Limit search to available items
Save marked records Save all on page
SUBJECTS (1-13 of 13)
Computer Science Social Aspects
1
Mark
  The essence of professional issues in computing.
Ayres, Robert, Ph. D.
London : Prentice Hall, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
Computer Science Study And Teaching Secondary Great Britain
2
Mark
  A practical guide to teaching ICT in the secondary school

London ; New York : Routledge, 2007. -Access this resource online
2007
EBOOKS
3
Mark
  Teaching fundamental concepts of informatics : 4th International Conference on Informatics in Second
International Conference on Informatics in Secondary Schools, Evolution and Perspectives (4th : 2010 : Zurich, Switzerland)
Berlin : Springer, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.27 I6  8 WEEK LOAN  AVAILABLE
Computer Science Vocational Guidance Juvenile Literature
4
Mark
  Jobs if you like computers
Guillain, Charlotte.
London : Raintree, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Education Resources 1st floor Mezzanine  004.023 GUI  8 WEEK LOAN  AVAILABLE
Computer Scientists
5
Mark
  Social, ethical and policy implications of information technology

Hershey, Pa. : Information Science, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HM 851 S6  4 WEEK LOAN  AVAILABLE
Computer Scientists Biography
6
Mark
  Out of their minds : the lives and discoveries of fifteen great computer scientists.
Shasha, Dennis.
New York : Copernicus Books, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  004.0922 SHA  4 WEEK LOAN  AVAILABLE
Computer Security
7
Mark
  Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015] -Access this resource online
2015
EBOOKS
8
Mark
  Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
9
Mark
  The art of computer virus research and defense.
Szor, Peter.
Upper Saddle River, N.J. : Addison-Wesley, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.76 C68 S9  8 WEEK LOAN  AVAILABLE
10
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
11
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963-
Indianapolis, Ind. : Wiley, c2002. -Access this resource online
c2002
EBOOKS
12
Mark
  B2B and beyond : new business models built on trust
DeMaio, Harry B.
New York : John Wiley and Sobs, Inc., 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Teaching Reserve  658.0558 DEM  UNTIL CLOSING  ASK at the Reading Room
13
Mark
  Bandits on the information superhighway.
Barrett, Daniel J.
Bonn : O'Reilly and Associates, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BAR  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results