Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Member Services
.
Purchase Suggestion
.
Exit Webopac
.
Search Menu
Simple Search
.
Advanced Search
.
Clear Search Sets
.
Refine Search Results
.
.
FOS Childrens Library
.
New Items Search
.
Bottom Menu
Help
About
.
Map
.
Exit Webopac
.
Languages
English
.
German
.
New Items Menu
New Items Search
.
New Items List
.
.................................
EBOOK CENTRAL
.
SCIENCE DIRECT (BUSINESS)
.
MASADER
.
UNWTO
.
SCOPUS
.
E-JOURNALS
.
DATABASE INFO. SYSTEM (DBIS)
.
LIBRARY WEBSITE
.
© LIBERO v6.4.1sp211215
Page content
You are here
:
Browse Shelf
Browse Shelf
-
Previous Shelf
Top
Next Shelf
Top
-
-
Computer architecture: a quantitative approach /
Hennessy, John L.
QA76.9.A73.P37 2007
1
-
Title:
Computer architecture: a quantitative approach /
Author:
Hennessy, John L.
Year:
2012
Available at:
GUtech Library
.
-
The data warehouse toolkit: the definitive guide to dimensional modeling /
Kimball, Ralph
QA76.9.D37.K56 2013
2
-
Title:
The data warehouse toolkit: the definitive guide to dimensional modeling /
Author:
Kimball, Ralph
Year:
2013
Available at:
GUtech Library
.
-
Embedded systems: a contemporary design tool
Peckol, James K.
QA76.9.S88 P43 2008
3
-
Title:
Embedded systems: a contemporary design tool
Author:
Peckol, James K.
Year:
2008
Available at:
GUtech Library
.
-
Fuzzy modelling: paradigms and practice
Pedrycz, Witold
QA76.9.S88.F89 1996
4
-
Title:
Fuzzy modelling: paradigms and practice
Author:
Pedrycz, Witold
Year:
1996
Available at:
GUtech Library
.
-
Cyber-physical system design with sensor networking technologies: Edited by Sherali Zeadally and Nafaa Jabeur
Zeadally, Sherai
QA76.9.S88 C93 2016
5
-
Title:
Cyber-physical system design with sensor networking technologies: Edited by Sherali Zeadally and Nafaa Jabeur
Author:
Zeadally, Sherai
Year:
2016
Available at:
GUtech Library
.
-
What is a database and how do I use it?.
Anniss, Matt
QA76.9.D32.A56 2014
6
-
Title:
What is a database and how do I use it?.
Author:
Anniss, Matt
Year:
Available at:
GUtech Library
.
-
Modern systems analysis and design
Valacich, Joseph S.
QA76.9.S88.V35 2017
7
-
Title:
Modern systems analysis and design
Author:
Valacich, Joseph S.
Year:
2017
Available at:
GUtech Library
.
-
Systems analysis and design
Kendall, Kenneth E.
QA76.9.S88.K46 2016
8
-
Title:
Systems analysis and design
Author:
Kendall, Kenneth E.
Year:
2016
Available at:
GUtech Library
.
-
System analysis and design
Tilley, Scott
QA76.9.T55 2014
9
-
Title:
System analysis and design
Author:
Tilley, Scott
Year:
2016
Available at:
GUtech Library
.
-
Computer and network security essentials
Daimi, Kevin...
QA76.9.A25 D35 2017
10
-
Title:
Computer and network security essentials
Author:
Daimi, Kevin...
Year:
2017
Available at:
GUtech Library
.
-
Algorithms
Sedgewick, Robert
QA76.9.A43.S43 2011
11
-
Title:
Algorithms
Author:
Sedgewick, Robert
Year:
2011
No Items currently Available
.
-
CompTIA security+ all-in-one exam guide, (Exam SY0-501)
Conklin, Wm. Arthur
QA76.9.A25.C66 2018
12
-
Title:
CompTIA security+ all-in-one exam guide, (Exam SY0-501)
Author:
Conklin, Wm. Arthur
Year:
2018
Available at:
GUtech Library
.
-
Data modeling essentials
Simsion, Graeme C.
QA76.9.D26.S56 2005
14
-
Title:
Data modeling essentials
Author:
Simsion, Graeme C.
Year:
2005
Available at:
GUtech Library
.
-
Investigations involving the Internet and computer networks: NIJ Special report
QA76.9.I58 2007
15
-
Title:
Investigations involving the Internet and computer networks: NIJ Special report
Author:
Year:
2007
Available at:
GUtech Library
.
-
Forensics examination of digital evidence: A guide for law enforcement
QA76.9.A25 I58 2004
17
-
Title:
Forensics examination of digital evidence: A guide for law enforcement
Author:
Year:
2004
Available at:
GUtech Library
.
-
Computer architecture: a quantitative approach.
Hennessy, John L.
QA76.9.A73 .P377 2007.
19
-
Title:
Computer architecture: a quantitative approach.
Author:
Hennessy, John L.
Year:
2007
Available at:
GUtech Library
.
-
Network security and cryptography
Sehgal, Umesh
QA76.9.A25 S44 2020
20
-
Title:
Network security and cryptography
Author:
Sehgal, Umesh
Year:
Available at:
GUtech Library
.
-
Cyber security
Pandey, O.N.
QA76.9.A25 P36 2019
21
-
Title:
Cyber security
Author:
Pandey, O.N.
Year:
Available at:
GUtech Library
.
-
Network security
Pandey, O.N.
QA76.9.A25 P36 2020
22
-
Title:
Network security
Author:
Pandey, O.N.
Year:
2020
Available at:
GUtech Library
.
-
Data protection: ensuring data availability
De Guise, Petron
QA76.9.A25 G85 2017
23
-
Title:
Data protection: ensuring data availability
Author:
De Guise, Petron
Year:
2017
Available at:
GUtech Library
.
-
Cyber security. Simply. Make it happen: leveraging digitization through IT security
Abolhassan, Ferri ...
QA76.9.A25 C93 2017
24
-
Title:
Cyber security. Simply. Make it happen: leveraging digitization through IT security
Author:
Abolhassan, Ferri ...
Year:
2017
Available at:
GUtech Library
.
-
Cyber security for cyber physical systems: leveraging digitization through IT security
Ali, Saqib...
QA76.9.A25 A45 2018
25
-
Title:
Cyber security for cyber physical systems: leveraging digitization through IT security
Author:
Ali, Saqib...
Year:
2018
Available at:
GUtech Library
.
-
Big data analytics and cybersecurity
Savas, Onur...
QA76.9.A25 S28 2017
26
-
Title:
Big data analytics and cybersecurity
Author:
Savas, Onur...
Year:
2017
Available at:
GUtech Library
.
-
Data mining and data warehousing
Kumar, Sachin
QA76.9.D34.K86 2020
27
-
Title:
Data mining and data warehousing
Author:
Kumar, Sachin
Year:
2020
Available at:
GUtech Library
.
-
PC maintenance and troubleshooting guide: Subtitle
Bhatnagar, Ashish
QA76.9.A73 B43 2019
28
-
Title:
PC maintenance and troubleshooting guide: Subtitle
Author:
Bhatnagar, Ashish
Year:
2019
Available at:
GUtech Library
.
-
System forensics, investigation, and response: A guide for law enforcement
Easttom, Chuck
QA76.9.A25 E27 2019
29
-
Title:
System forensics, investigation, and response: A guide for law enforcement
Author:
Easttom, Chuck
Year:
2019
Available at:
GUtech Library
.
-
The data warehouse mentor: practical data warehouse and business intelligence insights
Laberge, Robert
QA76.9.D37.L33 2011
30
-
Title:
The data warehouse mentor: practical data warehouse and business intelligence insights
Author:
Laberge, Robert
Year:
2011
Available at:
GUtech Library
.
-
Machine learning and security: protecting systems with data and algorithms
Chio, Clarence
QA76.9.A25 C45 2018
31
-
Title:
Machine learning and security: protecting systems with data and algorithms
Author:
Chio, Clarence
Year:
2018
Available at:
GUtech Library
.
-
Computer system architecture
Mano, M. Morris
QA76.9.M36 2017
32
-
Title:
Computer system architecture
Author:
Mano, M. Morris
Year:
2017
Available at:
GUtech Library
.
-
Fundamentals of information systems security
Kim, David
QA76.9.A25 K56 2018
33
-
Title:
Fundamentals of information systems security
Author:
Kim, David
Year:
2018
Available at:
GUtech Library
.
-
Data mining, data warehousing and Olap
Sharma, Gajendra
QA76.9.D34.S53 2019
34
-
Title:
Data mining, data warehousing and Olap
Author:
Sharma, Gajendra
Year:
2019
Available at:
GUtech Library
.
-
Investigating the cyber breach : the digital forensics guide for the network engineer /
Muniz, Joseph
QA76.9.M86 2019
35
-
Title:
Investigating the cyber breach : the digital forensics guide for the network engineer /
Author:
Muniz, Joseph
Year:
Available at:
GUtech Library
.
-
Gray hat hacking : the ethical hacker's handbook /
Harper, Allen
QA76.9.A25 H37 2018
36
-
Title:
Gray hat hacking : the ethical hacker's handbook /
Author:
Harper, Allen
Year:
Available at:
GUtech Library
.
-
Multilevel security for relational databases.
Faragallah, Osama S.
QA76.9.D314 F37 2015
37
-
Title:
Multilevel security for relational databases.
Author:
Faragallah, Osama S.
Year:
2015
Available at:
GUtech Library
.
-
Cryptography and network security.
Chaudhary, Vikas
QA76.9.A25 C43 2020
38
-
Title:
Cryptography and network security.
Author:
Chaudhary, Vikas
Year:
2011
Available at:
GUtech Library
.
-
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Goutam, Rajesh Kumar
QA76.9.A25 G68 2021
39
-
Title:
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author:
Goutam, Rajesh Kumar
Year:
2021
No Items currently Available
.
-
Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Shaikh, Shahid
QA76.9.S53.2021
40
-
Title:
Building decentralized blockchain applications. learn how to use blockchain as the foundation for next-gen apps.
Author:
Shaikh, Shahid
Year:
2021
Available at:
GUtech Library
.
-
Guide to computer forensics and investigations: processing digital evidence
Nelson, Bill
QA76.9.A25 H45 2018
41
-
Title:
Guide to computer forensics and investigations: processing digital evidence
Author:
Nelson, Bill
Year:
2018
Available at:
GUtech Library
.
-
Modern systems analysis and design
Valacich, Joseph S.
QA76.9.S88.V35 2021
42
-
Title:
Modern systems analysis and design
Author:
Valacich, Joseph S.
Year:
2021
Available at:
GUtech Library
.
-
How to measure anything in cybersecurity risk
Hubbard, Douglas W.
QA76.9.A25 H83 2023
44
-
Title:
How to measure anything in cybersecurity risk
Author:
Hubbard, Douglas W.
Year:
2023
Available at:
GUtech Library
.
-
CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Conklin, Wm. Arthur
QA76.9.A25.C66 2021
45
-
Title:
CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author:
Conklin, Wm. Arthur
Year:
2021
Available at:
GUtech Library
.
-
Wireless and mobile device security
Doherty Jim
QA76.9.A25 D64 2022
47
-
Title:
Wireless and mobile device security
Author:
Doherty Jim
Year:
2022
Available at:
GUtech Library
.
-
CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Everett, Travis A.
QA76.9.A25.E94 2023
48
-
Title:
CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author:
Everett, Travis A.
Year:
2023
Available at:
GUtech Library
.
-
The Official (ISC)2 CISSP CBK Reference
Deane, Arthur
QA76.9.A25.D43 2021
49
-
Title:
The Official (ISC)2 CISSP CBK Reference
Author:
Deane, Arthur
Year:
2021
Available at:
GUtech Library
.
-
Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Meredith, Dale
QA76.9.A25 M47 2022
50
-
Title:
Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author:
Meredith, Dale
Year:
2022
Available at:
GUtech Library
.
-
Previous Shelf
Bottom
Next Shelf
Bottom
-