Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 471 - 480 of total 532 results.- 471DSLS IN ACTION
Author(s): DEBASISH GHOSH
Publisher: MANNING PUBLICATIONS (Publication Year:2010)
Subject(s): COMPUTER PROGRAMMING, SOFTWARE ENGINEERING
Call No: 005.2768 GHO
Accession No: 82833 - 472THE JOY OF CLOJURE: THINKING THE CLOJURE WAY
Author(s): MICHAEL FOGUS, CHRIS HOUSER
Publisher: MANNING PUBLICATIONS (Publication Year:2011)
Subject(s): COMPUTER PROGRAMMING, COMPUTER LANGUAGE, PROGRAMMING LANGUAGE
Call No: 005.133 FOG
Accession No: 82442 - 473THE DAMA GUIDE TO THE DATA MANAGEMENT BODY OF KNOWLEDGE (DAMA-DMBOK GUIDE)
Author(s): MARK MOSLEY, MICHAEL BRACKETT, SUSAN EARLEY
Publisher: TECHNICS PUBLICATIONS (Publication Year:2010)
Subject(s): MANAGEMENT INFORMATION SYSTEMS, DATABASE MANAGEMENT AND DESIGN
Call No: 005.74 DAT
Accession No: 84860 - 474ASYNC JAVASCRIPT: BUILD MORE RESPONSIVE APPS WITH LESS CODE
Author(s): TREVOR BURNHAM
Publisher: PRAGMATIC BOOKSHELF (Publication Year:2012)
Subject(s): JAVA (COMPUTER PROGRAM LANGUAGE)
Call No: 005.2762 BUR
Accession No: 93617 - 475SCRUM: A BREATHTAKINGLY BRIEF AND AGILE INTRODUCTION
Author(s): CHRIS SIMS, HILLARY LOUISE JOHNSON
Publisher: DYMAXICON (Publication Year:2012)
Subject(s): AGILE SOFTWARE DEVELOPMENT, SCRUM (COMPUTER SOFTWARE DEVELOPMENT)
Call No: 005.1 SIM
Accession No: 92605 - 476NETWORK SECURITY AND CRYPTOGRAPHY: A SELF-TEACHING INTRODUCTION
Author(s): SARHAN M. MUSA
Publisher: MERCURY BOOKS (Publication Year:2018)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES, INFORMATION THEORY, CRYPTOGRAPHY
Call No: 005.8 MUS
Accession No: 100300 - 477ACCELERATE: THE SCIENCE BEHIND DEVOPS: BUILDING AND SCALING HIGH PERFORMING TECHNOLOGY ORGANIZATIONS
Author(s): GENE KIM, JEZ HUMBLE, NICOLE FORSGREN
Publisher: IT REVOLUTION PRESS (Publication Year:2018)
Subject(s): COMPUTER SOFTWARE, OPERATING SYSTEM (COMPUTER), SOFTWARE ARCHITECTURE, AGILE SOFTWARE DEVELOPMENT
Call No: 005.1 FOR
Accession No: 99496 - 478THE NEW AND IMPROVED FLASK MEGA-TUTORIAL
Author(s): MIGUEL GRINBERG
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): PROGRAMMING
Call No: 005.133 GRI
Accession No: 98946 - 479THE HACKER PLAYBOOK 3: PRACTICAL GUIDE TO PENETRATION TESTING
Author(s): PETER KIM
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KIM
Accession No: 102595 - 480PLATFORM REVOLUTION: BLOCKCHAIN TECHNOLOGY AS THE OPERATING SYSTEM OF THE DIGITAL AGE
Author(s): DON TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION-ECONOMIC ASPECTS, ELECTRONIC DATA PROCESSING, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 104515