Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Goutam, Rajesh Kumar Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.QA76.9.A25 G68 2021 1 -
Title: Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author: Goutam, Rajesh Kumar
Year: 2021
No Items currently Available.
- Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps. Shaikh, Shahid Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.QA76.9.S53.2021 2 -
Title: Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author: Shaikh, Shahid
Year: 2021
Available at: GUtech Library.
- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 3 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 4 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 6 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 7 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 9 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 10 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 11 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 12 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
No Items currently Available.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 13 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments Gunawardana, Kushantha An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governmentsQA76.9.M65 G86 2022 14 -
Title: An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author: Gunawardana, Kushantha
Year: 2022
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 15 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- All-in-one CISSP exam guide Maymí, Fernando All-in-one CISSP exam guideQA76.9.A25 M33 2022 16 -
Title: All-in-one CISSP exam guide
Author: Maymí, Fernando
Year: 2022
Available at: GUtech Library.
- Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Oettinger, William Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceQA76.9.A25 O38 2022 17 -
Title: Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author: Oettinger, William
Year: 2022
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 18 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- Beginning Windows Phone 7 development Lee, Henry Beginning Windows Phone 7 developmentQA76.59.L44 2010 19 -
Title: Beginning Windows Phone 7 development
Author: Lee, Henry
Year: 2010
Available at: GUtech Library.
- Usborne lift-the-flap computers and coding Usborne lift-the-flap computers and codingQA76.63.U83 2015 20 -
Title: Usborne lift-the-flap computers and coding
Author:
Year: 2015
Available at: Finland Oman School Library.
- An introduction to programming and object-oriented design using Java Niño, J. An introduction to programming and object-oriented design using JavaQA76.64.N566 2008 21 -
Title: An introduction to programming and object-oriented design using Java
Author: Niño, J.
Year: 2008
Available at: GUtech Library.
- A comprehensive introduction to object-oriented programming with Java Wu, Thomas C. A comprehensive introduction to object-oriented programming with JavaQA76.64.W8 2008 22 -
Title: A comprehensive introduction to object-oriented programming with Java
Author: Wu, Thomas C.
Year: 2008
Available at: GUtech Library.
- Object-oriented data structures using Java / Dale, Nell Object-oriented data structures using Java /QA76.64.D35 2018 23 -
Title: Object-oriented data structures using Java /
Author: Dale, Nell
Year: 2018
Available at: GUtech Library.
- 24 -
LIBERO Error

Sorry, LIBERO has encountered an error

Please contact LIBERO Support with the following information if errors continue:

A run-time error occurred while executing the page

Error: <SUBSCRIPT>StarRating+3^VLEReviewsRatings ^BGUTwop("Review","")
ErrorNo: 5002
CSP Page: /libero/WebOpac.cls
Namespace: LIBERO
Class: User.WebOpac
Routine: VLEReviewsRatings
Location: StarRating+3