Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Computer and network security essentials Daimi, Kevin... Computer and network security essentialsQA76.9.A25 D35 2017 1 -
Title: Computer and network security essentials
Author: Daimi, Kevin...
Year: 2017
No Items currently Available.
- Algorithms Sedgewick, Robert AlgorithmsQA76.9.A43.S43 2011 2 -
Title: Algorithms
Author: Sedgewick, Robert
Year: 2011
No Items currently Available.
- CompTIA security+ all-in-one exam guide, (Exam SY0-501) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-501)QA76.9.A25.C66 2018 3 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-501)
Author: Conklin, Wm. Arthur
Year: 2018
Available at: GUtech Library.
- Data modeling essentials Simsion, Graeme C. Data modeling essentialsQA76.9.D26.S56 2005 5 -
Title: Data modeling essentials
Author: Simsion, Graeme C.
Year: 2005
Available at: GUtech Library.
- Investigations involving the Internet and computer networks: NIJ Special report Investigations involving the Internet and computer networks: NIJ Special reportQA76.9.I58 2007 6 -
Title: Investigations involving the Internet and computer networks: NIJ Special report
Author:
Year: 2007
Available at: GUtech Library.
- Forensics examination of digital evidence: A guide for law enforcement Forensics examination of digital evidence: A guide for law enforcementQA76.9.A25 I58 2004 8 -
Title: Forensics examination of digital evidence: A guide for law enforcement
Author:
Year: 2004
Available at: GUtech Library.
- Computer architecture: a quantitative approach. Hennessy, John L. Computer architecture: a quantitative approach.QA76.9.A73 .P377 2007. 10 -
Title: Computer architecture: a quantitative approach.
Author: Hennessy, John L.
Year: 2007
Available at: GUtech Library.
- Network security and cryptography Sehgal, Umesh Network security and cryptographyQA76.9.A25 S44 2020 11 -
Title: Network security and cryptography
Author: Sehgal, Umesh
Year:
Available at: GUtech Library.
- Cyber security Pandey, O.N. Cyber securityQA76.9.A25 P36 2019 12 -
Title: Cyber security
Author: Pandey, O.N.
Year:
Available at: GUtech Library.
- Network security Pandey, O.N. Network securityQA76.9.A25 P36 2020 13 -
Title: Network security
Author: Pandey, O.N.
Year: 2020
Available at: GUtech Library.
- Data protection: ensuring data availability De Guise, Petron Data protection: ensuring data availabilityQA76.9.A25 G85 2017 14 -
Title: Data protection: ensuring data availability
Author: De Guise, Petron
Year: 2017
Available at: GUtech Library.
- Cyber security. Simply. Make it happen: leveraging digitization through IT security Abolhassan, Ferri ... Cyber security. Simply. Make it happen: leveraging digitization through IT securityQA76.9.A25 C93 2017 15 -
Title: Cyber security. Simply. Make it happen: leveraging digitization through IT security
Author: Abolhassan, Ferri ...
Year: 2017
Available at: GUtech Library.
- Cyber security for cyber physical systems: leveraging digitization through IT security Ali, Saqib... Cyber security for cyber physical systems: leveraging digitization through IT securityQA76.9.A25 A45 2018 16 -
Title: Cyber security for cyber physical systems: leveraging digitization through IT security
Author: Ali, Saqib...
Year: 2018
Available at: GUtech Library.
- Big data analytics and cybersecurity Savas, Onur... Big data analytics and cybersecurityQA76.9.A25 S28 2017 17 -
Title: Big data analytics and cybersecurity
Author: Savas, Onur...
Year: 2017
Available at: GUtech Library.
- Data mining and data warehousing Kumar, Sachin Data mining and data warehousingQA76.9.D34.K86 2020 18 -
Title: Data mining and data warehousing
Author: Kumar, Sachin
Year: 2020
Available at: GUtech Library.
- PC maintenance and troubleshooting guide: Subtitle Bhatnagar, Ashish PC maintenance and troubleshooting guide: SubtitleQA76.9.A73 B43 2019 19 -
Title: PC maintenance and troubleshooting guide: Subtitle
Author: Bhatnagar, Ashish
Year: 2019
Available at: GUtech Library.
- System forensics, investigation, and response: A guide for law enforcement Easttom, Chuck System forensics, investigation, and response: A guide for law enforcementQA76.9.A25 E27 2019 20 -
Title: System forensics, investigation, and response: A guide for law enforcement
Author: Easttom, Chuck
Year: 2019
Available at: GUtech Library.
- The data warehouse mentor: practical data warehouse and business intelligence insights Laberge, Robert The data warehouse mentor: practical data warehouse and business intelligence insightsQA76.9.D37.L33 2011 21 -
Title: The data warehouse mentor: practical data warehouse and business intelligence insights
Author: Laberge, Robert
Year: 2011
Available at: GUtech Library.
- Machine learning and security: protecting systems with data and algorithms Chio, Clarence Machine learning and security: protecting systems with data and algorithmsQA76.9.A25 C45 2018 22 -
Title: Machine learning and security: protecting systems with data and algorithms
Author: Chio, Clarence
Year: 2018
No Items currently Available.
- Computer system architecture Mano, M. Morris Computer system architectureQA76.9.M36 2017 23 -
Title: Computer system architecture
Author: Mano, M. Morris
Year: 2017
Available at: GUtech Library.
- Fundamentals of information systems security Kim, David Fundamentals of information systems securityQA76.9.A25 K56 2018 24 -
Title: Fundamentals of information systems security
Author: Kim, David
Year: 2018
Available at: GUtech Library.
- Data mining, data warehousing and Olap Sharma, Gajendra Data mining, data warehousing and OlapQA76.9.D34.S53 2019 25 -
Title: Data mining, data warehousing and Olap
Author: Sharma, Gajendra
Year: 2019
Available at: GUtech Library.
- Investigating the cyber breach : the digital forensics guide for the network engineer / Muniz, Joseph Investigating the cyber breach : the digital forensics guide for the network engineer /QA76.9.M86 2019 26 -
Title: Investigating the cyber breach : the digital forensics guide for the network engineer /
Author: Muniz, Joseph
Year:
Available at: GUtech Library.
- Gray hat hacking : the ethical hacker's handbook / Harper, Allen Gray hat hacking : the ethical hacker's handbook /QA76.9.A25 H37 2018 27 -
Title: Gray hat hacking : the ethical hacker's handbook /
Author: Harper, Allen
Year:
Available at: GUtech Library.
- Multilevel security for relational databases. Faragallah, Osama S. Multilevel security for relational databases.QA76.9.D314 F37 2015 28 -
Title: Multilevel security for relational databases.
Author: Faragallah, Osama S.
Year: 2015
Available at: GUtech Library.
- Cryptography and network security. Chaudhary, Vikas Cryptography and network security.QA76.9.A25 C43 2020 29 -
Title: Cryptography and network security.
Author: Chaudhary, Vikas
Year: 2011
Available at: GUtech Library.
- Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Goutam, Rajesh Kumar Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.QA76.9.A25 G68 2021 30 -
Title: Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author: Goutam, Rajesh Kumar
Year: 2021
No Items currently Available.
- Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps. Shaikh, Shahid Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.QA76.9.S53.2021 31 -
Title: Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author: Shaikh, Shahid
Year: 2021
Available at: GUtech Library.
- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 32 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 33 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 35 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 36 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 38 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 39 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 40 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 41 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
No Items currently Available.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 42 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments Gunawardana, Kushantha An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governmentsQA76.9.M65 G86 2022 43 -
Title: An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author: Gunawardana, Kushantha
Year: 2022
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 44 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- All-in-one CISSP exam guide Maymí, Fernando All-in-one CISSP exam guideQA76.9.A25 M33 2022 45 -
Title: All-in-one CISSP exam guide
Author: Maymí, Fernando
Year: 2022
Available at: GUtech Library.
- Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Oettinger, William Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceQA76.9.A25 O38 2022 46 -
Title: Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author: Oettinger, William
Year: 2022
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 47 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- Beginning Windows Phone 7 development Lee, Henry Beginning Windows Phone 7 developmentQA76.59.L44 2010 48 -
Title: Beginning Windows Phone 7 development
Author: Lee, Henry
Year: 2010
Available at: GUtech Library.
- Usborne lift-the-flap computers and coding Usborne lift-the-flap computers and codingQA76.63.U83 2015 49 -
Title: Usborne lift-the-flap computers and coding
Author:
Year: 2015
Available at: Finland Oman School Library.
- An introduction to programming and object-oriented design using Java Niño, J. An introduction to programming and object-oriented design using JavaQA76.64.N566 2008 50 -
Title: An introduction to programming and object-oriented design using Java
Author: Niño, J.
Year: 2008
Available at: GUtech Library.