Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 291 - 300 of total 524 results.- 291ANDROID CONTINUOUS INTEGRATION: BUILD-DEPLOY-TEST AUTOMATION FOR ANDROID MOBILE APPS
Author(s): PRADEEP MACHARLA
Publisher: APRESS (Publication Year:2017)
Subject(s): COMPUTER PROGRAMMING, OPEN SOURCE SOFTWARE, APPLICATION SOFTWARE--DEVELOPMENT, MOBILE COMPUTING, ANDROID (ELECTRONIC RESOURCE)
Call No: 005.35 MAC
Accession No: 98808 - 292ENTERPRISE CYBERSECURITY STUDY GUIDE: HOW TO BUILD A SUCCESSFUL CYBERDEFENSE PROGRAM AGAINST ADVANCED THREATS
Author(s): SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, ABDUL ASLAM
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, PREVENTION
Call No: 005.8 DON
Accession No: 101462 - 293ORACLE SQL REVEALED: EXECUTING BUSINESS LOGIC IN THE DATABASE ENGINE
Author(s): ALEX REPRINTSEV
Publisher: APRESS (Publication Year:2018)
Subject(s): ORACLE, DATABASE DESIGN, SQL (COMPUTER PROGRAM LANGUAGE)
Call No: 005.756 REP
Accession No: 100825 - 294CYBERSECURITY INCIDENT RESPONSE: HOW TO CONTAIN, ERADICATE, AND RECOVER FROM INCIDENTS
Author(s): ERIC C. THOMPSON
Publisher: APRESS (Publication Year:2018)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY MANAGEMENT
Call No: 005.8 THO
Accession No: 99286 - 295FINANCIAL CYBERSECURITY RISK MANAGEMENT: LEADERSHIP PERSPECTIVES AND GUIDANCE FOR SYSTEMS AND INSTITUTIONS
Author(s): J.L. BAYUK, PAUL ROHMEYER
Publisher: APRESS (Publication Year:2019)
Subject(s): RISK MANAGEMENT, COMPUTER SECURITY MANAGEMENT, CYBER INTELLIGENCE
Call No: 005.8 ROH
Accession No: 100608 - 296PYTHON FOR THE LIFE SCIENCES: A GENTLE INTRODUCTION TO PYTHON FOR LIFE SCIENTISTS
Author(s): ALEXANDER LANCASTER, GORDON WEBSTER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER PROGRAMMING, PYTHON (COMPUTER PROGRAM LANGUAGE), OPEN SOURCE SOFTWARE
Call No: 005.133 LAN
Accession No: 101473 - 297SYSTEM ADMINISTRATION ETHICS: TEN COMMANDMENTS FOR SECURITY AND COMPLIANCE IN A MODERN CYBER WORLD
Author(s): IGOR LJUBUNCIC, TOM LITTERER
Publisher: APRESS (Publication Year:2019)
Subject(s): COMPUTER NETWORKS, INFORMATION TECHNOLOGY, COMPUTER SECURITY, MORAL AND ETHICAL ASPECTS
Call No: 005.8 LJU
Accession No: 101560 - 298UNDERSTANDING ORACLE APEX 20 APPLICATION DEVELOPMENT: THINK LIKE AN APPLICATION EXPRESS DEVELOPER
Author(s): EDWARD SCIORE
Publisher: APRESS (Publication Year:2020)
Subject(s): COMPUTER PROGRAMMING, COMPUTER SOFTWARE, DATABASE MANAGEMENT AND DESIGN
Call No: 005.133 SCI
Accession No: 102783 - 299CYBER THREAT INTELLIGENCE: THE NO-NONSENSE GUIDE FOR CISOS AND SECURITY MANAGERS
Author(s): AARON ROBERTS
Publisher: APRESS (Publication Year:2021)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 ROB
Accession No: 104173 - 300HADOOP: THE DEFINITIVE GUIDE
Author(s): TOM WHITE
Publisher: O'REILLY MEDIA (Publication Year:2015)
Subject(s): COMPUTER SCIENCE, ELECTRONIC DATA PROCESSING, APACHE (COMPUTER FILE)
Call No: 005.74 WHI
Accession No: 95250