Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 281 - 290 of total 524 results.- 281OFFICIAL (ISC)2 GUIDE TO THE CSSLP CBK
Author(s): MANO PAUL
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT
Call No: 005.8 PAU
Accession No: 98947 - 282INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE: ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0
Author(s): BARRY WILLIAMS
Publisher: CRC PRESS (Publication Year:2013)
Subject(s): COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 WIL
Accession No: 100840 - 283CYBERSECURITY: CURRENT WRITINGS ON THREATS AND PROTECTION
Author(s): ROGER L. KEMP, JOAQUIN JAY GONZALEZ
Publisher: MCFARLAND & COMPANY, INC., PUBLISHERS (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 GON
Accession No: 102630 - 284DYNAMIC DOCUMENTS WITH R AND KNITR
Author(s): YIHUI XIE
Publisher: CRC PRESS (Publication Year:2014)
Subject(s): TECHNICAL PUBLICATIONS, CORPORATION REPORTS, STATISTICS DATA PROCESSING
Call No: 005.55 XIE
Accession No: 90031 - 285INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE
Author(s): DOUGLAS LANDOLL
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 LAN
Accession No: 94908 - 286OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): ADAM GORDON
Publisher: CRC PRESS (Publication Year:2015)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY
Call No: 005.8 GOR
Accession No: 91491 - 287PRACTICAL HIVE: A GUIDE TO HADOOP'S DATA WAREHOUSE SYSTEM
Author(s): SCOTT SHAW, ANDREAS FRANCOIS VERMEULEN, ANKUR GUPTA, DAVID KJERRUMGAARD
Publisher: APRESS (Publication Year:2016)
Subject(s): APACHE (COMPUTER FILE)
Call No: 005.74 SHA
Accession No: 99855 - 288EXPERT ORACLE APPLICATION EXPRESS
Author(s): JOHN SCOTT
Publisher: APRESS (Publication Year:2015)
Subject(s): ORACLE, APPLICATION SOFTWARE--DEVELOPMENT
Call No: 005.7565 SCO
Accession No: 93058 - 289THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 290CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554