Your search returned 62 results.

Sort
Results
1.
Image from Google Jackets
Master data management and data governance Alex Berson, Larry Dubov by
Edition: 2nd ed
Publication details: New York McGraw-Hill c2011
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.812 BER.

2.
Image from Google Jackets
MCSE/MCSA implementing and Administering Security in a Windows 2000 network: study guide and DVD training system (exam 70-214) Will Schmied and Thomas W. Shinder by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

3.
Image from Google Jackets
Modeling & simulation-based data engineering : introducing pragmatics into ontologies for net-centric information exchange Bernard Ziegler, Phillip Hammonds by
Publication details: Burlington, MA Academic Press c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.60113 ZEI.

4.
Image from Google Jackets
Multi-domain communication management systems Alex Galis by
Publication details: Boca Raton, FL CRC Press c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 384.33 GAL.

5.
Image from Google Jackets
Multimedia content encryption : techniques and applications Shiguo Lian by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 LIA.

6.
Image from Google Jackets
Multimedia forensics and security Chang-Tsun Li [editor] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LI.

7.
Image from Google Jackets
Visual database systems 4 (Vdb4) Yannis Ioannidis, Wolfgang Klas by
Publication details: London Chapman & Hall c1998
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 LAO.

8.
Image from Google Jackets
Web Service Security—scenarios, patterns, and implementation guidance for Web services Enhancements (WSE) 3. 0, patterns & practices, Hogg, Et Al by
Publication details: New Delhi P H I c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WEB.

9.
Image from Google Jackets
Blackberry storm for dummies Robert Kao, Dante Sarigumba, Carol Baroudi ;Laura by
Edition: 2nd ed
Publication details: Indianapolis, IN Wiley Pub., Inc 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.1675 KAO.

10.
Image from Google Jackets
C++ classes and data structures Jeffrey S. Childs by
Publication details: Upper Saddle River, NJ Pearson Prentice Hall c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133C++ CHI.

11.
Image from Google Jackets
C++ data structures Stefan Brandle, Jonathan Geisler, James Roberge, David Whittington by
Edition: 3rd ed
Publication details: Boston Jones and Bartlett Publishers c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 C++ BRA.

12.
Image from Google Jackets
Chatting on Internet Paul williams by
Publication details: New Delhi Tiny Tot Publications 2004
Availability: Items available for loan: Anna Centenary Library (2)Call number: 001.678 WIL, ...

13.
Image from Google Jackets
Classic data structures Debasis Samanta by
Edition: 2nd ed
Publication details: New Delhi PHI c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.73 SAM.

14.
Image from Google Jackets
Community experiences: reading and communication for civics Lynda Terrill, Jacqueline Flamm by
Publication details: New York McGraw-Hill c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TER.

15.
Image from Google Jackets
Computer forensics and investigations Bill Nelson, Amelia Phillips by
Publication details: Indianapolis, IN Course Technology c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NEL.

16.
Image from Google Jackets
Computer insecurity : risking the system Steven, Furnell by
Publication details: Berlin ; New York Springer c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FUR.

17.
Image from Google Jackets
Computer science 1 Viva EZ
Publication details: New Delhi Viva Education Private Ltd 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004 COM, ...

18.
Image from Google Jackets
Computer science 2 Viva EZ
Publication details: New Delhi Viva Education Private Ltd 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004 COM, ...

19.
Image from Google Jackets
Computer science 4 Viva EZ
Publication details: New Delhi Viva Education Private Ltd 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004 COM, ...

20.
Image from Google Jackets
Computer science 5 Viva EZ
Publication details: New Delhi Viva Education Private Ltd 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004 COM, ...

21.
Image from Google Jackets
Computer science 6 Viva EZ
Publication details: New Delhi Viva Education Private Ltd 2007
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004 COM, ...

22.
Image from Google Jackets
Computer speech : recognition, compression, synthesis : with introductions to hearing and signal analysis and a glossary of speech and computer terms Manfred R. Schroeder by
Edition: 2nd ed
Publication details: Berlin ; New York Springer-Verlag 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.454 SCH.

23.
Image from Google Jackets
Configuring juniper networks NetScreen & SSG firewalls Rob Cameron; Juniper Networks, Inc.; ScienceDirect (Online service); et al by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAM.

24.
Image from Google Jackets
Data and text mining: a business applications approach Thomas W. Miller by
Publication details: New Delhi Pearson 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 MIL.

25.
Image from Google Jackets
Data privacy and security David Salomon by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SAL.

26.
Image from Google Jackets
DB2 9 fundamentals : certification study guide Roger E. Sanders by
Publication details: New Delhi SPD c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 SAN.

27.
Image from Google Jackets
Digital contagions : a media archaeology of computer viruses Jussi Parikka
Publication details: Bern, Switzerland Lang 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAR.44.

28.
Image from Google Jackets
Epidemics and rumours in complex networks Moez Draief, Laurent Massoulie by
Publication details: New York [publisher not identified] 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 DRA.

29.
Image from Google Jackets
File organization and processing Alan L. Tharp by
Edition: Student ed
Publication details: Hoboken, NJ Wiley c1988
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 THA.

30.
Image from Google Jackets
Firewall fundamentals Wes Noonan, Ido Dubrawsky by
Publication details: Indianapolis, IN Cisco Press 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOO.

31.
Image from Google Jackets
FISMA certification & accreditation handbook BY Laura Taylor; Matthew Shepherd by
Publication details: Rockland Syngress C2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAY.

32.
Image from Google Jackets
Fundamental data compression Ida Mengyi Pu by
Publication details: Amsterdam Elsevier c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.746 MEN.

33.
Image from Google Jackets
Fundamentals of multimedia Ze-Nian Li and Mark S. Drew by
Publication details: Upper Saddle River, NJ Pearson Prentice Hall c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.7 LI.

34.
Image from Google Jackets
Horoscope on Internet Walter Wilson by
Publication details: New Delhi Tiny Tot Publications 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 WIL.

35.
Image from Google Jackets
Initial steps Jill Jesson and Graham Peacock by
Publication details: Cambridge Cambridge University Press 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004 JES.

36.
Image from Google Jackets
Insider threat : protecting the enterprise from sabotage, spying, and theft Eric Cole; Sandra Ring by
Publication details: Rockland Syngress c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COL.

37.
Image from Google Jackets
Intrusion prevention and active response: deploying network and host IPS BY Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin by
Publication details: Rockland Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RAS.

38.
Image from Google Jackets
Computer organization ISRD Group
Publication details: New Delhi Tata McGraw Hill 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.22 ISR.

39.
Image from Google Jackets
Configuring SonicWALL firewalls Dan Bendell; ScienceDirect (Online service); et al by
Publication details: Rockland Syngress Pub C2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LAT.

40.
Image from Google Jackets
Data Structures and Algorithms Using C# MICHAEL McMILLAN by
Publication details: New York Cambridge University Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 C# MCM.

41.
Image from Google Jackets
Data Structures Using C++ D.S.Malik by
Publication details: New Delhi [publisher not identified] 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 C++ MAL.

42.
Image from Google Jackets
Data Structures Using C++ D.S.Malik by
Publication details: New Delhi Cengage Learing 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 C++ MAL.

43.
Image from Google Jackets
Master data management and customer data integration for a global enterprise Alex Berson, Lawrence Dubov by
Publication details: New York McGraw-Hill 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.812 BER.

44.
Image from Google Jackets
The Internet and young learners Gordon Lewis by
Publication details: Oxford Oxford University Press 2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 371.334678 LEW, ...

45.
Image from Google Jackets
Applied data communications and networks William Buchanan by
Publication details: London Chapman & Hall 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.71 BUC.

46.
Image from Google Jackets
Audit and trace log management: consolidation and analysis Phillip Q. Maier by
Publication details: Boca Raton, FL Auerbach Publications 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MAI.

47.
Image from Google Jackets
48.
Image from Google Jackets
The Internet and young learners Gordon Lewis by
Publication details: Oxford Oxford University Press 2009
Availability: No items available.

49.
Image from Google Jackets
Data Visualization: Exploring and Explaining With Data With Mindtap / Camm/ Cochran/ Fry/ Ohlmann by
Edition: 1st edition
Language: English
Publication details: Delhi Cengage 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.74 CAM, ...

50.
Image from Google Jackets
Beginning Data Science in R 4: Data Analysis, Visualization, and Modelling for The Data Scientist / Thomas Mailund by
Edition: 2nd ed.
Language: English
Publication details: Apress; c2022
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.133 MAI.

51.
Image from Google Jackets
COMPUTING FUNDAMENTALS AND C PROGRAMMING 2ED / Balagurusamy by
Edition: 2nd edition
Language: English
Publication details: Tamil nadu McGraw hill education 2023
Availability: Items available for reference: Anna Centenary Library: Not for loan (2)Call number: 005.133 BAL;1, ...

52.
Image from Google Jackets
97 Things About Ethics Everyone In Data /Bill Franks by
Edition: 1st edition
Language: English
Publication details: Sebastopol, California, O'Reilly, 2020
Availability: Items available for loan: Anna Centenary Library (2)Call number: 006.3 FRA, ...

53.
Image from Google Jackets
Stream processing with apache spark Gerard Maas and Francois Garillot mastering structured streaming and spark streaming by Language: English
Publication details: c2019
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.74 MAA, ...

54.
Image from Google Jackets
Data quality fundamentals : a practitioner's guide to building trustworthy data pipelines /Barr Moses, Lior Gavish, Molly Vorwerck by
Edition: 1st edition
Language: English
Publication details: Sebastopol, CA, O'Reilly media, 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.74 MOS, ...

55.
Image from Google Jackets
The logstash book / James Turnbull the log management made easy by Language: English
Publication details: Navi Mumbai SPD c2016
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 TUR, ...

56.
Image from Google Jackets
Python data science handbook : essential tools for working with data /Jacob T. Vanderplas by
Edition: 2nd ed.
Language: English
Publication details: Sebastopol, CA, O'Reilly Media, Incorporated 2023
Availability: Items available for reference: Anna Centenary Library: Not for loan (2)Call number: 006.312 VAN, ...

57.
Image from Google Jackets
Learn Blockchain by Building One: a Concise Path to Understanding Cryptocurrencies /Daniel Van Flymen by Language: English
Publication details: Berkeley Apress 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.27 FLY, ...

58.
Image from Google Jackets
Oracle Weblogic Server 12c Administration I Exam 1z0-133 Gustavo Garnica a Comprehensive Certification Guide by
Edition: Reprint
Language: English
Publication details: [Berkeley] Apress 2023
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.133 GAR, ...

59.
Image from Google Jackets
Data Science Using Oracle Data Miner and Oracle R Enterprise: Transform Your Business Systems Into an Analytical Powerhouse /Das by Language: English
Publication details: Apress, c2016
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.312 DAS.

60.
Image from Google Jackets
Salesforce Data Architecture and Management : : a pragmatic guide for aspiring Salesforce architects and developers to manage, govern, and secure their data effectively / Ahsan, Zafar. by
Edition: 1st edition
Language: English
Publication details: birmingham. Packt 2021
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.74 AHS.

61.
Image from Google Jackets
Programming for Problem Solving Using C / Christudas, Beulah. by Language: English
Publication details: Chennai Mjp 2023
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.133C CHR, ...

62.
Image from Google Jackets
Real-time Database Systems : architecture and techniques Kam-Yiu Lam, Tei-Wei Kuo by Language: English
Publication details: Boston Kluwer Academic Pub. 2001
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 004.3 LAM.

Find us on the map