Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 471 - 480 of total 525 results.- 471ACCELERATE: THE SCIENCE BEHIND DEVOPS: BUILDING AND SCALING HIGH PERFORMING TECHNOLOGY ORGANIZATIONS
Author(s): GENE KIM, JEZ HUMBLE, NICOLE FORSGREN
Publisher: IT REVOLUTION PRESS (Publication Year:2018)
Subject(s): COMPUTER SOFTWARE, OPERATING SYSTEM (COMPUTER), SOFTWARE ARCHITECTURE, AGILE SOFTWARE DEVELOPMENT
Call No: 005.1 FOR
Accession No: 99496 - 472THE NEW AND IMPROVED FLASK MEGA-TUTORIAL
Author(s): MIGUEL GRINBERG
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): PROGRAMMING
Call No: 005.133 GRI
Accession No: 98946 - 473THE HACKER PLAYBOOK 3: PRACTICAL GUIDE TO PENETRATION TESTING
Author(s): PETER KIM
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KIM
Accession No: 102595 - 474PLATFORM REVOLUTION: BLOCKCHAIN TECHNOLOGY AS THE OPERATING SYSTEM OF THE DIGITAL AGE
Author(s): DON TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION-ECONOMIC ASPECTS, ELECTRONIC DATA PROCESSING, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 104515 - 475DIGITAL ASSET REVOLUTION: HOW BLOCKCHAIN IS DECENTRALIZING FINANCE AND DISRUPTING WALL STREET
Author(s): ALEX TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2022)
Subject(s): DATABASE MANAGEMENT SYSTEMS, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 105024 - 476NAVIGATING NEW CYBER RISKS: HOW BUSINESSES CAN PLAN, BUILD AND MANAGE SAFE SPACES IN THE DIGITAL AGE
Author(s): GANNA POGREBNA, MARK SKILTON
Publisher: PALGRAVE (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 POG
Accession No: 102633 - 477MODERN DATA STRATEGY
Author(s): MIKE FLECKENSTEIN, LORRAINE FELLOWS
Publisher: SPRINGER (Publication Year:2018)
Subject(s): MANAGEMENT INFORMATION SYSTEMS, INFORMATION RESOURCE MANAGEMENT, COMPUTER SECURITY
Call No: 005.74 FLE
Accession No: 101494 - 478FIGHTING SPYWARE WITH MANDATORY ACCESS CONTROL IN MS WINDOWS VISTA: A CONCEPT FOR FIGHTING SPYWARE IN THE MICROSOFT WINDOWS VISTA OS FROM MICROSOFT CORPORATION
Author(s): FILIPE GOVERNA
Publisher: VDM VERLAG (Publication Year:2009)
Subject(s): COMPUTER, INFORMATION SECURITY, COMPUTER SECURITY, WINDOWS VISTA
Call No: 005.8 GOV
Accession No: 80933 - 479UNDERSTANDING NETWORK HACKS: ATTACK AND DEFENSE WITH PYTHON
Author(s): BASTIAN BALLMANN
Publisher: SPRINGER (Publication Year:2015)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BAL
Accession No: 94591 - 480MICROSOFT OFFICE ACCESS 2007 STEP BY STEP (WITH CD-ROM)
Author(s): STEVE LAMBERT, JOAN PREPPERNAU, M. DOW LAMBERT
Publisher: PRENTICE HALL OF INDIA (Publication Year:2007)
Subject(s): COMPUTER PROGRAMMING, MICROSOFT ACCESS
Call No: 005.711 LAM
Accession No: 74823