Text:AAA A

New Computer Science Titles: 2009

Up in smoke 
Publication information: Hershey, PA : Idea Group Pub., c2005
Format: Book
Call Number: DA76.9.D348
Coming of age in Second Life 
Author: Boellstorff, Tom, 1969-
Publication information: Princeton : Princeton University Press, c2008
Format: Book
Call Number: GN307.65 .B64 2008
Baseball hacks 
Author: Adler, Joseph
Publication information: Sebastopol, CA : O'Reilly, c2006
Format: Book
Call Number: GV877 .A35 2006
Alter ego 
Author: Cooper, Robbie, 1969-
Publication information: London : Chris Boot, 2007
Format: Book
Call Number: GV1469.25.S425 C66 2007
The ultimate history of video games 
Author: Kent, Steve L
Publication information: Roseville, Calif. : Prima Pub., c2001
Format: Book
Call Number: GV1469.3 .K45 2001
Vintage games 
Author: Loguidice, Bill
Publication information: Boston : Focal Press/Elsevier, c2009
Format: Book
Call Number: GV1469.3 .L64 2009
Play the game 
Author: Novak, Jeannie, 1966-
Publication information: Boston, MA : Thomson Course Technology, c2008
Format: Book
Call Number: GV1469.3 .N68 2008
Description: Provides parents with information on video games currently on the market, using video games to promote learning and social growth of children, game development as a career, and how to use video games to strengthen communication with their children
Groundswell 
Author: Li, Charlene
Publication information: Boston, Mass. : Harvard Business Press, c2008
Format: Book
Call Number: HC79.I55 L48 2008
Lessons in grid computing 
Author: Robbins, Stuart, 1953-
Publication information: Hoboken, N.J. : Wiley, c2006
Format: Book
Call Number: HD30.2 .R627 2006
Infotopia 
Author: Sunstein, Cass R
Publication information: New York Oxford : Oxford University Press, 2008
Format: Book
Call Number: HD30.2 .S85 2008
The ten faces of innovation 
Author: Kelley, Tom, 1955-
Publication information: New York : Currency/Doubleday, c2005
Format: Book
Call Number: HD58.9 .K43 2005
Description: Reveals the strategies a major design firm uses to foster innovative thinking throughout an organization and overcome the naysayers who stifle creativity. The role of the devil's advocate allows individuals to raise questions and concerns that effectively kill new projects and ideas, while claiming no personal responsibility nothing is more potent in stifling innovation. Drawing on nearly 20 years of experience, Kelley identifies ten roles people can play in an organization to foster innovation and new ideas while offering an effective counter to naysayers.--From publisher description
PR 2.0 
Author: Breakenridge, Deirdre
Publication information: Upper Saddle River, N.J. : FT Press, c2008
Format: Book
Call Number: HD59 .B743 2008
Revolution in the valley 
Author: Hertzfeld, Andy
Publication information: Beijing Sebastopol, CA : O'Reilly, c2005
Format: Book
Call Number: HD9696.2.U64 A6734 2005
The Google way 
Author: Girard, Bernard
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: HD9696.8.U64 G66513 2009
One red paperclip 
Publication information: Hamilton, NJ : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: HF1019 .M332 2008
Description: Follows the experiences of Kyle MacDonald, an unemployed young Canadian with a dream to trade his way up from one red paperclip to a house in just one year using only his blog as his bartering tool
The email marketing kit 
Author: Jennings, Jeanne S
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: HF5415.1265 .J452 2007
The search engine marketing kit 
Author: Thies, Dan
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: HF5415.1265 .T553 2007
Authenticity 
Author: Gilmore, James H., 1959-
Publication information: Boston, Mass. : Harvard Business School Press, c2007
Format: Book
Call Number: HF5415.15 .G55 2007
Computer security handbook 
Publication information: Hoboken, N.J. : John Wiley & Sons, c2009
Format: Book
Call Number: HF5548.37 .C64 2009
Payment card industry data security standard handbook 
Author: Virtue, Timothy M., 1975-
Publication information: Hoboken, N.J. : John Wiley & Sons, c2009
Format: Book
Call Number: HG3755.7 .V57 2009
Facebook for dummies 
Author: Abram, Carolyn
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: HM742 .A24 2008
Description: A guide to using the online social network provides information on creating a profile, communicating with friends, using Facebook applications, and using Facebook to improve one's business
Building Facebook applications for dummies 
Author: Wagner, Richard, 1966-
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: HM742 .W342 2008
The end of radio 
Publication information: 1 videodisc (23 min.) : sd., col. with b&w sequences 4 3/4 in
Format: DVD
Call Number: HM851 .E63 2007 pt.3
Description: Today's teens still listen to a lot of music, but it doesn't come from conventional radio. This program takes the pulse of an industry that seems to be on the verge of dying as the shortcomings of airwave radio are measured against internet radio, podcasting, satellite radio, and HD radio
Teen girls and technology 
Author: Farmer, Lesley S. J
Publication information: New York : Teachers College Press Chicago, IL : ALA Editions, c2008
Format: Book
Call Number: HQ798 .F37 2008
Description: Provides a framework that teachers, librarians, youth workers, and parents can use to empower girls to succeed in today's technology-rich world
Cyber safety 
Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: HQ799.2.I5 C924 2008
Description: Warns students about how vulnerable they are whenever they venture into the cyber realm-- even when they think they are among friends . Explains how to take precautions in chat rooms and social networking sites.
Identity theft handbook 
Author: Biegelman, Martin T
Publication information: Hoboken, N.J. : Wiley, c2009
Format: Book
Call Number: HV6679 .B54 2009
Phishing and countermeasures 
Publication information: Hoboken, N.J. : Wiley-Interscience, c2007
Format: Book
Call Number: HV6773 .J345 2007
Human security 
Author: Kaldor, Mary
Publication information: Cambridge, UK Malden, MA : Polity, 2007
Format: Book
Call Number: JZ5595 .K35 2007
Online social networking on campus 
Author: Martínez Alemán, Ana M
Publication information: New York, NY : Routledge, 2009
Format: Book
Call Number: LA229 .M345 2009
Computers and information technology 
Publication information: Hamilton, NJ : Cambridge Educational, c2009
Format: DVD
Call Number: QA76.25 .C666 2009
Description: Examines various computer and technology (IT) careers: webmaster, multimedia graphic designer, computer repair specialist, system administrator, etc. Contains interviews with people working in the careers who talk about their jobs and give career advice
Information technology 
Publication information: Lawrenceville, NJ : Cambridge Educational, 2007
Format: DVD
Call Number: QA76.25 .I546 2007
Description: Interviews women who have found success in the IT field. Profiles a computer service support technician specializing in sales and installation, a desktop support analyst who troubleshoots and repairs client problems, and a software developer producing high-end tools for digital image creation. Includes interviews with co-workers and supervisors help to create well-rounded descriptions of each job
CCNA practice questions (exam 640-802) 
Author: Cioara, Jeremy
Publication information: Indianapolis, IN : Que Pub., c2008
Format: Digital Resource
Call Number: QA76.3 .C48 2008
Network fundamentals 
Author: Dye, Mark A
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Digital Resource
Call Number: QA76.3 .D94 2008
CCNP BCMSN exam certification guide 
Author: Hucaby, Dave
Publication information: Indianapolis, Ind. : Cisco Press, 2007
Format: Digital Resource
Call Number: QA76.3 .H83 2007
CompTIA Linux+ certification 
Author: Jang, Michael H
Publication information: New York : McGraw-Hill, c2008
Format: Digital Resource
Call Number: QA76.3 .J336 2008
CCNA 
Author: Lammle, Todd
Publication information: Indianapolis, Ind. Chichester : Wiley, c2007
Format: Digital Resource
Call Number: QA76.3 .L35 2007
CCNA ICND2 official exam certification guide 
Author: Odom, Wendell
Publication information: Indianapolis, IN : Cisco Press, c2008
Format: Digital Resource
Call Number: QA76.3 .O3618 2008
Introducing Microsoft Silverlight 2.0 
Author: Moroney, Laurence
Publication information: Redmond, WA : Microsoft Press, 2008
Format: Book
Call Number: QA76.575 .M6643 2008
Data-driven services with Silverlight 2 
Author: Papa, John
Publication information: Sebastopol, CA : O'Reilly, 2009
Format: Book
Call Number: QA76.575 .P347 2009
Version control with subversion 
Author: Pilato, C. Michael
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.6 .C6274 2008
Starting out with programming logic & design 
Author: Gaddis, Tony
Publication information: Boston : Pearson Addison Wesley, c2008
Format: Digital Resource
Call Number: QA76.6 .G315 2008
Expert F# 
Author: Syme, Don
Publication information: Berkeley, CA : Apress New York, NY : Distributed to the book trade worldwide by Springer-Verlag New York, c2007
Format: Book
Call Number: QA76.62 .S96 2007
Adobe Air in action 
Publication information: Greenwich, CT : Manning, c2009
Format: Book
Call Number: QA76.625 .A32 2009
Programming Visual Basic 2008 
Author: Patrick, Tim, 1966-
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.73.B3 P38 2008
jQuery in action 
Author: Bibeault, Bear
Publication information: Greenwich, CT : Manning, c2008
Format: Book
Call Number: QA76.73.J38 B517 2008
JavaScript 
Author: Crockford, Douglas
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: QA76.73.J39 C763 2008
Practical Prototype and Script.aculo.us. 
Author: Dupont, Andrew
Publication information: Berkeley, CA : Apress, 2008
Format: Book
Call Number: QA76.73.J39 D867 2008
Beginning CakePHP 
Author: Golding, David
Publication information: Berkeley, CA : Apress New York : distributed by Springer-Verlag, c2008
Format: Book
Call Number: QA76.73.P224 G65 2008
Head first Rails 
Author: Griffiths, David
Publication information: Beijing Sebastopol : O'Reilly, c2009
Format: Book
Call Number: QA76.73.R83 G73 2009
Learning Rails 
Author: St. Laurent, Simon
Publication information: Sebastopol, CA : O'Reilly Media Inc., 2008
Format: Book
Call Number: QA76.73.R83 S72 2008
Learning SQL 
Author: Beaulieu, Alan
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.73.S67 B43 2009
SQL and relational theory 
Author: Date, C. J
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.73.S67 D38 2009
Beautiful architecture 
Publication information: Sebastopol, Calif. : O'Reilly, 2009
Format: Book
Call Number: QA76.754 .B43 2009
ITIL V3 Foundation complete certification kit  
Publication information: Brisbane, Australia : The Art of Service Pty Ltd, c2008
Format: Book
Call Number: QA76.76.C69 I84 2008
Don't spend a dime 
Author: Kelly, James Floyd
Publication information: Berkeley, CA : Apress, c2009
Format: Book
Call Number: QA76.76.C73 K44 2009
iWork '09 
Author: Clark, Josh
Publication information: Sebastopol, Calif. : Pogue Press/O'Reilly Media Inc., c2009
Format: Book
Call Number: QA76.76.I59 C52 2009
Description: With this book you will quickly learn everything you need to know about Apple's incredible productivity programs, including the Pages word-processor, the Numbers spreadsheet, and the Keynote presentation program that Al Gore and Steve Jobs made famous. This book gives you jargon-free explanations of iWork's capabilities, advantages, and limitations to help you quickly produce stunning documents and cinema-quality digital presentations --Publisher's description
iWork '08  
Author: Harrington, Richard, 1972-
Publication information: Berkeley, CA : Peachpit Press, c2008
Format: Digital Resource
Call Number: QA76.76.I59 H3763 2008
Description: Provides instructions on using iWork '08 to create and publish business presentations
Hacking exposed Linux 
Publication information: New York : McGraw-Hill, c2008
Format: Book
Call Number: QA76.76.O63 H375 2008
Microsoft's Vista 
Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2007
Format: DVD
Call Number: QA76.76.O63 M523 2007
Description: Examines the launch of the Vista operating system. Takes viewers into the meetings -- and inside the minds -- that decided on key aspects of the operating system and its debut. CEO Steve Ballmer, Windows Marketing Vice President Mike Sievert, Vista Design Director Tjeerd Hoek, Vista Creative Director Jenny Lam, and others in the know discuss the development of Vista, the Vista Wow advertising campaign, pre-launch PR events, the maddening delays that plagued the project, and even the design of the iconic Start button. Includes background on Bill Gates and Microsoft
Ubuntu kung fu 
Author: Thomas, Keir
Publication information: Raleigh, N.C. : Pragmatic Bookshelf, c2008
Format: Book
Call Number: QA76.76.O63 T4964 2008
OpenSUSE 11.0 and SUSE Linux enterprise server bible 
Author: Whittaker, Roger, 1955-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Digital Resource
Call Number: QA76.76.O63 W488 2008
Principles of information systems security 
Author: Dhillon, Gurpreet, 1963-
Publication information: Hoboken, NJ : John Wiley & Sons, c2007
Format: Book
Call Number: QA76.9.A25 D525 2007
E-mail alert 
Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: QA76.9.A25 E435 2008
Description: Learn how deleted e-mails are retrieved and how those indiscreet bits of e-evidence are influencing litigation and causing consternation for companies in North America
Hacking 
Author: Erickson, Jon, 1977-
Publication information: San Francisco, CA : No Starch Press, c2008
Format: Digital Resource
Call Number: QA76.9.A25 E75 2008
Windows Vista security 
Author: Grimes, Roger A
Publication information: Indianapolis, IN : Wiley Pub., c2007
Format: Book
Call Number: QA76.9.A25 G777 2007
Computer security and cryptography 
Author: Konheim, Alan G., 1934-
Publication information: Hoboken, N.J. : Wiley-Interscience, c2007
Format: Book
Call Number: QA76.9.A25 K638 2007
Risks, controls, and security 
Author: Raval, Vasant H. (Vasant Harishanker), 1940-
Publication information: Hoboken, NJ : Wiley, c2007
Format: Book
Call Number: QA76.9.A25 R38 2007
Sc@mmed 
Publication information: Princeton, N.J. : Films for the Humanities & Sciences , c2007
Format: DVD
Call Number: QA76.9.A25 S296 2007
Description: Examines phishing, the illegal gathering of others' personal information online in order to steal all their money--and even their identities. Shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving up their most sensitive financial and personal information
Hacking exposed Windows 
Author: Scambray, Joel
Publication information: New York, NY : McGraw-Hill, c2008
Format: Book
Call Number: QA76.9.A25 S3 2008
Schneier on security 
Author: Schneier, Bruce, 1963-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: QA76.9.A25 S35145 2008
Implementing email and security tokens 
Author: Turner, Sean H
Publication information: Indianapolis, IN : Wiley, c2008
Format: Book
Call Number: QA76.9.A25 T874 2008
Algorithms 
Author: Heineman, George T
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.9.A43 H45 2008
97 things every software architect should know  
Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: QA76.9.A73 N56 2009
BBS 
Publication information: [S.l. : s.n.], 2005
Format: DVD
Call Number: QA76.9.B84 B37 2005
Description: Examines the history of the dial-up Bulletin Board System
Windows Small business server 2008 unleashed 
Publication information: Indianapolis, Ind. : Sams, c2009
Format: Book
Call Number: QA76.9.C55 W55 2009
Grid computing security 
Author: Chakrabarti, Anirban
Publication information: Berlin New York : Springer, 2007
Format: Book
Call Number: QA76.9.C58 C53 2007
Electric dreams 
Author: Friedman, Ted
Publication information: New York : New York University Press, c2005
Format: Book
Call Number: QA76.9.C66 F745 2005
Programming entity framework 
Author: Lerman, Julia
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.9.D26 L47 2009
Scripting your world 
Author: Moore, Dana, 1947-
Publication information: Indianapolis, Ind. : Wiley Pub., c2008
Format: Book
Call Number: QA76.9.E57 M66 2008
Computing for the older and wiser 
Author: Arnold, Adrian
Publication information: Chichester, England Hoboken, NJ : John Wiley & Sons, c2008
Format: Book
Call Number: QA76.9.O43 A76 2008
Virtualization 
Author: Ruest, Danielle
Publication information: New York : McGraw Hill, c2009
Format: Book
Call Number: QA76.9.V5 R88 2009
An army of Davids 
Author: Reynolds, Glenn H
Publication information: Nashville, Tenn. : Thomas Nelson, c2007
Format: Book
Call Number: T14.5 .R48 2007
IT security interviews exposed 
Publication information: Indianapolis, IN : Wiley, c2007
Format: Book
Call Number: T58.5 .I836 2007
Watching me watching you 
Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.1
Description: Discusses the use of nanotechnology in terms of privacy and public safety
Forever young? 
Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.2
Description: Discusses the use of nanotechnology to improve medical care and enhance the human body
Clean, green and unseen 
Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.3
Description: Discusses the use of nanotechnology and its impact on ecosystems and communities
Hacking exposed wireless 
Author: Cache, Johnny
Publication information: New York, NY : McGraw-Hill, c2007
Format: Book
Call Number: TK5103.2 .C23 2007
CCNA portable command guide 
Author: Empson, Scott
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Book
Call Number: TK5105.5 .E4352 2008
Interconnecting Cisco network devices 
Author: McQuerry, Steve
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Book
Call Number: TK5105.5 .M33992 2008
CCNP BSCI official exam certification guide 
Author: Stewart, Brent
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Digital Resource
Call Number: TK5105.5 .S848 2008
Building scalable Cisco internetworks (BSCI) 
Author: Teare, Diane
Publication information: Indianapolis, Ind. : Cisco Press, c2007
Format: Book
Call Number: TK5105.5 .T4177 2007
Cisco routers for the desperate 
Author: Lucas, Michael, 1967-
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: TK5105.543 .L83 2009
IP addressing and subnetting 
Author: Wegner, J. D
Publication information: Rockland, Mass. : Syngress Media, c2000
Format: Book
Call Number: TK5105.585 .W44 2000
Can you hack it? 
Publication information: Hamilton, NJ : Films for the Humanities & Sciences, c2008
Format: CD
Call Number: TK5105.59 .C36 2008
Description: Examines how crippling database invasions can be launched from almost any computer, grabbing massive chunks of personal information seemingly out of thin air. Features several case studies--including one retailer that recently announced the theft of 40 million credit card numbers--as well as the consequences arising when businesses are not obligated to disclose security breaches
Security+ guide to network security fundamentals 
Author: Ciampa, Mark D
Publication information: Clifton Park, N.Y. : Delmar Learning London : Cengage Learning [distributor], 2009
Format: Digital Resource
Call Number: TK5105.59 .C53 2009
Cyber security 
Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: TK5105.59 .C924 2008
Description: The Internet offers vast possibilities for learning, making a living, and having fun. It can also destroy reputations, empty bank accounts, and ruin lives. Highlights the importance of setting up a firewall and keeping one's operating system up-to-date to protect against hackers, viruses, Trojan horses, spyware, adware, phishing emails, and other high-tech threats
Security monitoring 
Author: Fry, Chris
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: TK5105.59 .F79 2009
Implementing 802.1X security solutions for wired and wireless networks 
Author: Geier, James T
Publication information: Indianapolis, IN : Wiley, c2008
Format: Book
Call Number: TK5105.59 .G45 2008
Build your own security lab 
Author: Gregg, Michael (Michael C.)
Publication information: Indianapolis, IN : Wiley, c2008
Format: Digital Resource
Call Number: TK5105.59 .G73 2008
Disaster survival guide for business communications networks 
Author: Grigonis, Richard
Publication information: New York, NY : CMP Books Berkeley, CA : Publishers Group West [distributor], c2002
Format: Book
Call Number: TK5105.59 .G75 2002
Handbook of information security 
Publication information: Hoboken, N.J. : John Wiley, c2006
Format: Book
Call Number: TK5105.59 .H35 2006
Web security testing cookbook 
Author: Hope, Paco
Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: TK5105.59 .H67 2009
The CISSP and CAP prep guide 
Author: Krutz, Ronald L., 1938-
Publication information: Indianapolis, IN: Wiley, c2007
Format: Digital Resource
Call Number: TK5105.59 .K782 2007
Hacking exposed 6 
Author: McClure, Stuart
Publication information: New York : McGraw-Hill, c2009
Format: Book
Call Number: TK5105.59 .M48 2009
CCSP 
Author: Menga, Justin
Publication information: San Francisco, Calif. London : SYBEX, 2004
Format: Digital Resource
Call Number: TK5105.59 .M49 2004
CISSP for dummies 
Author: Miller, Lawrence
Publication information: Indianapolis, IN : Wiley Pub., 2007
Format: Digital Resource
Call Number: TK5105.59 .M55 2007
Network security 1 and 2 companion guide 
Author: Rufi, Antoon W
Publication information: Indianapolis, Ind. : Cisco Press, c2007
Format: Digital Resource
Call Number: TK5105.59 .R837 2007
CISSP 
Author: Stewart, James Michael
Publication information: Indianapolis, Ind. : Wiley Pub., c2008
Format: Digital Resource
Call Number: TK5105.59 .T5735 2008
CCNA security official exam certification guide 
Author: Watkins, Michael, CCNA
Publication information: Indianapolis, IN : Cisco Press, c2008
Format: Book
Call Number: TK5105.59 .W37 2008
Secure computer and network systems 
Author: Ye, Nong
Publication information: Chichester, England Hoboken, NJ : J. Wiley & Sons, c2008
Format: Book
Call Number: TK5105.59 .Y44 2008
Implementing NAP and NAC security technologies 
Author: Hoffman, Daniel (Daniel V.), 1972-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: TK5105.597 .H64 2008
Txtng 
Author: Crystal, David, 1941-
Publication information: Oxford New York : Oxford University Press, 2008
Format: Book
Call Number: TK5105.73 .C79 2008
Email is ruining my life! 
Publication information: Hamilton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK5105.73 .E435 2008
Description: Examines the phenomenon of the e-mail avalanche--its origins, its effects on work and everyday life, and how it can be avoided or at least reduced. Includes commentary from Ray Tomlinson, the principal inventor of e-mail
Spam 
Publication information: Lawrenceville, N.J. : Cambridge Educational, c2005
Format: DVD
Call Number: TK5105.73 .S663 2005
Description: Explains how shady advertisers send spam and presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation, and greater cooperation between legitimate businesses, Internet and online service providers, and consumers
Network know-how 
Author: Ross, John, 1947-
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: TK5105.75 .R667 2009
The book of wireless 
Author: Ross, John, 1947-
Publication information: San Francisco : No Starch Press, c2008
Format: Book
Call Number: TK5105.78 .R67 2008
CCNP BSCI portable command guide 
Author: Empson, Scott
Publication information: Indianapolis, IN : Cisco Press, c2007
Format: Book
Call Number: TK5105.8.C57 E56 2007
Using the Internet safely for seniors for dummies 
Author: Criddle, Linda
Publication information: Hoboken, NJ : Wiley Pub. Chichester : John Wiley [distributor], c2009
Format: Book
Call Number: TK5105.875.I57 C72 2009
Internet careers 
Publication information: South Charleston, WV : Cambridge Educational, c2008
Format: DVD
Call Number: TK5105.875.I57 I544 2008
Description: Explores Internet careers in three main areas: the front end, the back end, and everywhere in between. Front-end insights come from a programmer, a graphic designer, and a quality assurance tester back-end information is provided by a webmaster, a help desk specialist, and a sales associate and an IT recruiter, an advertising sales rep, and an entrepreneur explain how they've integrated the Internet into their careers
The web application hacker's handbook 
Author: Stuttard, Dafydd, 1972-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: TK5105.875.I57 S85 2008
SharePoint for project managers 
Author: Sy, Dux Raymond
Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: TK5105.875.I6 S9 2009
Cyber ethics 
Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: TK5105.878 .C924 2008
Description: This program aims to help students build an ethically sound Internet presence and lifestyle. Discusses issues such as intellectual property, pornography, gaming, chat rooms, and social networks
Should we be afraid of Google? 
Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK5105.885.G66 S568 2007
Description: Tells the history of Google along with the pros and cons of some of Google's other initiatives. Presents detailed background on cofounders Larry Page and Sergey Brin
Cisco CallManager fundamentals 
Publication information: Indianapolis, Ind. : Cisco Press, c2006 (2009 printing)
Format: Book
Call Number: TK5105.8865 .C35 2006
Implementing Cisco Unified Communications manager 
Author: Hartmann, Dennis
Publication information: Indianapolis, Ind. : Cisco Press, c2008-c2009
Format: Book
Call Number: TK5105.8865 .H38 2008
Cisco Voice over IP (CVOICE) 
Author: Wallace, Kevin, CCNP
Publication information: Indianapolis, IN : Cisco Press, c2009
Format: Digital Resource
Call Number: TK5105.8865 .W3345 2009
Twitter 
Author: McFedries, Paul
Publication information: Indianapolis, IN : Wiley Publishing, Inc., c2009
Format: Book
Call Number: TK5105.888 .M3414 2009
Twitter API 
Author: Makice, Kevin
Publication information: Beijing Sebastopol, CA : O'Reilly, c2009
Format: Book
Call Number: TK5105.888 .M34395 2009
Description: This groundbreaking book provides you with the skills and resources necessary to build web applications for Twitter. --Publishers description
The web design business kit 
Author: Sinclair, Brendon
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: TK5105.888 .S572 2007
RESTful.NET 
Author: Flanders, Jon, 1969-
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.88813 .F53 2009
Java web services 
Author: Kalin, Martin
Publication information: Sebastopol, Calif. : O'Reilly, 2009
Format: Book
Call Number: TK5105.88813 .K355 2009
Semantic Web for dummies 
Author: Pollock, Jeffrey T
Publication information: Hoboken, N.J. : Wiley Publishing, c2009
Format: Book
Call Number: TK5105.88815 .P65 2009
MediaWiki 
Author: Barrett, Daniel J
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.8882 .B37 2008
Blogging for dummies 
Author: Gardner, Susannah
Publication information: Hoboken, N.J. : Wiley Pub. Co., c2008
Format: Book
Call Number: TK5105.8884 .G37 2008
Description: Provides information on setting up, publishing, and maintaining a blog
Building a WordPress blog people want to read 
Author: McNulty, Scott
Publication information: Berkeley, Calif. : Peachpit London : Pearson Education [distributor], 2009
Format: Book
Call Number: TK5105.8884 .M36 2009
Description: Learn how to: install and get your WordPress blog running set up your site to ensure it can easily grow with you and your readers be the master of user accounts manage your site with the WordPress Dashboard and extend its capabilities with plug-ins, and maintain your site while fixing common problems
Professional ASP.NET MVC 1.0 
Publication information: Indianapolis, IN : Wiley Pub., c2009
Format: Book
Call Number: TK5105.8885.A26 P7874 2009
High performance web sites 
Author: Souders, Steve
Publication information: Farnham : O'Reilly, 2007
Format: Book
Call Number: TK5105.8885.A26 S66 2007
Description: Presents a collection of fourteen rules to help optimize the performance of a Web site
Beginning ASP.NET 3.5 in C# and VB 
Author: Spaanjaars, Imar
Publication information: Indianapolis, IN : Wrox/Wiley Technology Pub., c2008
Format: Book
Call Number: TK5105.8885.A26 S6815 2008
ASP.NET 3.5 unleashed 
Author: Walther, Stephen
Publication information: Indianapolis, Ind. : Sams, c2008
Format: Digital Resource
Call Number: TK5105.8885.A26 W3516 2008
Professional ASP.NET 3.5 Ajax 
Publication information: Indianapolis, IN : Wiley Pub., c2009
Format: Book
Call Number: TK5105.8885.A52 P76 2009
Description: Describes how to create interactive Web applications using ASP.NET 3.5 Ajax, covering such topics as JavaScript, using the ScriptManager, working with animations, building custom controls, and testing and debugging
Dojo 
Author: Russell, Matthew A
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.8885.A52 R87 2008
Learning Drupal 6 module development 
Author: Butcher, Matt
Publication information: Birmingham, [England] : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885 .D78 B88 2008
Drupal for education and e-learning 
Author: Fitzgerald, Bill, 1968-
Publication information: Birmingham, UK : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885.D78 .F58 2008
Drupal 6 themes 
Author: Shreves, Ric
Publication information: Birmingham : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885.D78 S57 2008
Using Drupal 
Publication information: Beijing Cambridge, [MA] : O'Reilly, c2009
Format: Book
Call Number: TK5105.8885.D78 U84 2009
Google Apps 
Author: Conner, Nancy
Publication information: Beijing Sebastopol, CA : O'Reilly, 2008
Format: Book
Call Number: TK5105.8885.G643 C66 2008
Google apps hacks 
Author: Lenssen, Philipp
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: TK5105.8885.G643 L46 2008
Description: Can Google applications really become an alternative to the venerable Microsoft Office suite? Conventional wisdom may say no, but practical wisdom says otherwise. Google Apps Hacks gets you in on the action with several ingenious ways to push Google's web, mobile, and desktop apps to the limit
iPhone hacks 
Author: Jurick, David
Publication information: Beijing Sebastopol, CA : O'Reilly, 2009
Format: Book
Call Number: TK6570.M6 J87 2009
Beginning iPhone development 
Author: Mark, Dave
Publication information: Berkeley, CA : Apress New York, NY : Springer-Verlag New York [distributor], c2009
Format: Book
Call Number: TK6570.M6 M37 2009
iPhone open application development 
Author: Zdziarski, Jonathan A
Publication information: Beijing Cambridge [MA] : O'Reilly, 2009
Format: Book
Call Number: TK6570.M6 Z397 2009
Biometrics 
Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK7882.B56 B566 2008
Description: Showcases examples of high-tech biometrics in action, including electronic recognition of iris patterns, fingerprints, faces, hand vein patterns, handwriting and gait
Big brother, big business 
Publication information: Princeton, N.J. : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: TK7882.E2 B54 2008
Description: Examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light
Troubleshooting your PC for dummies 
Author: Gookin, Dan
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: TK7887 .G68 2008
Description: Provides information on PC maintenance and repair, covering such topics as system restore, using tech support, startup noises, a slow PC, finding lost files, Internet connections, changes in Windows Vista, Windows event logs, and computer shutdown
Information literacy meets library 2.0 
Publication information: London : Facet Publ., 2008
Format: Book
Call Number: Z674.75.I58 I54 2008
Our new public, a changing clientele 
Publication information: Westport, Conn. : Libraries Unlimited, c2008
Format: Book
Call Number: Z678 .O92 2008
Practical pedagogy for library instructors 
Publication information: Chicago : Association of College and Research Libraries, 2008
Format: Book
Call Number: Z711.25.C65 P73 2008
Virtual reference on a budget 
Publication information: Columbus, Ohio : Linworth Pub., c2008
Format: Book
Call Number: Z711.45 V575 2008
Research-based readers' advisory 
Author: Moyer, Jessica E
Publication information: Chicago : American Library Association, 2008
Format: Book
Call Number: Z711.55 .M69 2008
A disciplinary blueprint for the assessment of information literacy 
Author: Warner, Dorothy, 1948-
Publication information: Westport, Conn. : Libraries Unlimited, 2008
Format: Book
Call Number: ZA3075 .W37 2008
Wikipedia 
Author: Broughton, John
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: ZA4482 .B76 2008
Description: Wikipedia may be the biggest group writing project ever, but the one thing you won't find in this amazingly comprehensive encyclopedia is easy-to-follow guidance on how to contribute. This Missing Manual helps you avoid beginners' blunders and get you sounding like a pro from your first edit --P. [4] of cover;Provides information on editing, creating, and maintaining Wikipedia articles, collaborating with other editors, formatting and illustrating articles, and building a stronger encyclopedia
Wikipedia reader's guide 
Author: Broughton, John
Publication information: Sebastopol, Calif. : O'Reilly Media, c2008
Format: Book
Call Number: ZA4482 .B762 2008
printPrint · e-mailSend