Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 321 - 330 of total 523 results.- 321BUILDING SECURE AND RELIABLE SYSTEMS: BEST PRACTICES FOR DESIGNING, IMPLEMENTING, AND MAINTAINING SYSTEMS
Author(s): BETSY BEYER, PIOTR LEWANDOWSKI, HEATHER ADKINS, PAUL BLANKINSHIP, OPREA STUBBLEFIELD
Publisher: O'REILLY MEDIA (Publication Year:2020)
Subject(s): INFORMATION SCIENCE, INFORMATION TECHNOLOGY, DATA PROTECTION, COMPUTER NETWORKS SECURITY MEASURES, SOFTWARE ENGINEERING, INFORMATION STORAGE AND RETRIEVAL SYSTEMS
Call No: 005.8 ADK
Accession No: 103391 - 322DATA PIPELINES POCKET REFERENCE: MOVING AND PROCESSING DATA FOR ANALYTICS
Author(s): JAMES DENSMORE
Publisher: O'REILLY MEDIA (Publication Year:2021)
Subject(s): INFORMATION TECHNOLOGY, DATABASE MANAGEMENT AND DESIGN, INFORMATION RETRIEVAL
Call No: 005.74 DEN
Accession No: 103393 - 323SQL FOR DATA ANALYSIS: ADVANCED TECHNIQUES FOR TRANSFORMING DATA INTO INSIGHTS
Author(s): CATHY TANIMURA
Publisher: O'REILLY MEDIA (Publication Year:2021)
Subject(s): MATHEMATICAL STATISTICS, SQL (COMPUTER PROGRAM LANGUAGE)
Call No: 005.7565 TAN
Accession No: 105165 - 324DATA MESH : DELIVERING DATA-DRIVEN VALUE AT SCALE
Author(s): ZHAMAK DEHGHANI
Publisher: O'REILLY MEDIA (Publication Year:2022)
Subject(s): DATA PROCESSING, BUSINESS ENTERPRISES, INFORMATION TECHNOLOGY, DATABASE MANAGEMENT AND DESIGN, BIG DATA
Call No: 005.7 DEH
Accession No: 105163 - 325A SOFTWARE ENGINEER LEARNS HTML5, JAVASCRIPT & JQUERY
Author(s): DANE CAMERON
Publisher: CISDAL PUBLISHING (Publication Year:2014)
Subject(s): JAVA (COMPUTER PROGRAM LANGUAGE), QUERY LANGUAGES (COMPUTER SCIENCE)
Call No: 005.2762 CAM
Accession No: 90856 - 326RTFM: RED TEAM FIELD MANUAL
Author(s): BEN CLARK
Publisher: CREATESPACE (Publication Year:2014)
Subject(s): COMPUTER SECURITY, COMPUTER HACKERS
Call No: 005.1 CLA
Accession No: 102592 - 327THE COMPLETE GUIDE TO CYBER SECURITY RISKS AND CONTROLS
Author(s): ANNE KOHNKE, DAN SHOEMAKER, KENNETH SIGLER
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): INFORMATION TECHNOLOGY, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KOH
Accession No: 94657 - 328ENTERPRISE LEVEL SECURITY: SECURING INFORMATION SYSTEMS IN AN UNCERTAIN WORLD
Author(s): WILLIAM SIMPSON
Publisher: AUERBACH PUBLISHERS (Publication Year:2016)
Subject(s): INDUSTRIES, COMPUTER NETWORKS SECURITY MEASURES, SECURITY MEASURES
Call No: 005.8 SIM
Accession No: 95433 - 329STEP BY STEP BOOTSTRAP 3: A QUICK GUIDE TO RESPONSIVE WEB DEVELOPMENT USING BOOTSTRAP 3
Author(s): RIWANTO MEGOSINARSO
Publisher: CREATESPACE (Publication Year:2014)
Call No: 005.2762 MEG
Accession No: 90857 - 330MICROSOFT OFFICE 365 ADMINISTRATION INSIDE OUT
Author(s): DARRYL KEGG, AARON GUILMETTE, LOU MANDICH, ED FISHER
Publisher: MICROSOFT PRESS (Publication Year:2018)
Subject(s): BUSINESS, MICROSOFT OFFICE, COMPUTER PROGRAM
Call No: 005.5 KEG
Accession No: 97133