Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Browse Shelf





- Guide to computer forensics and investigations: processing digital evidence Nelson, Bill Guide to computer forensics and investigations: processing digital evidenceQA76.9.A25 H45 2018 1 -
Title: Guide to computer forensics and investigations: processing digital evidence
Author: Nelson, Bill
Year: 2018
Available at: GUtech Library.
- Modern systems analysis and design Valacich, Joseph S. Modern systems analysis and designQA76.9.S88.V35 2021 2 -
Title: Modern systems analysis and design
Author: Valacich, Joseph S.
Year: 2021
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 4 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- CompTIA security+ all-in-one exam guide, (Exam SY0-601) Conklin, Wm. Arthur CompTIA security+ all-in-one exam guide, (Exam SY0-601)QA76.9.A25.C66 2021 5 -
Title: CompTIA security+ all-in-one exam guide, (Exam SY0-601)
Author: Conklin, Wm. Arthur
Year: 2021
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 7 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) / Everett, Travis A. CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /QA76.9.A25.E94 2023 8 -
Title: CompTIA A+ certification exam guide (exams 220-1101 & 220-1102) /
Author: Everett, Travis A.
Year: 2023
Available at: GUtech Library.
- The Official (ISC)2 CISSP CBK Reference Deane, Arthur The Official (ISC)2 CISSP CBK ReferenceQA76.9.A25.D43 2021 9 -
Title: The Official (ISC)2 CISSP CBK Reference
Author: Deane, Arthur
Year: 2021
Available at: GUtech Library.
- Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities Meredith, Dale Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activitiesQA76.9.A25 M47 2022 10 -
Title: Certified Ethical Hacker (CEH) v12 312-50 exam guide: keep up to date with ethical hacking trends and hone your skills with hands-on activities
Author: Meredith, Dale
Year: 2022
No Items currently Available.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 11 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments Gunawardana, Kushantha An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governmentsQA76.9.M65 G86 2022 12 -
Title: An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author: Gunawardana, Kushantha
Year: 2022
Available at: GUtech Library.
- Wireless and mobile device security Doherty Jim Wireless and mobile device securityQA76.9.A25 D64 2022 13 -
Title: Wireless and mobile device security
Author: Doherty Jim
Year: 2022
Available at: GUtech Library.
- All-in-one CISSP exam guide Maymí, Fernando All-in-one CISSP exam guideQA76.9.A25 M33 2022 14 -
Title: All-in-one CISSP exam guide
Author: Maymí, Fernando
Year: 2022
Available at: GUtech Library.
- Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Oettinger, William Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidenceQA76.9.A25 O38 2022 15 -
Title: Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author: Oettinger, William
Year: 2022
Available at: GUtech Library.
- How to measure anything in cybersecurity risk Hubbard, Douglas W. How to measure anything in cybersecurity riskQA76.9.A25 H83 2023 16 -
Title: How to measure anything in cybersecurity risk
Author: Hubbard, Douglas W.
Year: 2023
Available at: GUtech Library.
- Beginning Windows Phone 7 development Lee, Henry Beginning Windows Phone 7 developmentQA76.59.L44 2010 17 -
Title: Beginning Windows Phone 7 development
Author: Lee, Henry
Year: 2010
Available at: GUtech Library.
- Usborne lift-the-flap computers and coding Usborne lift-the-flap computers and codingQA76.63.U83 2015 18 -
Title: Usborne lift-the-flap computers and coding
Author:
Year: 2015
Available at: Finland Oman School Library.
- An introduction to programming and object-oriented design using Java Niño, J. An introduction to programming and object-oriented design using JavaQA76.64.N566 2008 19 -
Title: An introduction to programming and object-oriented design using Java
Author: Niño, J.
Year: 2008
Available at: GUtech Library.
- A comprehensive introduction to object-oriented programming with Java Wu, Thomas C. A comprehensive introduction to object-oriented programming with JavaQA76.64.W8 2008 20 -
Title: A comprehensive introduction to object-oriented programming with Java
Author: Wu, Thomas C.
Year: 2008
Available at: GUtech Library.
- Object-oriented data structures using Java / Dale, Nell Object-oriented data structures using Java /QA76.64.D35 2018 21 -
Title: Object-oriented data structures using Java /
Author: Dale, Nell
Year: 2018
Available at: GUtech Library.
- 22 -
LIBERO Error

Sorry, LIBERO has encountered an error

Please contact LIBERO Support with the following information if errors continue:

A run-time error occurred while executing the page

Error: <SUBSCRIPT>StarRating+3^VLEReviewsRatings ^BGUTwop("Review","")
ErrorNo: 5002
CSP Page: /libero/WebOpac.cls
Namespace: LIBERO
Class: User.WebOpac
Routine: VLEReviewsRatings
Location: StarRating+3