Applied security visualization by Raffael Marty Print Book ©2009 Call Numbers:
|
Cloud application architectures by George. Reese Print Book ©2009 Call Numbers:
|
Computer networks and internets by Douglas. Comer Print Book ©2009 Call Numbers:
|
Database systems : models, languages, design, and application programming by Ramez. Elmasri, Sham. Navathe Print Book ©2011 Call Numbers:
|
JavaScript programmer's reference by Alexei. White Call Numbers:
|
Machine learning in cyber trust : security, privacy, and reliability by Jeffrey J.-P. Tsai, Philip S. Yu Print Book ©2009 Call Numbers:
|
Management information systems : managing the digital firm by Kenneth C. Laudon, Jane Price. Laudon Print Book ©2010 Call Numbers:
|
by Barrie A. Sosinsky Print Book ©2009 Call Numbers:
|
by Steven. Feuerstein, Bill. Pribyl Print Book ©2009 Call Numbers:
|
Principles of computer networks and communications by M. Barry. Dumas, Morris Schwartz Print Book ©2009 Call Numbers:
|
Advanced penetration testing : hacking the world's most secure networks by Wil Allsopp |
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide. by Wiley. , Ann. Wiley, Brian T. O'Hara, Tom. Rubendunst |
Communication and Power Engineering. by R. Rajesh |
Computation and Communication Technologies by Senthil T. Kumar, Bala. Mathivanan |
Content delivery networks : fundamentals, design, and evolution by Dom Robinson |
Data science for undergraduates : opportunities and options by National Academies of Sciences, Engineering, and Medicine (U.S.). Committee on Envisioning the Data Science Discipline: The Undergraduate Perspective, |
by Aliakbar Montazer Haghighi, D. P. Mishev |
Dependable software systems engineering by NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems (2015 : Marktoberdorf, Germany), Javier Esparza, Orna Grumberg, Salomon Sickert |
Empirical Research for Software Security : Foundations and Experience. by Lotfi. Ben Othmane, Martin Gilje. Jaatun, Edgar. Weippl |
Encyclopedia of database systems by M. Tamer Özsu, Ling Liu |
Guide to pairing-based cryptography by Nadia El Mrabet, Marc Joye |
Hacking the hacker : learn from the experts who take down hackers by Roger A. Grimes |
Hybrid intelligence for image analysis and understanding by Siddhartha Bhattacharyya, Indrajit Pan, Anirban Mukherjee, Paramartha Dutta |
Incremental software architecture : a method for saving failing IT implementations by Michael Bell |
by Wojciech. Mazurczyk, Steffen. Wendzel, Sebastian. Zander, Amir. Houmansadr, Krzysztof. Szczypiorski |
by Alasdair Gilchrist |
Linux Server security : hack and defend by Chris Binnie |
by Ric Messier |
Network routing : fundamentals, applications, and emerging technologies by Sudip Misra, Sumit Goswami |
Penetration testing essentials. by Sean-Philip. Oriyano |
Professional Microsoft SQL Server 2016 Reporting Services and Mobile Dashboards. by Paul. Turley, Christopher. Finlan, Riccardo. Muti |
by Dominique. Paret, Jean-Paul. Huon |
by Eberhard von Faber, Wolfgang Behnsen |
Security and privacy in cyber-physical systems : foundations, principles, and applications by Houbing Song, Glenn A. Fink, Sabina Jeschke |
Security in the digital world : for the home user, parent, consumer and home office by Graham Day |
Spark : big data cluster computing in production by Ilya. Ganelin, Ema. Orhian, Kai. Sasaki, Brennon. York |
Systems dependability assessment. by Jean-Francois. Aubry |
The essentials of data science : knowledge discovery using R by Graham J. Williams |
Trusted Computing : Principles and Applications. by Dengguo. Feng, Tsinghua University. Press |
by European Intelligence and Security Informatics Conference (2017 : Athens, Greece), Joel Brynielsson, IEEE Computer Society , Institute of Electrical and Electronics Engineers. |
by International Workshop on Big Data and Information Security (2017 : Jakarta, Indonesia), Universitas Indonesia. Fakultas Ilmu Komputer,, Institute of Electrical and Electronics Engineers. Indonesia Section,, Institute of Electrical and Electronics Engineers |
by MEC International Conference on Big Data and Smart City (4th : 2019 : Muscat, Oman), Middle East College , IEEE Communications Society , Institute of Electrical and Electronics Engineers. Oman Section,, Institute of Electrical and Electronics Engineers |
by International Conference on Cyber Situational Awareness, Data Analytics and Assessment (2019 : London, England), Institute of Electrical and Electronics Engineers |
by International Conference on Multimedia Analysis and Pattern Recognition (2nd : 2019 : Ho Chi Minh City, Vietnam), Vietnamese Association for Pattern Recognition , Institute of Electrical and Electronics Engineers |
by IEEE International Conference on Big Data Analysis (4th : 2019 : Suzhou, Jiangsu Sheng, China), Xi'an Jiaotong-Liverpool University. Research Institute of Big Data Analytics,, Institute of Electrical and Electronics Engineers |
Principles of information security by Michael E. Whitman, Herbert J. Mattord Print Book ©2009 Call Numbers:
|
Professional Oracle WebLogic Server by Robert. Patrick, Greg. Nyberg, Philip. Aston, Josh. Bregman, Paul. Done Print Book 2010 Call Numbers:
|
Security awareness : applying practical security in your world by Mark D. Ciampa Print Book 2010 Call Numbers:
|
Security in a Web 2.0+ world : a standards based approach by C. Solari Print Book 2009 Call Numbers:
|
Security+ guide to network security fundamentals by Mark D. Ciampa Print Book ©2009 Call Numbers:
|
Software architecture : foundations, theory, and practice by Richard N. Taylor, Nenad. Medvidović, Eric M. Dashofy Print Book ©2010 Call Numbers:
|
Strategic information systems management by Kevin Grant, Ray. Hackney, David Edgar Print Book ©2010 Call Numbers:
|