Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Data protection: ensuring data availability De Guise, Petron Data protection: ensuring data availabilityQA76.9.A25 G85 2017 1 -
Title: Data protection: ensuring data availability
Author: De Guise, Petron
Year: 2017
Available at: GUtech Library.
- Cyber security. Simply. Make it happen: leveraging digitization through IT security Abolhassan, Ferri ... Cyber security. Simply. Make it happen: leveraging digitization through IT securityQA76.9.A25 C93 2017 2 -
Title: Cyber security. Simply. Make it happen: leveraging digitization through IT security
Author: Abolhassan, Ferri ...
Year: 2017
Available at: GUtech Library.
- Cyber security for cyber physical systems: leveraging digitization through IT security Ali, Saqib... Cyber security for cyber physical systems: leveraging digitization through IT securityQA76.9.A25 A45 2018 3 -
Title: Cyber security for cyber physical systems: leveraging digitization through IT security
Author: Ali, Saqib...
Year: 2018
Available at: GUtech Library.
- Big data analytics and cybersecurity Savas, Onur... Big data analytics and cybersecurityQA76.9.A25 S28 2017 4 -
Title: Big data analytics and cybersecurity
Author: Savas, Onur...
Year: 2017
Available at: GUtech Library.
- Data mining and data warehousing Kumar, Sachin Data mining and data warehousingQA76.9.D34.K86 2020 5 -
Title: Data mining and data warehousing
Author: Kumar, Sachin
Year: 2020
Available at: GUtech Library.
- PC maintenance and troubleshooting guide: Subtitle Bhatnagar, Ashish PC maintenance and troubleshooting guide: SubtitleQA76.9.A73 B43 2019 6 -
Title: PC maintenance and troubleshooting guide: Subtitle
Author: Bhatnagar, Ashish
Year: 2019
Available at: GUtech Library.
- System forensics, investigation, and response: A guide for law enforcement Easttom, Chuck System forensics, investigation, and response: A guide for law enforcementQA76.9.A25 E27 2019 7 -
Title: System forensics, investigation, and response: A guide for law enforcement
Author: Easttom, Chuck
Year: 2019
Available at: GUtech Library.
- The data warehouse mentor: practical data warehouse and business intelligence insights Laberge, Robert The data warehouse mentor: practical data warehouse and business intelligence insightsQA76.9.D37.L33 2011 8 -
Title: The data warehouse mentor: practical data warehouse and business intelligence insights
Author: Laberge, Robert
Year: 2011
Available at: GUtech Library.
- Machine learning and security: protecting systems with data and algorithms Chio, Clarence Machine learning and security: protecting systems with data and algorithmsQA76.9.A25 C45 2018 9 -
Title: Machine learning and security: protecting systems with data and algorithms
Author: Chio, Clarence
Year: 2018
Available at: GUtech Library.
- Computer system architecture Mano, M. Morris Computer system architectureQA76.9.M36 2017 10 -
Title: Computer system architecture
Author: Mano, M. Morris
Year: 2017
Available at: GUtech Library.
- Fundamentals of information systems security Kim, David Fundamentals of information systems securityQA76.9.A25 K56 2018 11 -
Title: Fundamentals of information systems security
Author: Kim, David
Year: 2018
Available at: GUtech Library.
- Data mining, data warehousing and Olap Sharma, Gajendra Data mining, data warehousing and OlapQA76.9.D34.S53 2019 12 -
Title: Data mining, data warehousing and Olap
Author: Sharma, Gajendra
Year: 2019
Available at: GUtech Library.
- Investigating the cyber breach : the digital forensics guide for the network engineer / Muniz, Joseph Investigating the cyber breach : the digital forensics guide for the network engineer /QA76.9.M86 2019 13 -
Title: Investigating the cyber breach : the digital forensics guide for the network engineer /
Author: Muniz, Joseph
Year:
Available at: GUtech Library.
- Gray hat hacking : the ethical hacker's handbook / Harper, Allen Gray hat hacking : the ethical hacker's handbook /QA76.9.A25 H37 2018 14 -
Title: Gray hat hacking : the ethical hacker's handbook /
Author: Harper, Allen
Year:
Available at: GUtech Library.
- Multilevel security for relational databases. Faragallah, Osama S. Multilevel security for relational databases.QA76.9.D314 F37 2015 15 -
Title: Multilevel security for relational databases.
Author: Faragallah, Osama S.
Year: 2015
Available at: GUtech Library.
- Cryptography and network security. Chaudhary, Vikas Cryptography and network security.QA76.9.A25 C43 2020 16 -
Title: Cryptography and network security.
Author: Chaudhary, Vikas
Year: 2011
Available at: GUtech Library.
- Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Goutam, Rajesh Kumar Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.QA76.9.A25 G68 2021 17 -
Title: Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author: Goutam, Rajesh Kumar
Year: 2021
No Items currently Available.
- Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps. Shaikh, Shahid Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.QA76.9.S53.2021 18 -
Title: Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author: Shaikh, Shahid
Year: 2021
Available at: GUtech Library.
- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 19 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 20 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 22 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 23 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 25 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 26 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 27 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 28 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
No Items currently Available.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 29 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments Gunawardana, Kushantha An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governmentsQA76.9.M65 G86 2022 30 -
Title: An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author: Gunawardana, Kushantha
Year: 2022
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 31 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- All-in-one CISSP exam guide Maymí, Fernando All-in-one CISSP exam guideQA76.9.A25 M33 2022 32 -
Title: All-in-one CISSP exam guide
Author: Maymí, Fernando
Year: 2022
Available at: GUtech Library.
- Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Oettinger, William Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceQA76.9.A25 O38 2022 33 -
Title: Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author: Oettinger, William
Year: 2022
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 34 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- Beginning Windows Phone 7 development Lee, Henry Beginning Windows Phone 7 developmentQA76.59.L44 2010 35 -
Title: Beginning Windows Phone 7 development
Author: Lee, Henry
Year: 2010
Available at: GUtech Library.
- Usborne lift-the-flap computers and coding Usborne lift-the-flap computers and codingQA76.63.U83 2015 36 -
Title: Usborne lift-the-flap computers and coding
Author:
Year: 2015
Available at: Finland Oman School Library.
- An introduction to programming and object-oriented design using Java Niño, J. An introduction to programming and object-oriented design using JavaQA76.64.N566 2008 37 -
Title: An introduction to programming and object-oriented design using Java
Author: Niño, J.
Year: 2008
Available at: GUtech Library.
- A comprehensive introduction to object-oriented programming with Java Wu, Thomas C. A comprehensive introduction to object-oriented programming with JavaQA76.64.W8 2008 38 -
Title: A comprehensive introduction to object-oriented programming with Java
Author: Wu, Thomas C.
Year: 2008
Available at: GUtech Library.
- Object-oriented data structures using Java / Dale, Nell Object-oriented data structures using Java /QA76.64.D35 2018 39 -
Title: Object-oriented data structures using Java /
Author: Dale, Nell
Year: 2018
Available at: GUtech Library.
- 40 -
LIBERO Error

Sorry, LIBERO has encountered an error

Please contact LIBERO Support with the following information if errors continue:

A run-time error occurred while executing the page

Error: <SUBSCRIPT>StarRating+3^VLEReviewsRatings ^BGUTwop("Review","")
ErrorNo: 5002
CSP Page: /libero/WebOpac.cls
Namespace: LIBERO
Class: User.WebOpac
Routine: VLEReviewsRatings
Location: StarRating+3