Computer Software
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 471 - 480 of total 529 results.- 471ASYNC JAVASCRIPT: BUILD MORE RESPONSIVE APPS WITH LESS CODE
Author(s): TREVOR BURNHAM
Publisher: PRAGMATIC BOOKSHELF (Publication Year:2012)
Subject(s): JAVA (COMPUTER PROGRAM LANGUAGE)
Call No: 005.2762 BUR
Accession No: 93617 - 472SCRUM: A BREATHTAKINGLY BRIEF AND AGILE INTRODUCTION
Author(s): CHRIS SIMS, HILLARY LOUISE JOHNSON
Publisher: DYMAXICON (Publication Year:2012)
Subject(s): AGILE SOFTWARE DEVELOPMENT, SCRUM (COMPUTER SOFTWARE DEVELOPMENT)
Call No: 005.1 SIM
Accession No: 92605 - 473NETWORK SECURITY AND CRYPTOGRAPHY: A SELF-TEACHING INTRODUCTION
Author(s): SARHAN M. MUSA
Publisher: MERCURY BOOKS (Publication Year:2018)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES, INFORMATION THEORY, CRYPTOGRAPHY
Call No: 005.8 MUS
Accession No: 100300 - 474ACCELERATE: THE SCIENCE BEHIND DEVOPS: BUILDING AND SCALING HIGH PERFORMING TECHNOLOGY ORGANIZATIONS
Author(s): GENE KIM, JEZ HUMBLE, NICOLE FORSGREN
Publisher: IT REVOLUTION PRESS (Publication Year:2018)
Subject(s): COMPUTER SOFTWARE, OPERATING SYSTEM (COMPUTER), SOFTWARE ARCHITECTURE, AGILE SOFTWARE DEVELOPMENT
Call No: 005.1 FOR
Accession No: 99496 - 475THE NEW AND IMPROVED FLASK MEGA-TUTORIAL
Author(s): MIGUEL GRINBERG
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): PROGRAMMING
Call No: 005.133 GRI
Accession No: 98946 - 476THE HACKER PLAYBOOK 3: PRACTICAL GUIDE TO PENETRATION TESTING
Author(s): PETER KIM
Publisher: INDEPENDENTLY PUBLISHED (Publication Year:2018)
Subject(s): COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 KIM
Accession No: 102595 - 477PLATFORM REVOLUTION: BLOCKCHAIN TECHNOLOGY AS THE OPERATING SYSTEM OF THE DIGITAL AGE
Author(s): DON TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2021)
Subject(s): TECHNOLOGICAL INNOVATION-ECONOMIC ASPECTS, ELECTRONIC DATA PROCESSING, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 104515 - 478DIGITAL ASSET REVOLUTION: HOW BLOCKCHAIN IS DECENTRALIZING FINANCE AND DISRUPTING WALL STREET
Author(s): ALEX TAPSCOTT
Publisher: BARLOW PUBLISHING (Publication Year:2022)
Subject(s): DATABASE MANAGEMENT SYSTEMS, BLOCKCHAIN
Call No: 005.74 TAP
Accession No: 105024 - 479NAVIGATING NEW CYBER RISKS: HOW BUSINESSES CAN PLAN, BUILD AND MANAGE SAFE SPACES IN THE DIGITAL AGE
Author(s): GANNA POGREBNA, MARK SKILTON
Publisher: PALGRAVE (Publication Year:2019)
Subject(s): COMPUTER CRIMES, COMPUTER SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 POG
Accession No: 102633 - 480MODERN DATA STRATEGY
Author(s): MIKE FLECKENSTEIN, LORRAINE FELLOWS
Publisher: SPRINGER (Publication Year:2018)
Subject(s): MANAGEMENT INFORMATION SYSTEMS, INFORMATION RESOURCE MANAGEMENT, COMPUTER SECURITY
Call No: 005.74 FLE
Accession No: 101494