Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Data mining, data warehousing and Olap Sharma, Gajendra Data mining, data warehousing and OlapQA76.9.D34.S53 2019 1 -
Title: Data mining, data warehousing and Olap
Author: Sharma, Gajendra
Year: 2019
Available at: GUtech Library.
- Investigating the cyber breach : the digital forensics guide for the network engineer / Muniz, Joseph Investigating the cyber breach : the digital forensics guide for the network engineer /QA76.9.M86 2019 2 -
Title: Investigating the cyber breach : the digital forensics guide for the network engineer /
Author: Muniz, Joseph
Year:
Available at: GUtech Library.
- Gray hat hacking : the ethical hacker's handbook / Harper, Allen Gray hat hacking : the ethical hacker's handbook /QA76.9.A25 H37 2018 3 -
Title: Gray hat hacking : the ethical hacker's handbook /
Author: Harper, Allen
Year:
Available at: GUtech Library.
- Multilevel security for relational databases. Faragallah, Osama S. Multilevel security for relational databases.QA76.9.D314 F37 2015 4 -
Title: Multilevel security for relational databases.
Author: Faragallah, Osama S.
Year: 2015
Available at: GUtech Library.
- Cryptography and network security. Chaudhary, Vikas Cryptography and network security.QA76.9.A25 C43 2020 5 -
Title: Cryptography and network security.
Author: Chaudhary, Vikas
Year: 2011
Available at: GUtech Library.
- Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Goutam, Rajesh Kumar Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.QA76.9.A25 G68 2021 6 -
Title: Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author: Goutam, Rajesh Kumar
Year: 2021
No Items currently Available.
- Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps. Shaikh, Shahid Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.QA76.9.S53.2021 7 -
Title: Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author: Shaikh, Shahid
Year: 2021
Available at: GUtech Library.
- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 8 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 9 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 11 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 12 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 14 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 15 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 16 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 17 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
No Items currently Available.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 18 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments Gunawardana, Kushantha An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governmentsQA76.9.M65 G86 2022 19 -
Title: An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author: Gunawardana, Kushantha
Year: 2022
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 20 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- All-in-one CISSP exam guide Maymí, Fernando All-in-one CISSP exam guideQA76.9.A25 M33 2022 21 -
Title: All-in-one CISSP exam guide
Author: Maymí, Fernando
Year: 2022
Available at: GUtech Library.
- Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Oettinger, William Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceQA76.9.A25 O38 2022 22 -
Title: Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author: Oettinger, William
Year: 2022
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 23 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- Beginning Windows Phone 7 development Lee, Henry Beginning Windows Phone 7 developmentQA76.59.L44 2010 24 -
Title: Beginning Windows Phone 7 development
Author: Lee, Henry
Year: 2010
Available at: GUtech Library.
- Usborne lift-the-flap computers and coding Usborne lift-the-flap computers and codingQA76.63.U83 2015 25 -
Title: Usborne lift-the-flap computers and coding
Author:
Year: 2015
Available at: Finland Oman School Library.
- An introduction to programming and object-oriented design using Java Niño, J. An introduction to programming and object-oriented design using JavaQA76.64.N566 2008 26 -
Title: An introduction to programming and object-oriented design using Java
Author: Niño, J.
Year: 2008
Available at: GUtech Library.
- A comprehensive introduction to object-oriented programming with Java Wu, Thomas C. A comprehensive introduction to object-oriented programming with JavaQA76.64.W8 2008 27 -
Title: A comprehensive introduction to object-oriented programming with Java
Author: Wu, Thomas C.
Year: 2008
Available at: GUtech Library.
- Object-oriented data structures using Java / Dale, Nell Object-oriented data structures using Java /QA76.64.D35 2018 28 -
Title: Object-oriented data structures using Java /
Author: Dale, Nell
Year: 2018
Available at: GUtech Library.
- 29 -
LIBERO Error

Sorry, LIBERO has encountered an error

Please contact LIBERO Support with the following information if errors continue:

A run-time error occurred while executing the page

Error: <SUBSCRIPT>StarRating+3^VLEReviewsRatings ^BGUTwop("Review","")
ErrorNo: 5002
CSP Page: /libero/WebOpac.cls
Namespace: LIBERO
Class: User.WebOpac
Routine: VLEReviewsRatings
Location: StarRating+3