Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 361 - 370 of total 529 results.- 361SERIOUS CRYPTOGRAPHY: A PRACTICAL INTRODUCTION TO MODERN ENCRYPTION
Author(s): JEAN-PHILIPPE AUMASSON
Publisher: NO STARCH PRESS (Publication Year:2018)
Subject(s): COMPUTER SECURITY, DATA ENCRYPTION (COMPUTER SCIENCE)
Call No: 005.8 AUM
Accession No: 97017 - 362SERIOUS PYTHON: BLACK-BELT ADVICE ON DEPLOYMENT, SCALABILITY, TESTING, AND MORE
Author(s): JULIEN DANJOU
Publisher: NO STARCH PRESS (Publication Year:2018)
Subject(s): PYTHON (COMPUTER PROGRAM LANGUAGE)
Call No: 005.133 DAN
Accession No: 99061 - 363THE QUEST FOR SOFTWARE REQUIREMENTS
Author(s): ROXANNE E. MILLER
Publisher: MAVENMARK BOOKS (Publication Year:2009)
Subject(s): COMPUTER SOFTWARE DEVELOPMENT MANAGEMENT, SOFTWARE ENGINEERING
Call No: 005.1 MIL
Accession No: 87081 - 364STATA LONGITUDINAL/ PANEL-DATA REFERENCE MANUAL: RELEASE 10
Publisher: STATA PRESS (Publication Year:2007)
Call No: 005 STA
Accession No: 77951 - 365SPEAKING STATA GRAPHICS: A COLLECTION FROM THE STATA JOURNAL
Author(s): NICHOLAS.J COX
Publisher: STATA PRESS (Publication Year:2014)
Subject(s): STATISTICS, STATA PROGRAMMING, COMPUTER PROGRAM
Call No: 005.55 COX
Accession No: 94593 - 366META-ANALYSIS IN STATA: AN UPDATED COLLECTION FROM THE STATA JOURNAL
Author(s): TOM M. PALMER, JONATHAN A. C. STERNE
Publisher: STATA PRESS (Publication Year:2016)
Subject(s): STATISTICS, COMPUTER PROGRAM, META-ANALYSIS
Call No: 005.55 PAL
Accession No: 94594 - 367AN INTRODUCTION TO SURVIVAL ANALYSIS USING STATA
Author(s): MARIO CLEVES, WILLIAM W. GOULD, YULIA.V MARCHENKO
Publisher: STATA PRESS (Publication Year:2018)
Subject(s): STATISTICS, STATA PROGRAMMING
Call No: 005.55 CLE
Accession No: 99029 - 368THE MATA BOOK: A BOOK FOR SERIOUS PROGRAMMERS AND THOSE WHO WANT TO BE
Author(s): WILLIAM W. GOULD
Publisher: STATA PRESS (Publication Year:2018)
Subject(s): STATA PROGRAMMING, PROGRAMMING LANGUAGE, MATA - COMPUTER PROGRAM LANGUAGE
Call No: 005.133 GOU
Accession No: 101509 - 369THE BASICS OF HACKING AND PENETRATION TESTING: ETHICAL HACKING AND PENETRATION TESTING MADE EASY
Author(s): PATRICK ENGEBRETSON
Publisher: SYNGRESS (Publication Year:2011)
Subject(s): COMPUTER CRIMES, COMPUTER SOFTWARE, COMPUTER SECURITY, PREVENTION, COMPUTER HACKERS
Call No: 005.8 ENG
Accession No: 86393 - 370CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT(AN ISACA CERTIFICATION) :CGEIT REVIEW MANUAL 2010
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2010)
Subject(s): AUDITING, ENTERPRISE, INFORMATION TECHNOLOGY, GOVERNANCE, INFORMATION TECHNOLOGY AUDIT
Call No: 005.8 INF
Accession No: 81230