|
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices |
Alex Alexander |
364.168/A L E |
2022 |
|
Doing academic research : a practical guide to research methods and analysis |
Ted Gournelos
Joshua Hammonds
Maridath Wilson |
001.4/G O U |
2019 |
|
The psychology of terrorism |
Neil Shortland |
303.625/S H O |
2021 |
|
Marketing Arab and Foreign Perspectives |
Naeim Hafez Abougomaah |
658.8/A B O |
2006 |
|
Data Structures |
Usha Agrawal |
005.73/A G R |
2019 |
|
Big data and the computable society : algorithms and people in the digital world |
Domenico Talia |
005.7/T A L |
2018 |
|
Alice & Bob learn application security |
Tanya Janca |
005.3/J A N |
2021 |
|
Effective library systems and practices |
R.S Kochar |
023/K O C |
2018 |
|
MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 |
Jeremy Moskowitz |
621.382/M O S |
2019 |
|
Electronic Government For The 21st Century A Practice Field Revisited |
Ali M Al Khouri |
352.3802/A L K |
2018 |
|
Media and Protocol |
Gilane Hamza |
302.2/H A M |
2012 |
|
The public relations handbook |
|
659.2/P U B |
2021 |
|
Data science at the command line : obtain, scrub, explore, and model data with Unix power tools |
Jeroen Janssens |
005.7/J A N |
2021 |
|
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams |
Kasun Indrasiri
Sriskandarajah Suhothayan |
004.6782/I N D |
2021 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Cryptography and network security |
Joseph Alexander |
005.82/A L E |
2022 |
|
Web Application Security : exploitation and countermeasures for modern web applications |
Andrew Hoffman |
005.8/H O F |
2020 |
|
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites |
Robin Nixon |
005.2762/N I X |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Big data and machine learning in quantitative investment |
Tony Guida |
332.60285631/G U I |
2019 |
|
Embedded system design : embedded systems foundations of cyber-physical systems |
Peter Marwedel |
621.3815/M A R |
2006 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |
|
Introduction to Algorithms for Data Mining and Machine Learning |
Xin-She Yang |
006.312/Y A N |
2019 |
|
Hacking connected cars : tactics, techniques, and procedures |
Alissa Knight |
629.046/K N I |
2020 |
|
New Frontiers in Artificial Intelligence |
|
006.3/N E W |
2022 |
|
Explainable Al with Python |
Leonida Gianfagna
Antonio Di Cecco |
005.133/G I A |
No.Y |
|
Cyber Security |
Markus Mack |
005.8/M A C |
2021 |
|
Cyber Laws Intellectual Property and E-Commerce Security |
Michael Nash |
346.54048/N A S |
2021 |
|
The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity |
Phil Quade |
005.8/Q U A |
2019 |
|
Cyber Crime |
Nash Haynes |
364.168/H A Y |
2022 |