Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Computer architecture: a quantitative approach / Hennessy, John L. Computer architecture: a quantitative approach /QA76.9.A73.P37 2007 1 -
Title: Computer architecture: a quantitative approach /
Author: Hennessy, John L.
Year: 2012
Available at: GUtech Library.
- The data warehouse toolkit: the definitive guide to dimensional modeling / Kimball, Ralph The data warehouse toolkit: the definitive guide to dimensional modeling /QA76.9.D37.K56 2013 2 -
Title: The data warehouse toolkit: the definitive guide to dimensional modeling /
Author: Kimball, Ralph
Year: 2013
Available at: GUtech Library.
- Embedded systems: a contemporary design tool Peckol, James K. Embedded systems: a contemporary design toolQA76.9.S88 P43 2008 3 -
Title: Embedded systems: a contemporary design tool
Author: Peckol, James K.
Year: 2008
Available at: GUtech Library.
- Fuzzy modelling: paradigms and practice Pedrycz, Witold Fuzzy modelling: paradigms and practiceQA76.9.S88.F89 1996 4 -
Title: Fuzzy modelling: paradigms and practice
Author: Pedrycz, Witold
Year: 1996
Available at: GUtech Library.
- Cyber-physical system design with sensor networking technologies: Edited by Sherali Zeadally and Nafaa Jabeur Zeadally, Sherai Cyber-physical system design with sensor networking technologies: Edited by Sherali Zeadally and Nafaa JabeurQA76.9.S88 C93 2016 5 -
Title: Cyber-physical system design with sensor networking technologies: Edited by Sherali Zeadally and Nafaa Jabeur
Author: Zeadally, Sherai
Year: 2016
Available at: GUtech Library.
- What is a database and how do I use it?. Anniss, Matt What is a database and how do I use it?.QA76.9.D32.A56 2014 6 -
Title: What is a database and how do I use it?.
Author: Anniss, Matt
Year:
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2017 7 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2017
Available at: GUtech Library.
- Systems analysis and design Kendall, Kenneth E. Systems analysis and designQA76.9.S88.K46 2016 8 -
Title: Systems analysis and design
Author: Kendall, Kenneth E.
Year: 2016
Available at: GUtech Library.
- System analysis and design Tilley, Scott System analysis and designQA76.9.T55 2014 9 -
Title: System analysis and design
Author: Tilley, Scott
Year: 2016
Available at: GUtech Library.
- Computer and network security essentials Daimi, Kevin... Computer and network security essentialsQA76.9.A25 D35 2017 10 -
Title: Computer and network security essentials
Author: Daimi, Kevin...
Year: 2017
Available at: GUtech Library.
- Algorithms Sedgewick, Robert AlgorithmsQA76.9.A43.S43 2011 11 -
Title: Algorithms
Author: Sedgewick, Robert
Year: 2011
No Items currently Available.
- CompTIA security+ all-in-one exam guide, (Exam SY0-501) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-501)QA76.9.A25.C66 2018 12 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-501)
Author: Conklin, Wm. Arthur
Year: 2018
Available at: GUtech Library.
- Data modeling essentials Simsion, Graeme C. Data modeling essentialsQA76.9.D26.S56 2005 14 -
Title: Data modeling essentials
Author: Simsion, Graeme C.
Year: 2005
Available at: GUtech Library.
- Investigations involving the Internet and computer networks: NIJ Special report Investigations involving the Internet and computer networks: NIJ Special reportQA76.9.I58 2007 15 -
Title: Investigations involving the Internet and computer networks: NIJ Special report
Author:
Year: 2007
Available at: GUtech Library.
- Forensics examination of digital evidence: A guide for law enforcement Forensics examination of digital evidence: A guide for law enforcementQA76.9.A25 I58 2004 17 -
Title: Forensics examination of digital evidence: A guide for law enforcement
Author:
Year: 2004
Available at: GUtech Library.
- Computer architecture: a quantitative approach. Hennessy, John L. Computer architecture: a quantitative approach.QA76.9.A73 .P377 2007. 19 -
Title: Computer architecture: a quantitative approach.
Author: Hennessy, John L.
Year: 2007
Available at: GUtech Library.
- Network security and cryptography Sehgal, Umesh Network security and cryptographyQA76.9.A25 S44 2020 20 -
Title: Network security and cryptography
Author: Sehgal, Umesh
Year:
Available at: GUtech Library.
- Cyber security Pandey, O.N. Cyber securityQA76.9.A25 P36 2019 21 -
Title: Cyber security
Author: Pandey, O.N.
Year:
Available at: GUtech Library.
- Network security Pandey, O.N. Network securityQA76.9.A25 P36 2020 22 -
Title: Network security
Author: Pandey, O.N.
Year: 2020
Available at: GUtech Library.
- Data protection: ensuring data availability De Guise, Petron Data protection: ensuring data availabilityQA76.9.A25 G85 2017 23 -
Title: Data protection: ensuring data availability
Author: De Guise, Petron
Year: 2017
Available at: GUtech Library.
- Cyber security. Simply. Make it happen: leveraging digitization through IT security Abolhassan, Ferri ... Cyber security. Simply. Make it happen: leveraging digitization through IT securityQA76.9.A25 C93 2017 24 -
Title: Cyber security. Simply. Make it happen: leveraging digitization through IT security
Author: Abolhassan, Ferri ...
Year: 2017
Available at: GUtech Library.
- Cyber security for cyber physical systems: leveraging digitization through IT security Ali, Saqib... Cyber security for cyber physical systems: leveraging digitization through IT securityQA76.9.A25 A45 2018 25 -
Title: Cyber security for cyber physical systems: leveraging digitization through IT security
Author: Ali, Saqib...
Year: 2018
Available at: GUtech Library.
- Big data analytics and cybersecurity Savas, Onur... Big data analytics and cybersecurityQA76.9.A25 S28 2017 26 -
Title: Big data analytics and cybersecurity
Author: Savas, Onur...
Year: 2017
Available at: GUtech Library.
- Data mining and data warehousing Kumar, Sachin Data mining and data warehousingQA76.9.D34.K86 2020 27 -
Title: Data mining and data warehousing
Author: Kumar, Sachin
Year: 2020
Available at: GUtech Library.
- PC maintenance and troubleshooting guide: Subtitle Bhatnagar, Ashish PC maintenance and troubleshooting guide: SubtitleQA76.9.A73 B43 2019 28 -
Title: PC maintenance and troubleshooting guide: Subtitle
Author: Bhatnagar, Ashish
Year: 2019
Available at: GUtech Library.
- System forensics, investigation, and response: A guide for law enforcement Easttom, Chuck System forensics, investigation, and response: A guide for law enforcementQA76.9.A25 E27 2019 29 -
Title: System forensics, investigation, and response: A guide for law enforcement
Author: Easttom, Chuck
Year: 2019
Available at: GUtech Library.
- The data warehouse mentor: practical data warehouse and business intelligence insights Laberge, Robert The data warehouse mentor: practical data warehouse and business intelligence insightsQA76.9.D37.L33 2011 30 -
Title: The data warehouse mentor: practical data warehouse and business intelligence insights
Author: Laberge, Robert
Year: 2011
Available at: GUtech Library.
- Machine learning and security: protecting systems with data and algorithms Chio, Clarence Machine learning and security: protecting systems with data and algorithmsQA76.9.A25 C45 2018 31 -
Title: Machine learning and security: protecting systems with data and algorithms
Author: Chio, Clarence
Year: 2018
Available at: GUtech Library.
- Computer system architecture Mano, M. Morris Computer system architectureQA76.9.M36 2017 32 -
Title: Computer system architecture
Author: Mano, M. Morris
Year: 2017
Available at: GUtech Library.
- Fundamentals of information systems security Kim, David Fundamentals of information systems securityQA76.9.A25 K56 2018 33 -
Title: Fundamentals of information systems security
Author: Kim, David
Year: 2018
Available at: GUtech Library.
- Data mining, data warehousing and Olap Sharma, Gajendra Data mining, data warehousing and OlapQA76.9.D34.S53 2019 34 -
Title: Data mining, data warehousing and Olap
Author: Sharma, Gajendra
Year: 2019
Available at: GUtech Library.
- Investigating the cyber breach : the digital forensics guide for the network engineer / Muniz, Joseph Investigating the cyber breach : the digital forensics guide for the network engineer /QA76.9.M86 2019 35 -
Title: Investigating the cyber breach : the digital forensics guide for the network engineer /
Author: Muniz, Joseph
Year:
Available at: GUtech Library.
- Gray hat hacking : the ethical hacker's handbook / Harper, Allen Gray hat hacking : the ethical hacker's handbook /QA76.9.A25 H37 2018 36 -
Title: Gray hat hacking : the ethical hacker's handbook /
Author: Harper, Allen
Year:
Available at: GUtech Library.
- Multilevel security for relational databases. Faragallah, Osama S. Multilevel security for relational databases.QA76.9.D314 F37 2015 37 -
Title: Multilevel security for relational databases.
Author: Faragallah, Osama S.
Year: 2015
Available at: GUtech Library.
- Cryptography and network security. Chaudhary, Vikas Cryptography and network security.QA76.9.A25 C43 2020 38 -
Title: Cryptography and network security.
Author: Chaudhary, Vikas
Year: 2011
Available at: GUtech Library.
- Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Goutam, Rajesh Kumar Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.QA76.9.A25 G68 2021 39 -
Title: Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author: Goutam, Rajesh Kumar
Year: 2021
No Items currently Available.
- Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps. Shaikh, Shahid Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.QA76.9.S53.2021 40 -
Title: Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author: Shaikh, Shahid
Year: 2021
Available at: GUtech Library.
- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 41 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 42 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 44 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 45 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 47 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 48 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 49 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 50 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
Available at: GUtech Library.