Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 291 - 300 of total 529 results.- 291PRACTICAL HIVE: A GUIDE TO HADOOP'S DATA WAREHOUSE SYSTEM
Author(s): SCOTT SHAW, ANDREAS FRANCOIS VERMEULEN, ANKUR GUPTA, DAVID KJERRUMGAARD
Publisher: APRESS (Publication Year:2016)
Subject(s): APACHE (COMPUTER FILE)
Call No: 005.74 SHA
Accession No: 99855 - 292EXPERT ORACLE APPLICATION EXPRESS
Author(s): JOHN SCOTT
Publisher: APRESS (Publication Year:2015)
Subject(s): ORACLE, APPLICATION SOFTWARE--DEVELOPMENT
Call No: 005.7565 SCO
Accession No: 93058 - 293THE SECOND ECONOMY: THE RACE FOR TRUST, TREASURE AND TIME IN THE CYBERSECURITY WAR
Author(s): STEVE GROBMAN, ALLISON CERRA
Publisher: APRESS (Publication Year:2016)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES, INTERNET - SECURITY MEASURES
Call No: 005.8 GRO
Accession No: 95724 - 294CYBER SECURITY ON AZURE: AN IT PROFESSIONAL'S GUIDE TO MICROSOFT AZURE SECURITY CENTER
Author(s): MARSHALL COPELAND
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 COP
Accession No: 96554 - 295ANDROID CONTINUOUS INTEGRATION: BUILD-DEPLOY-TEST AUTOMATION FOR ANDROID MOBILE APPS
Author(s): PRADEEP MACHARLA
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING, OPEN SOURCE SOFTWARE, APPLICATION SOFTWARE--DEVELOPMENT, MOBILE COMPUTING, ANDROID (ELECTRONIC RESOURCE)
Call No: 005.35 MAC
Accession No: 98808 - 296ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 297ORACLE SQL REVEALED: EXECUTING BUSINESS LOGIC IN THE DATABASE ENGINE
Author(s): ALEX REPRINTSEV
Publisher: APRESS (Publication Year:2018)
Subject(s): ORACLE, DATABASE DESIGN, SQL (COMPUTER PROGRAM LANGUAGE)
Call No: 005.756 REP
Accession No: 100825 - 298CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286 - 299FINANCIAL CYBERSECURITY RISK MANAGEMENT: LEADERSHIP PERSPECTIVES AND GUIDANCE FOR SYSTEMS AND INSTITUTIONS
Author(s): J.L. BAYUK, PAUL ROHMEYER
Publisher: APRESS (Publication Year:2019)
Subject(s): RISK MANAGEMENT, COMPUTER SECURITY MANAGEMENT, CYBER INTELLIGENCE
Call No: 005.8 ROH
Accession No: 100608 - 300PYTHON FOR THE LIFE SCIENCES: A GENTLE INTRODUCTION TO PYTHON FOR LIFE SCIENTISTS
Author(s): ALEXANDER LANCASTER, GORDON WEBSTER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER PROGRAMMING, PYTHON (COMPUTER PROGRAM LANGUAGE), OPEN SOURCE SOFTWARE
Call No: 005.133 LAN
Accession No: 101473