Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
SUBJECTS (1-10 of 10)
Computer Science Social Aspects
1
Mark
The essence of professional issues in computing.
Ayres, Robert, Ph. D.
London : Prentice Hall, 1999.
1999
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 C66 A9
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 C66 A9
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 C66 A9
8 WEEK LOAN
AVAILABLE
Computer Science Study And Teaching Secondary Great Britain
2
Mark
A practical guide to teaching ICT in the secondary school
London ; New York : Routledge, 2007.
Access this resource online
2007
EBOOKS
3
Mark
Teaching fundamental concepts of informatics : 4th International Conference on Informatics in Second
International Conference on Informatics in Secondary Schools, Evolution and Perspectives (4th : 2010 : Zurich, Switzerland)
Berlin : Springer, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.27 I6
8 WEEK LOAN
AVAILABLE
Computer Science Vocational Guidance Juvenile Literature
4
Mark
Jobs if you like computers
Guillain, Charlotte.
London : Raintree, 2013.
2013
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Education Resources 1st floor Mezzanine
004.023 GUI
8 WEEK LOAN
AVAILABLE
Computer Scientists
5
Mark
Social, ethical and policy implications of information technology
Hershey, Pa. : Information Science, c2004.
c2004
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
HM 851 S6
4 WEEK LOAN
AVAILABLE
Computer Scientists Biography
6
Mark
Out of their minds : the lives and discoveries of fifteen great computer scientists.
Shasha, Dennis.
New York : Copernicus Books, 1998.
1998
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
004.0922 SHA
4 WEEK LOAN
AVAILABLE
Computer Security
7
Mark
Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015]
Access this resource online
2015
EBOOKS
8
Mark
Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
9
Mark
The art of computer virus research and defense.
Szor, Peter.
Upper Saddle River, N.J. : Addison-Wesley, 2005.
2005
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.76 C68 S9
8 WEEK LOAN
AVAILABLE
10
Mark
The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 M6
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA 76.9 A25 M6
4 WEEK LOAN
AVAILABLE