Limit search to available items
Nearby KDL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Year Entries
005.43 Nut : Operating systems : a modern perspective.; Nutt, Gary J.  1999 1
005.43 Sil : Applied operating system concepts / Abraham Silberschatz, Peter Galvin, Greg Gagne.; Silberschatz, Abraham.  2000 1
005.437 Bow : Undercover user experience : learn how to do great UX work with tiny budgets, no time, and limited support / Cennydd Bowles and James Box.; Bowles, Cennydd.  c2011 1
005.437 Kor : HCI beyond the GUI : design for haptic, speech, olfactory and other nontraditional interfaces / edited by Philip Kortum.  c2008 1
005.437 Ree : Designing interfaces in public settings : understanding the role of the spectator in human-computer interaction / Stuart Reeves.; Reeves, Stuart.  c2011 1
005.54 Exc   4
005.54 Jel   2
005.55 Vie : Interactive LISREL in practice : getting started with a SIMPLIS approach / Armando Luis Vieira.; Vieira, Armando Luis.  2011 1
005.7 Wan : Data quality.; Wang, Richard Y.  2001 1
005.71376 Coa   2
005.71376 Rey : Hacking Firefox : more than 150 hacks, mods, and customizations / Mel Reyes.; Reyes, Mel,  2005 1
005.72 Mad : Wikipatterns / Stewart Mader.; Mader, Stewart.  c2008 1
005.72 Thu : Search engine visibility / Shari Thurow.; Thurow, Shari.  2008 1
005.74 Adb : Advances in databases and information systems : Associated Workshops and Doctoral Consortium of the 13th East European Conference, ADBIS 2009, Riga, Latvia, September 7-10, 2009, revised selected papers / Janis Grundspenkis ... [et al.] (eds.).; ADBIS 2009  c2010 1
005.74 Bey : Database systems / Paul Beynon-Davies.; Beynon-Davies, Paul.  2004 1
005.74 Dev : Data warehouse : from architecture to implementation.; Devlin, Barry.  1997 1
005.74 Rob   5
005.7565 Jen   2
005.8 And   3
005.8 Bar   2
005.8 Bla : Internet security protocols : protecting IP traffic.; Black, Uyless.  2000 1
005.8 Cha : Building internet firewalls.; Chapman, D Brent.  1995 1
005.8 Che : Firewalls and internet security : repelling the Wily Hacker.; Cheswick, William R.  1999 1
005.8 Chi   2
005.8 Cor : Web security.; Cormack, Andrew.  1997 1
005.8 Dep : Information security and the internet.; Great Britain.  1999 1
005.8 Dwi : Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.; Dwivedi, Himanshu.  c2004 1
005.8 Fry : Security monitoring / Chris Fry and Martin Nystrom.; Fry, Chris.  c2009 1
005.8 Har : Mastering Web services security / Bret Hartman...[et al].  2003 1
005.8 Kee : Electronic commerce relationships : trust by design / Peter Keen ... [et al.].  2000 1
005.8 Kru : Security+ prep guide.; Krutz, Ronald L.  2003 1
005.8 Lev : Crypto : secrecy and privacy in the new code war / Steven Levy.; Levy, Steven.  c2000 1
005.8 Lin : Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.; Lindskog, Helena.  2003 1
005.8 Man : Incident response & computer forensics / Chris Prosise, Kevin Mandia.; Prosise, Chris.  2003 1
005.8 Mcc : Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz.; McClure, Stuart.  1999 1
005.8 Mcn : Network security assessment / Chris McNab.; McNab, Chris  c2004 1
005.8 Men   2
005.8 Oak : Java security.; Oaks, Scott.  1998 1
005.8 Ogl : Practical firewalls.; Ogletree, Terry.  2000 1
005.8 Rus : Computer security basics / Deborah Russell and G.T. Gangemi, Sr.; Russell, Deborah.  1991 1
005.8 Sca : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; Scambray, Joel.  c2011 1
005.8 Sch : Building open source network security tools : components and techniques.; Schiffman, Mike D.  2002 1
005.8 Spe : The personal internet security guidebook : keeping hackers and crackers out of your home.; Speed, Tim.  2002 1
005.8 Tox : Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.; Toxen, Bob.  c2003 1
005.8 Vie : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; Viega, John.  c2009 1
005.8 Wal : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.  c2007 1
005.82 Gar : PGP : Pretty Good Privacy.; Garfinkel, Simson.  1995 1
005.82 Knu : Java cryptography.; Knudsen, Jonathan.  1998 1
005.84 Bow : Worm : the first digital world war / Mark Bowden.; Bowden, Mark,  c2011 1
005.84 Gri : Malicious mobile code : virus protection for Windows.; Grimes, Roger A.  2001 1
Save marked records Save all on page
Result Page   Prev Next