Limit search to available items
Save marked records Save all on page
SUBJECTS (1-10 of 10)
Computer Science Social Aspects
1
Mark
  The essence of professional issues in computing.
Ayres, Robert, Ph. D.
London : Prentice Hall, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 C66 A9  8 WEEK LOAN  AVAILABLE
Computer Science Study And Teaching Secondary Great Britain
2
Mark
  A practical guide to teaching ICT in the secondary school

London ; New York : Routledge, 2007. -Access this resource online
2007
EBOOKS
3
Mark
  Teaching fundamental concepts of informatics : 4th International Conference on Informatics in Second
International Conference on Informatics in Secondary Schools, Evolution and Perspectives (4th : 2010 : Zurich, Switzerland)
Berlin : Springer, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.27 I6  8 WEEK LOAN  AVAILABLE
Computer Science Vocational Guidance Juvenile Literature
4
Mark
  Jobs if you like computers
Guillain, Charlotte.
London : Raintree, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Education Resources 1st floor Mezzanine  004.023 GUI  8 WEEK LOAN  AVAILABLE
Computer Scientists
5
Mark
  Social, ethical and policy implications of information technology

Hershey, Pa. : Information Science, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HM 851 S6  4 WEEK LOAN  AVAILABLE
Computer Scientists Biography
6
Mark
  Out of their minds : the lives and discoveries of fifteen great computer scientists.
Shasha, Dennis.
New York : Copernicus Books, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  004.0922 SHA  4 WEEK LOAN  AVAILABLE
Computer Security
7
Mark
  Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015] -Access this resource online
2015
EBOOKS
8
Mark
  Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
9
Mark
  The art of computer virus research and defense.
Szor, Peter.
Upper Saddle River, N.J. : Addison-Wesley, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.76 C68 S9  8 WEEK LOAN  AVAILABLE
10
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results