Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Member Services
.
Purchase Suggestion
.
Exit Webopac
.
Search Menu
Simple Search
.
Advanced Search
.
Clear Search Sets
.
Refine Search Results
.
.
FOS Childrens Library
.
New Items Search
.
Bottom Menu
Help
About
.
Map
.
Exit Webopac
.
Languages
English
.
German
.
New Items Menu
New Items Search
.
New Items List
.
.................................
EBOOK CENTRAL
.
SCIENCE DIRECT (BUSINESS)
.
MASADER
.
UNWTO
.
SCOPUS
.
E-JOURNALS
.
DATABASE INFO. SYSTEM (DBIS)
.
LIBRARY WEBSITE
.
© LIBERO v6.4.1sp211215
Page content
You are here
:
Browse Shelf
Browse Shelf
-
Previous Shelf
Top
Next Shelf
Top
-
-
Computer architecture: a quantitative approach.
Hennessy, John L.
QA76.9.A73 .P377 2007.
1
-
Title:
Computer architecture: a quantitative approach.
Author:
Hennessy, John L.
Year:
2007
Available at:
GUtech Library
.
-
Network security and cryptography
Sehgal, Umesh
QA76.9.A25 S44 2020
2
-
Title:
Network security and cryptography
Author:
Sehgal, Umesh
Year:
Available at:
GUtech Library
.
-
Cyber security
Pandey, O.N.
QA76.9.A25 P36 2019
3
-
Title:
Cyber security
Author:
Pandey, O.N.
Year:
Available at:
GUtech Library
.
-
Network security
Pandey, O.N.
QA76.9.A25 P36 2020
4
-
Title:
Network security
Author:
Pandey, O.N.
Year:
2020
Available at:
GUtech Library
.
-
Data protection: ensuring data availability
De Guise, Petron
QA76.9.A25 G85 2017
5
-
Title:
Data protection: ensuring data availability
Author:
De Guise, Petron
Year:
2017
Available at:
GUtech Library
.
-
Cyber security. Simply. Make it happen: leveraging digitization through IT security
Abolhassan, Ferri ...
QA76.9.A25 C93 2017
6
-
Title:
Cyber security. Simply. Make it happen: leveraging digitization through IT security
Author:
Abolhassan, Ferri ...
Year:
2017
Available at:
GUtech Library
.
-
Cyber security for cyber physical systems: leveraging digitization through IT security
Ali, Saqib...
QA76.9.A25 A45 2018
7
-
Title:
Cyber security for cyber physical systems: leveraging digitization through IT security
Author:
Ali, Saqib...
Year:
2018
Available at:
GUtech Library
.
-
Big data analytics and cybersecurity
Savas, Onur...
QA76.9.A25 S28 2017
8
-
Title:
Big data analytics and cybersecurity
Author:
Savas, Onur...
Year:
2017
Available at:
GUtech Library
.
-
Data mining and data warehousing
Kumar, Sachin
QA76.9.D34.K86 2020
9
-
Title:
Data mining and data warehousing
Author:
Kumar, Sachin
Year:
2020
Available at:
GUtech Library
.
-
PC maintenance and troubleshooting guide: Subtitle
Bhatnagar, Ashish
QA76.9.A73 B43 2019
10
-
Title:
PC maintenance and troubleshooting guide: Subtitle
Author:
Bhatnagar, Ashish
Year:
2019
Available at:
GUtech Library
.
-
System forensics, investigation, and response: A guide for law enforcement
Easttom, Chuck
QA76.9.A25 E27 2019
11
-
Title:
System forensics, investigation, and response: A guide for law enforcement
Author:
Easttom, Chuck
Year:
2019
Available at:
GUtech Library
.
-
The data warehouse mentor: practical data warehouse and business intelligence insights
Laberge, Robert
QA76.9.D37.L33 2011
12
-
Title:
The data warehouse mentor: practical data warehouse and business intelligence insights
Author:
Laberge, Robert
Year:
2011
Available at:
GUtech Library
.
-
Machine learning and security: protecting systems with data and algorithms
Chio, Clarence
QA76.9.A25 C45 2018
13
-
Title:
Machine learning and security: protecting systems with data and algorithms
Author:
Chio, Clarence
Year:
2018
Available at:
GUtech Library
.
-
Computer system architecture
Mano, M. Morris
QA76.9.M36 2017
14
-
Title:
Computer system architecture
Author:
Mano, M. Morris
Year:
2017
Available at:
GUtech Library
.
-
Fundamentals of information systems security
Kim, David
QA76.9.A25 K56 2018
15
-
Title:
Fundamentals of information systems security
Author:
Kim, David
Year:
2018
Available at:
GUtech Library
.
-
Data mining, data warehousing and Olap
Sharma, Gajendra
QA76.9.D34.S53 2019
16
-
Title:
Data mining, data warehousing and Olap
Author:
Sharma, Gajendra
Year:
2019
Available at:
GUtech Library
.
-
Investigating the cyber breach : the digital forensics guide for the network engineer /
Muniz, Joseph
QA76.9.M86 2019
17
-
Title:
Investigating the cyber breach : the digital forensics guide for the network engineer /
Author:
Muniz, Joseph
Year:
Available at:
GUtech Library
.
-
Gray hat hacking : the ethical hacker's handbook /
Harper, Allen
QA76.9.A25 H37 2018
18
-
Title:
Gray hat hacking : the ethical hacker's handbook /
Author:
Harper, Allen
Year:
Available at:
GUtech Library
.
-
Multilevel security for relational databases.
Faragallah, Osama S.
QA76.9.D314 F37 2015
19
-
Title:
Multilevel security for relational databases.
Author:
Faragallah, Osama S.
Year:
2015
Available at:
GUtech Library
.
-
Cryptography and network security.
Chaudhary, Vikas
QA76.9.A25 C43 2020
20
-
Title:
Cryptography and network security.
Author:
Chaudhary, Vikas
Year:
2011
Available at:
GUtech Library
.
-
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Goutam, Rajesh Kumar
QA76.9.A25 G68 2021
21
-
Title:
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author:
Goutam, Rajesh Kumar
Year:
2021
Available at:
GUtech Library
.
-
Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Shaikh, Shahid
QA76.9.S53.2021
22
-
Title:
Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author:
Shaikh, Shahid
Year:
2021
Available at:
GUtech Library
.
-
Guide to computer forensics and investigations: processing digital evidence
Nelson, Bill
QA76.9.A25 H45 2018
23
-
Title:
Guide to computer forensics and investigations: processing digital evidence
Author:
Nelson, Bill
Year:
2018
Available at:
GUtech Library
.
-
Modern systems analysis and design
Valacich, Joseph S.
QA76.9.S88.V35 2021
24
-
Title:
Modern systems analysis and design
Author:
Valacich, Joseph S.
Year:
2021
Available at:
GUtech Library
.
-
How to measure anything in cybersecurity risk
Hubbard, Douglas W.
QA76.9.A25 H83 2023
26
-
Title:
How to measure anything in cybersecurity risk
Author:
Hubbard, Douglas W.
Year:
2023
Available at:
GUtech Library
.
-
CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Conklin, Wm. Arthur
QA76.9.A25.C66 2021
27
-
Title:
CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author:
Conklin, Wm. Arthur
Year:
2021
Available at:
GUtech Library
.
-
Wireless and mobile device security
Doherty Jim
QA76.9.A25 D64 2022
29
-
Title:
Wireless and mobile device security
Author:
Doherty Jim
Year:
2022
Available at:
GUtech Library
.
-
CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Everett, Travis A.
QA76.9.A25.E94 2023
30
-
Title:
CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author:
Everett, Travis A.
Year:
2023
Available at:
GUtech Library
.
-
The Official (ISC)2 CISSP CBK Reference
Deane, Arthur
QA76.9.A25.D43 2021
31
-
Title:
The Official (ISC)2 CISSP CBK Reference
Author:
Deane, Arthur
Year:
2021
Available at:
GUtech Library
.
-
Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Meredith, Dale
QA76.9.A25 M47 2022
32
-
Title:
Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author:
Meredith, Dale
Year:
2022
Available at:
GUtech Library
.
-
How to measure anything in cybersecurity risk
Hubbard, Douglas W.
QA76.9.A25 H83 2023
33
-
Title:
How to measure anything in cybersecurity risk
Author:
Hubbard, Douglas W.
Year:
2023
Available at:
GUtech Library
.
-
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Gunawardana, Kushantha
QA76.9.M65 G86 2022
34
-
Title:
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author:
Gunawardana, Kushantha
Year:
2022
Available at:
GUtech Library
.
-
Wireless and mobile device security
Doherty Jim
QA76.9.A25 D64 2022
35
-
Title:
Wireless and mobile device security
Author:
Doherty Jim
Year:
2022
Available at:
GUtech Library
.
-
All-in-one CISSP exam guide
Maymí, Fernando
QA76.9.A25 M33 2022
36
-
Title:
All-in-one CISSP exam guide
Author:
Maymí, Fernando
Year:
2022
Available at:
GUtech Library
.
-
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Oettinger, William
QA76.9.A25 O38 2022
37
-
Title:
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author:
Oettinger, William
Year:
2022
Available at:
GUtech Library
.
-
How to measure anything in cybersecurity risk
Hubbard, Douglas W.
QA76.9.A25 H83 2023
38
-
Title:
How to measure anything in cybersecurity risk
Author:
Hubbard, Douglas W.
Year:
2023
Available at:
GUtech Library
.
-
Beginning Windows Phone 7 development
Lee, Henry
QA76.59.L44 2010
39
-
Title:
Beginning Windows Phone 7 development
Author:
Lee, Henry
Year:
2010
Available at:
GUtech Library
.
-
Usborne lift-the-flap computers and coding
QA76.63.U83 2015
40
-
Title:
Usborne lift-the-flap computers and coding
Author:
Year:
2015
Available at:
Finland Oman School Library
.
-
An introduction to programming and object-oriented design using Java
Niño, J.
QA76.64.N566 2008
41
-
Title:
An introduction to programming and object-oriented design using Java
Author:
Niño, J.
Year:
2008
Available at:
GUtech Library
.
-
A comprehensive introduction to object-oriented programming with Java
Wu, Thomas C.
QA76.64.W8 2008
42
-
Title:
A comprehensive introduction to object-oriented programming with Java
Author:
Wu, Thomas C.
Year:
2008
Available at:
GUtech Library
.
-
Object-oriented data structures using Java /
Dale, Nell
QA76.64.D35 2018
43
-
Title:
Object-oriented data structures using Java /
Author:
Dale, Nell
Year:
2018
Available at:
GUtech Library
.
-
44
-
LIBERO Error
Sorry, LIBERO has encountered an error
Please contact LIBERO Support with the following information if errors continue:
A run-time error occurred while executing the page
Error:
<SUBSCRIPT>StarRating+3^VLEReviewsRatings ^BGUTwop("Review","")
ErrorNo:
5002
CSP Page:
/libero/WebOpac.cls
Namespace:
LIBERO
Class:
User.WebOpac
Routine:
VLEReviewsRatings
Location:
StarRating+3