Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 471 - 480 of total 524 results.- 471THE NEW AND IMPROVED FLASK MEGA-TUTORIAL
Author(s): MIGUEL GRINBERG
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): PROGRAMMING
Call No: 005.133 GRI
Accession No: 98946 - 472THE HACKER PLAYBOOK 3: PRACTICAL GUIDE TO PENETRATION TESTING
Author(s): PETER KIM
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KIM
Accession No: 102595 - 473PLATFORM REVOLUTION: BLOCKCHAIN TECHNOLOGY AS THE OPERATING SYSTEM OF THE DIGITAL AGE
Author(s): DON TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION-ECONOMIC ASPECTS, ELECTRONIC DATA PROCESSING, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 104515 - 474DIGITAL ASSET REVOLUTION: HOW BLOCKCHAIN IS DECENTRALIZING FINANCE AND DISRUPTING WALL STREET
Author(s): ALEX TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2022)
Subject(s): DATABASE MANAGEMENT SYSTEMS, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 105024 - 475NAVIGATING NEW CYBER RISKS: HOW BUSINESSES CAN PLAN, BUILD AND MANAGE SAFE SPACES IN THE DIGITAL AGE
Author(s): GANNA POGREBNA, MARK SKILTON
Publisher: PALGRAVE (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 POG
Accession No: 102633 - 476MODERN DATA STRATEGY
Author(s): MIKE FLECKENSTEIN, LORRAINE FELLOWS
Publisher: SPRINGER (Publication Year:2018)
Subject(s): MANAGEMENT INFORMATION SYSTEMS, INFORMATION RESOURCE MANAGEMENT, COMPUTER SECURITY
Call No: 005.74 FLE
Accession No: 101494 - 477FIGHTING SPYWARE WITH MANDATORY ACCESS CONTROL IN MS WINDOWS VISTA: A CONCEPT FOR FIGHTING SPYWARE IN THE MICROSOFT WINDOWS VISTA OS FROM MICROSOFT CORPORATION
Author(s): FILIPE GOVERNA
Publisher: VDM VERLAG (Publication Year:2009)
Subject(s): COMPUTER, INFORMATION SECURITY, COMPUTER SECURITY, WINDOWS VISTA
Call No: 005.8 GOV
Accession No: 80933 - 478UNDERSTANDING NETWORK HACKS: ATTACK AND DEFENSE WITH PYTHON
Author(s): BASTIAN BALLMANN
Publisher: SPRINGER (Publication Year:2015)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BAL
Accession No: 94591 - 479MICROSOFT OFFICE ACCESS 2007 STEP BY STEP (WITH CD-ROM)
Author(s): STEVE LAMBERT, JOAN PREPPERNAU, M. DOW LAMBERT
Publisher: PRENTICE HALL OF INDIA (Publication Year:2007)
Subject(s): COMPUTER PROGRAMMING, MICROSOFT ACCESS
Call No: 005.711 LAM
Accession No: 74823 - 4802007 MICROSOFT OFFICE SYSTEM INSIDE OUT
Author(s): JIM BOYCE, STEPHANIE KRIEGER, MARK DODGE, JEFF CONRAD
Publisher: PRENTICE HALL OF INDIA (Publication Year:2007)
Subject(s): MICROSOFT ACCESS, MICROSOFT OFFICE, MICROSOFT OUTLOOK
Call No: 005.5 BOY
Accession No: 93299