Results
|
1.
|
|
|
|
2.
|
|
|
|
3.
|
|
Systems analysis and design by Shelly, Gary B | Cashman, Thomas J. Rosenblatt, Harry J. Edition: 6th ed. Publication details: Boston: Thomson Course Technology, 2006Availability: Items available for loan: Main (2)Call number: QA402 .S47 2006, ...
|
|
4.
|
|
|
|
5.
|
|
Understanding computers: today and tomorrow by Parker, Charles S | Morley, Deborah Miketta, Brett. Publication details: Australia: Thomson Course Technology, 2003Availability: Items available for loan: Main (1)Call number: QA76 .P37x 2003.
|
|
6.
|
|
Principles of information security. by Whitman, Michael E | Mattord, Herbert J. Edition: 2nd ed. Publication details: Australia: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2005.
|
|
7.
|
|
Management of information security. by Whitman, Michael E | Mattord, Herbert J. Publication details: Australia: Thomson Course Technology, 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2004.
|
|
8.
|
|
Modern software development using JAVA by Tymann, Paul T | Schneider, G. Michael. Edition: 2nd ed. Publication details: Boston, Massachusetts: Thomson Course Technology, 2008Availability: Items available for loan: Main (4)Call number: QA76.76 .J38 T95x 2008, ...
|
|
9.
|
|
A guide to SQL by Pratt, Phillip J. Edition: 7th ed. Publication details: Canda: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: QA76.73.S67 P73 2005.
|
|
10.
|
|
Alice in action with Java by Adams, Joel. Publication details: Boston: Thomson Course Technology, 2008Availability: Items available for loan: Main (1)Call number: QA76.64 .A32 2008.
|
|
11.
|
|
Computers in our world by Amer, Beverly E. Edition: 2nd ed. Publication details: Australia: Thomson/Course Technology, 2008Availability: Items available for loan: Main (1)Call number: QA76.23 .A43x 2008.
|
|
12.
|
|
|
|
13.
|
|
|