Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 291 - 300 of total 528 results.- 291EXPERT ORACLE APPLICATION EXPRESS
Author(s): JOHN SCOTT
Publisher: APRESS (Publication Year:2015)
Subject(s): ORACLE, APPLICATION SOFTWARE--DEVELOPMENT
Call No: 005.7565 SCO
Accession No: 93058 - 292THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 293CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554 - 294ANDROID CONTINUOUS INTEGRATION: BUILD-DEPLOY-TEST AUTOMATION FOR ANDROID MOBILE APPS
Author(s): PRADEEP MACHARLA
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING, OPEN SOURCE SOFTWARE, APPLICATION SOFTWARE--DEVELOPMENT, MOBILE COMPUTING, ANDROID (ELECTRONIC RESOURCE)
Call No: 005.35 MAC
Accession No: 98808 - 295ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 296ORACLE SQL REVEALED: EXECUTING BUSINESS LOGIC IN THE DATABASE ENGINE
Author(s): ALEX REPRINTSEV
Publisher: APRESS (Publication Year:2018)
Subject(s): ORACLE, DATABASE DESIGN, SQL (COMPUTER PROGRAM LANGUAGE)
Call No: 005.756 REP
Accession No: 100825 - 297CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286 - 298FINANCIAL CYBERSECURITY RISK MANAGEMENT: LEADERSHIP PERSPECTIVES AND GUIDANCE FOR SYSTEMS AND INSTITUTIONS
Author(s): J.L. BAYUK, PAUL ROHMEYER
Publisher: APRESS (Publication Year:2019)
Subject(s): RISK MANAGEMENT, COMPUTER SECURITY MANAGEMENT, CYBER INTELLIGENCE
Call No: 005.8 ROH
Accession No: 100608 - 299PYTHON FOR THE LIFE SCIENCES: A GENTLE INTRODUCTION TO PYTHON FOR LIFE SCIENTISTS
Author(s): ALEXANDER LANCASTER, GORDON WEBSTER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER PROGRAMMING, PYTHON (COMPUTER PROGRAM LANGUAGE), OPEN SOURCE SOFTWARE
Call No: 005.133 LAN
Accession No: 101473 - 300SYSTEM ADMINISTRATION ETHICS: TEN COMMANDMENTS FOR SECURITY AND COMPLIANCE IN A MODERN CYBER WORLD
Author(s): IGOR LJUBUNCIC, TOM LITTERER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER NETWORKS, INFORMATION TECHNOLOGY, COMPUTER SECURITY, MORAL AND ETHICAL ASPECTS
Call No: 005.8 LJU
Accession No: 101560