My Library

   
Limit search to available items
160 results found. sorted by date .
Result Page   1 2 3 4 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-50 of 160)
1
Text-Book
Book Cover

Data mining : concepts and techniques


Han, Jiawei, author
Cambridge, MA, United States : Morgan Kaufmann is an imprint of Elsevier, 2023. 2023

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D343 H36 2023    Available
 Male Library  QA76.9.D343 H36 2023 c.2  Available
 Female Library  QA76.9.D343 H36 2023    Available
There are additional copies/volumes of this item
2
Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.B45 M37 2022    Available
 Female Library  QA76.9.B45 M37 2022    Available
3
Book
Book Cover

A commercial law of privacy and security for the internet of things


Elvy, Stacy-Ann, 1980- author
Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  KF390.5.C6 E48 2021    Available
4
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
5
---
Book Cover

Practical IoT hacking : the definitive guide to attacking the internet of things


Chantzis, Fotios
San Francisco : No Starch Press, Inc., 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.8857.C533 2021    Available
 Female Library  TK5105.8857.C533 2021    Available
6
Book
Book Cover

Mathematics for machine learning


Deisenroth, Marc Peter, author
Cambridge ; New York, NY : Cambridge University Press, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Male Library  Q325.5.D45 2020    Available
 Female Library  Q325.5.D45 2020    Available
7
Book
Book Cover

Cyber risk management : prioritize threats, identify vulnerabilities and apply controls


Hodson, Christopher
London : KoganPage, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HD31.2.H637 2019    Available
 Male Library  HD31.2.H637 2019 c.2  Available
 Female Library  HD31.2.H637 2019    Available
8
Book
Book Cover

Machine learning for signal processing : data science, algorithms, and computational statistics


Little, Max A.
Oxford, United Kingdom : Oxford University Press, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  Q325.5 .L588 2019    Available
 Male Library  Q325.5 .L588 2019 c.2  Available
 Female Library  Q325.5 .L588 2019    Available
There are additional copies/volumes of this item
9
Book
Book Cover

GDPR : how to achieve and maintain compliance


Foulsham, Mark, author
London ; New York : Routledge, Taylor & Francis Group, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5548.37.F68 2019    Available
 Male Library  HF5548.37.F68 2019 c.2  Available
 Female Library  HF5548.37.F68 2019    Available
There are additional copies/volumes of this item
10
Book
Book Cover

Introduction to data mining


Tan, Pang-Ning, author
NY NY : Pearson, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D343 T35 2019    Available
 Female Library  QA76.9.D343 T35 2019    Available
11
Book
Book Cover

Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow : concepts, tools, and techniques to build intelligent systems


Géron, Aurélien, author
Beijing [China] ; Sebastopol, CA : O'Reilly Media, Inc., 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.73.P98 G45 2019    Available
 Female Library  QA76.73.P98 G45 2019    DUE 05-27-24
12
Book
Book Cover

Neural networks and deep learning : a textbook


Aggarwal, Charu C.
Cham, Switzerland : Springer, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.87.A343 2018    Available
 Male Library  QA76.87.A343 2018 c.2  Available
 Female Library  QA76.87.A343 2018    Available
There are additional copies/volumes of this item
13
Book
Book Cover

Python data analytics : with Pandas, NumPy, and Matplotlib


Nelli, Fabio
Berkeley, United States : Apress, c. 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.73.P98 N455 2018    Available
 Male Library  QA76.73.P98 N455 2018 c.2  Available
 Female Library  QA76.73.P98 N455 2018    Available
There are additional copies/volumes of this item
14
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River : Pearson, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S685 2018    Available
 Male Library  QA76.9.A25 S685 2018 c.2  Available
 Female Library  QA76.9.A25 S685 2018    Available
There are additional copies/volumes of this item
15
Book
Book Cover

Python for data analysis : data wrangling with Pandas, NumPy, and IPython


McKinney, Wes
Beijing : O'Reilly, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.73.P98 M42 2018    Available
 Male Library  QA76.73.P98 M42 2018 c.2  Available
 Female Library  QA76.73.P98 M42 2018    Available
There are additional copies/volumes of this item
16
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
17
Book
Book Cover

International cybersecurity and privacy law in practice


Tschider, Charlotte A., author
Alphen aan den Rijn, The Netherlands : Kluwer Law International B.V., 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  K3264.C65 T73 2018    Available
 Male Library  K3264.C65 T73 2018 c.2  Available
 Female Library  K3264.C65 T73 2018    Available
There are additional copies/volumes of this item
18
Book
Book Cover

Genetic Programming : 21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018, Proceedings



Cham : Springer International Publishing : Imprint: Springer, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A43 G464 2018    Available
 Female Library  QA76.9.A43 G464 2018    Available
19
Book
Book Cover

Principles of information security


Whitman, Michael E., 1964-
Boston, MA : Cengage, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59 W54 2017    Available
 Female Library  TK5105.59 W54 2017    Available
20
Book
Book Cover

Security awareness : applying practical security in your world


Ciampa, Mark
Boston, Mass.: Thomson Course Technology, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C53 2017    Available
 Female Library  QA76.9.A25 C53 2017 c.2  Available
21
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954-
Boston, MA, USA : Cengage Learning, ‏2017. 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017 c.2  Available
There are additional copies/volumes of this item
22
Book
Book Cover

Data mining : practical machine learning tools and techniques


Witten, I. H
Amsterdam : Elsevier, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.D343 W58 2017    Available
 Female Library  QA76.9.D343 W58 2017 c.2  Available
 Male Library  QA76.9.D343 W58 2017    Available
There are additional copies/volumes of this item
23
Book
Book Cover

Defensive security handbook : best practices for securing infrastructure


Brotherston, Lee
Sebastopol, CA : O'Reilly Media, Inc., 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B7747 2017    Available
 Male Library  QA76.9.A25 B7747 2017    Available
24
Book
Book Cover

CompTIA cybersecurity analyst (CSA+) cert guide


McMillan, Troy
Indianapolis, Indiana : Pearson, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M36 2017    Available
 Male Library  QA76.9.A25 M36 2017    Available
25
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
26
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S725 2017    Available
 Female Library  TK5105.59.S725 2017    Available
27
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
28
Text-Book
Book Cover

Security, privacy and reliability in computer communications and networks



Gistrup, Denmark : River Publishers, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S438 2017    Available
 Female Library  TK5105.59.S438 2017    Available
29
Text-Book
Book Cover

Cybersecurity and privacy - bridging the gap



Gistrup, Denmark : River Publishers, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C934 2017    Available
 Female Library  QA76.9.A25 C934 2017    Available
30
Book
Book Cover

Data mining for business analytics : concepts, techniques, and applications with JMP Pro


Shmueli, Galit, 1971-
Hoboken, United States : John Wiley & Sons, Inc., 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D343 D383 2017    Available
 Male Library  QA76.9.D343 D383 2017 c.2  Available
 Female Library  QA76.9.D343 D383 2017    Available
There are additional copies/volumes of this item
31
Book
Book Cover

A first course in machine learning


Rogers, Simon, 1979-
Boca Raton : Chapman & Hall/CRC, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  Q325.5 .R64 2017    Available
 Male Library  Q325.5 .R64 2017 c.2  Available
 Female Library  Q325.5 .R64 2017    Available
There are additional copies/volumes of this item
32
Book
Book Cover

R for data science : import, tidy, transform, visualize, and model data


Wickham, Hadley
Beijing : O'Reilly, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA276.45.R3 W53 2017    Available
 Male Library  QA276.45.R3 W53 2017 c.2  Available
 Female Library  QA276.45.R3 W53 2017    Available
There are additional copies/volumes of this item
33
Text-Book
Book Cover

Security in the private cloud



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.S4435 2017    Available
 Female Library  QA76.585.S4435 2017    Available
34
Book
Book Cover

Data analytics for data science, big data et machine learning : a practical step-by-step guide et exam preparation using Hadoop, Python, and R.


Henry, Bernard Charles
[S. l] : CreateSpace Independent Publishing Platform, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.B45 H467 2017    Available
 Female Library  QA76.9.B45 H467 2017    Available
35
Book
Book Cover

Principles of information security


Whitman, Michael E
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2016    Available
36
Book
Book Cover

Introducing data science : big data, machine learning, and more, using Python tools


Cielen, Davy
Shelter Island, NY : Manning Publications, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.D343 C4723 2016    Available
 Male Library  QA76.9.D343 C4723 2016    Available
37
Book
Book Cover

Big data fundamentals : concepts, drivers & techniques


Erl, Thomas
Boston : Prentice Hall ; [Vancouver, BC] : Service Tech Press, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.D343 E75 2016    Available
 Male Library  QA76.9.D343 E75 2016    Available
38
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
39
Text-Book
Book Cover

Analyzing analytics


Bordawekar, Rajesh
San Rafael, California : Morgan & Claypool Publishers, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A73 B673 2016    Available
 Female Library  QA76.9.A73 B673 2016    Available
40
Text-Book
Book Cover

Event mining : algorithms and applications



Boca Raton, FL : CRC Press, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D343 E983 2016    Available
 Female Library  QA76.9.D343 E983 2016    Available
41
Text-Book
Book Cover

Text data management and analysis : a practical introduction to information retrieval and text mining


Zhai, ChengXiang
New York, United States : ACM Books ; San Rafael, United States : Morgan & Claypool Publishers, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.N38 Z43 2016    Available
 Female Library  QA76.9.N38 Z43 2016    Available
42
Text-Book
Book Cover

Web mining : a synergic approach resorting to classifications and clustering


Kumbhar, V. S.
Gistrup, Denmark : River Publishers, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D343 K863 2016    Available
 Female Library  QA76.9.D343 K863 2016    Available
43
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
44
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
45
Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.73.P98 V365 2017    Available
 Female Library  QA76.73.P98 V365 2017    Available
46
Book
Book Cover

Deep learning


Goodfellow, Ian, author
2016

Rating:

 

Copies

Location Call No. Status
 Male Library  Q325.5.G66 2016    Available
 Female Library  Q325.5.G66 2016    Available
47
Book
Book Cover

CISSP guide to security essentials


Gregory, Peter H
Australia ; Boston, MA : Course Technology/Cengage Learning, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G7497 2015    Available
48
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Clifton Park, NY : Cengage Learning, 2015 2015

Rating:

Copies

Location Call No. Status
 Female Library  TK 5105.59 C52 2015    Available
49
Book
Book Cover

Security in computing


Pfleeger, Charles P. , 1948
1 Upper Saddle River, NJ : Prentice Hall, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P45 2015    Available
 Female Library  QA76.9.A25 P45 2015 c.2  Available
50
Book
Book Cover

Big data : principles and best practices of scalable real-time data systems


Marz, Nathan
Shelter Island, NY : Manning, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.D3 M374 2015    Available
 Female Library  QA76.9.D3 M374 2015    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   1 2 3 4 Next