accession No: 96993 - 282HBASE: THE DEFINITIVE GUIDE
Author(s): LARS GEORGE
Publisher: O'REILLY MEDIA (Publication Year:2011)
Subject(s): DATABASE MANAGEMENT AND DESIGN, ELECTRONIC DATA PROCESSING, OPEN SOURCE SOFTWARE
Call No: 005.7565 GEO
Accession No: 85476 - 283INTRODUCTORY STATISTICS USING SPSS
Author(s): HERSCHEL KNAPP
Publisher: SAGE PUBLICATIONS (Publication Year:2014)
Subject(s): SPSS (COMPUTER FILE), COMPUTER PROGRAM, SOCIAL SCIENCES STATISTICAL MEHTODS
Call No: 005.55 KNA
Accession No: 90126 - 284OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): HAROLD.F TIPTON, STEVEN HERNANDEZ
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): EXAMINATIONS-STUDY GUIDES, COMPUTER NETWORKS, INFORMATION SYSTEMS, COMPUTER SECURITY
Call No: 005.8 TIP
Accession No: 86623 - 285OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
Author(s): MANO PAUL
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
Call No: 005.8 PAU
Accession No: 98947 - 286INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE: ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0
Author(s): BARRY WILLIAMS
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 WIL
Accession No: 100840 - 287CYBERSECURITY: CURRENT WRITINGS ON THREATS AND PROTECTION
Author(s): ROGER L. KEMP, JOAQUIN JAY GONZALEZ
Publisher: MCFARLAND & COMPANY, INC., PUBLISHERS (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 GON
Accession No: 102630 - 288DYNAMIC DOCUMENTS WITH R AND KNITR
Author(s): YIHUI XIE
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): TECHNICAL PUBLICATIONS, CORPORATION REPORTS, STATISTICS DATA PROCESSING
Call No: 005.55 XIE
Accession No: 90031 - 289INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE
Author(s): DOUGLAS LANDOLL
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 LAN
Accession No: 94908 - 290OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): ADAM GORDON
Publisher: CRC PRESS (Publication Year:2015)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY
Call No: 005.8 GOR
Accession No: 91491