Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 291 - 300 of total 532 results.- 291INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE
Author(s): DOUGLAS LANDOLL
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): DATA PROCESSING, COMPUTER SECURITY, DATA PROTECTION, SECURITY MEASURES
Call No: 005.8 LAN
Accession No: 94908 - 292OFFICIAL (ISC)2 GUIDE TO THE CISSP CBK
Author(s): ADAM GORDON
Publisher: CRC PRESS (Publication Year:2015)
Subject(s): EXAMINATIONS-STUDY GUIDES, ELECTRONIC DATA PROCESSING, COMPUTER SECURITY
Call No: 005.8 GOR
Accession No: 91491 - 293PRACTICAL HIVE: A GUIDE TO HADOOP'S DATA WAREHOUSE SYSTEM
Author(s): SCOTT SHAW, ANDREAS FRANCOIS VERMEULEN, ANKUR GUPTA, DAVID KJERRUMGAARD
Publisher: APRESS (Publication Year:2016)
Subject(s): APACHE (COMPUTER FILE)
Call No: 005.74 SHA
Accession No: 99855 - 294EXPERT ORACLE APPLICATION EXPRESS
Author(s): JOHN SCOTT
Publisher: APRESS (Publication Year:2015)
Subject(s): ORACLE, APPLICATION SOFTWARE--DEVELOPMENT
Call No: 005.7565 SCO
Accession No: 93058 - 295THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 296CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554 - 297ANDROID CONTINUOUS INTEGRATION: BUILD-DEPLOY-TEST AUTOMATION FOR ANDROID MOBILE APPS
Author(s): PRADEEP MACHARLA
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING, OPEN SOURCE SOFTWARE, APPLICATION SOFTWARE--DEVELOPMENT, MOBILE COMPUTING, ANDROID (ELECTRONIC RESOURCE)
Call No: 005.35 MAC
Accession No: 98808 - 298ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 299ORACLE SQL REVEALED: EXECUTING BUSINESS LOGIC IN THE DATABASE ENGINE
Author(s): ALEX REPRINTSEV
Publisher: APRESS (Publication Year:2018)
Subject(s): ORACLE, DATABASE DESIGN, SQL (COMPUTER PROGRAM LANGUAGE)
Call No: 005.756 REP
Accession No: 100825 - 300CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286