Home > New Library Titles 2009 > New Computer Science Titles 2009
- Up in smoke
- Publication information: Hershey, PA : Idea Group Pub., c2005
Format: Book
Call Number: DA76.9.D348
- Coming of age in Second Life
- Author: Boellstorff, Tom, 1969-
Publication information: Princeton : Princeton University Press, c2008
Format: Book
Call Number: GN307.65 .B64 2008
- Baseball hacks
- Author: Adler, Joseph
Publication information: Sebastopol, CA : O'Reilly, c2006
Format: Book
Call Number: GV877 .A35 2006
- Alter ego
- Author: Cooper, Robbie, 1969-
Publication information: London : Chris Boot, 2007
Format: Book
Call Number: GV1469.25.S425 C66 2007
- The ultimate history of video games
- Author: Kent, Steve L
Publication information: Roseville, Calif. : Prima Pub., c2001
Format: Book
Call Number: GV1469.3 .K45 2001
- Vintage games
- Author: Loguidice, Bill
Publication information: Boston : Focal Press/Elsevier, c2009
Format: Book
Call Number: GV1469.3 .L64 2009
- Play the game
- Author: Novak, Jeannie, 1966-
Publication information: Boston, MA : Thomson Course Technology, c2008
Format: Book
Call Number: GV1469.3 .N68 2008
Description: Provides parents with information on video games currently on the market, using video games to promote learning and social growth of children, game development as a career, and how to use video games to strengthen communication with their children
- Groundswell
- Author: Li, Charlene
Publication information: Boston, Mass. : Harvard Business Press, c2008
Format: Book
Call Number: HC79.I55 L48 2008
- Lessons in grid computing
- Author: Robbins, Stuart, 1953-
Publication information: Hoboken, N.J. : Wiley, c2006
Format: Book
Call Number: HD30.2 .R627 2006
- Infotopia
- Author: Sunstein, Cass R
Publication information: New York Oxford : Oxford University Press, 2008
Format: Book
Call Number: HD30.2 .S85 2008
- The ten faces of innovation
- Author: Kelley, Tom, 1955-
Publication information: New York : Currency/Doubleday, c2005
Format: Book
Call Number: HD58.9 .K43 2005
Description: Reveals the strategies a major design firm uses to foster innovative thinking throughout an organization and overcome the naysayers who stifle creativity. The role of the devil's advocate allows individuals to raise questions and concerns that effectively kill new projects and ideas, while claiming no personal responsibility nothing is more potent in stifling innovation. Drawing on nearly 20 years of experience, Kelley identifies ten roles people can play in an organization to foster innovation and new ideas while offering an effective counter to naysayers.--From publisher description
- PR 2.0
- Author: Breakenridge, Deirdre
Publication information: Upper Saddle River, N.J. : FT Press, c2008
Format: Book
Call Number: HD59 .B743 2008
- Revolution in the valley
- Author: Hertzfeld, Andy
Publication information: Beijing Sebastopol, CA : O'Reilly, c2005
Format: Book
Call Number: HD9696.2.U64 A6734 2005
- The Google way
- Author: Girard, Bernard
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: HD9696.8.U64 G66513 2009
- One red paperclip
- Publication information: Hamilton, NJ : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: HF1019 .M332 2008
Description: Follows the experiences of Kyle MacDonald, an unemployed young Canadian with a dream to trade his way up from one red paperclip to a house in just one year using only his blog as his bartering tool
- The email marketing kit
- Author: Jennings, Jeanne S
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: HF5415.1265 .J452 2007
- The search engine marketing kit
- Author: Thies, Dan
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: HF5415.1265 .T553 2007
- Authenticity
- Author: Gilmore, James H., 1959-
Publication information: Boston, Mass. : Harvard Business School Press, c2007
Format: Book
Call Number: HF5415.15 .G55 2007
- Computer security handbook
- Publication information: Hoboken, N.J. : John Wiley & Sons, c2009
Format: Book
Call Number: HF5548.37 .C64 2009
- Payment card industry data security standard handbook
- Author: Virtue, Timothy M., 1975-
Publication information: Hoboken, N.J. : John Wiley & Sons, c2009
Format: Book
Call Number: HG3755.7 .V57 2009
- Facebook for dummies
- Author: Abram, Carolyn
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: HM742 .A24 2008
Description: A guide to using the online social network provides information on creating a profile, communicating with friends, using Facebook applications, and using Facebook to improve one's business
- Building Facebook applications for dummies
- Author: Wagner, Richard, 1966-
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: HM742 .W342 2008
- The end of radio
- Publication information: 1 videodisc (23 min.) : sd., col. with b&w sequences 4 3/4 in
Format: DVD
Call Number: HM851 .E63 2007 pt.3
Description: Today's teens still listen to a lot of music, but it doesn't come from conventional radio. This program takes the pulse of an industry that seems to be on the verge of dying as the shortcomings of airwave radio are measured against internet radio, podcasting, satellite radio, and HD radio
- Teen girls and technology
- Author: Farmer, Lesley S. J
Publication information: New York : Teachers College Press Chicago, IL : ALA Editions, c2008
Format: Book
Call Number: HQ798 .F37 2008
Description: Provides a framework that teachers, librarians, youth workers, and parents can use to empower girls to succeed in today's technology-rich world
- Cyber safety
- Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: HQ799.2.I5 C924 2008
Description: Warns students about how vulnerable they are whenever they venture into the cyber realm-- even when they think they are among friends . Explains how to take precautions in chat rooms and social networking sites.
- Identity theft handbook
- Author: Biegelman, Martin T
Publication information: Hoboken, N.J. : Wiley, c2009
Format: Book
Call Number: HV6679 .B54 2009
- Phishing and countermeasures
- Publication information: Hoboken, N.J. : Wiley-Interscience, c2007
Format: Book
Call Number: HV6773 .J345 2007
- Human security
- Author: Kaldor, Mary
Publication information: Cambridge, UK Malden, MA : Polity, 2007
Format: Book
Call Number: JZ5595 .K35 2007
- Online social networking on campus
- Author: Martínez Alemán, Ana M
Publication information: New York, NY : Routledge, 2009
Format: Book
Call Number: LA229 .M345 2009
- Computers and information technology
- Publication information: Hamilton, NJ : Cambridge Educational, c2009
Format: DVD
Call Number: QA76.25 .C666 2009
Description: Examines various computer and technology (IT) careers: webmaster, multimedia graphic designer, computer repair specialist, system administrator, etc. Contains interviews with people working in the careers who talk about their jobs and give career advice
- Information technology
- Publication information: Lawrenceville, NJ : Cambridge Educational, 2007
Format: DVD
Call Number: QA76.25 .I546 2007
Description: Interviews women who have found success in the IT field. Profiles a computer service support technician specializing in sales and installation, a desktop support analyst who troubleshoots and repairs client problems, and a software developer producing high-end tools for digital image creation. Includes interviews with co-workers and supervisors help to create well-rounded descriptions of each job
- CCNA practice questions (exam 640-802)
- Author: Cioara, Jeremy
Publication information: Indianapolis, IN : Que Pub., c2008
Format: Digital Resource
Call Number: QA76.3 .C48 2008
- Network fundamentals
- Author: Dye, Mark A
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Digital Resource
Call Number: QA76.3 .D94 2008
- CCNP BCMSN exam certification guide
- Author: Hucaby, Dave
Publication information: Indianapolis, Ind. : Cisco Press, 2007
Format: Digital Resource
Call Number: QA76.3 .H83 2007
- CompTIA Linux+ certification
- Author: Jang, Michael H
Publication information: New York : McGraw-Hill, c2008
Format: Digital Resource
Call Number: QA76.3 .J336 2008
- CCNA
- Author: Lammle, Todd
Publication information: Indianapolis, Ind. Chichester : Wiley, c2007
Format: Digital Resource
Call Number: QA76.3 .L35 2007
- CCNA ICND2 official exam certification guide
- Author: Odom, Wendell
Publication information: Indianapolis, IN : Cisco Press, c2008
Format: Digital Resource
Call Number: QA76.3 .O3618 2008
- Introducing Microsoft Silverlight 2.0
- Author: Moroney, Laurence
Publication information: Redmond, WA : Microsoft Press, 2008
Format: Book
Call Number: QA76.575 .M6643 2008
- Data-driven services with Silverlight 2
- Author: Papa, John
Publication information: Sebastopol, CA : O'Reilly, 2009
Format: Book
Call Number: QA76.575 .P347 2009
- Version control with subversion
- Author: Pilato, C. Michael
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.6 .C6274 2008
- Starting out with programming logic & design
- Author: Gaddis, Tony
Publication information: Boston : Pearson Addison Wesley, c2008
Format: Digital Resource
Call Number: QA76.6 .G315 2008
- Expert F#
- Author: Syme, Don
Publication information: Berkeley, CA : Apress New York, NY : Distributed to the book trade worldwide by Springer-Verlag New York, c2007
Format: Book
Call Number: QA76.62 .S96 2007
- Adobe Air in action
- Publication information: Greenwich, CT : Manning, c2009
Format: Book
Call Number: QA76.625 .A32 2009
- Programming Visual Basic 2008
- Author: Patrick, Tim, 1966-
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.73.B3 P38 2008
- jQuery in action
- Author: Bibeault, Bear
Publication information: Greenwich, CT : Manning, c2008
Format: Book
Call Number: QA76.73.J38 B517 2008
- JavaScript
- Author: Crockford, Douglas
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: QA76.73.J39 C763 2008
- Practical Prototype and Script.aculo.us.
- Author: Dupont, Andrew
Publication information: Berkeley, CA : Apress, 2008
Format: Book
Call Number: QA76.73.J39 D867 2008
- Beginning CakePHP
- Author: Golding, David
Publication information: Berkeley, CA : Apress New York : distributed by Springer-Verlag, c2008
Format: Book
Call Number: QA76.73.P224 G65 2008
- Head first Rails
- Author: Griffiths, David
Publication information: Beijing Sebastopol : O'Reilly, c2009
Format: Book
Call Number: QA76.73.R83 G73 2009
- Learning Rails
- Author: St. Laurent, Simon
Publication information: Sebastopol, CA : O'Reilly Media Inc., 2008
Format: Book
Call Number: QA76.73.R83 S72 2008
- Learning SQL
- Author: Beaulieu, Alan
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.73.S67 B43 2009
- SQL and relational theory
- Author: Date, C. J
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.73.S67 D38 2009
- Beautiful architecture
- Publication information: Sebastopol, Calif. : O'Reilly, 2009
Format: Book
Call Number: QA76.754 .B43 2009
- ITIL V3 Foundation complete certification kit
- Publication information: Brisbane, Australia : The Art of Service Pty Ltd, c2008
Format: Book
Call Number: QA76.76.C69 I84 2008
- Don't spend a dime
- Author: Kelly, James Floyd
Publication information: Berkeley, CA : Apress, c2009
Format: Book
Call Number: QA76.76.C73 K44 2009
- iWork '09
- Author: Clark, Josh
Publication information: Sebastopol, Calif. : Pogue Press/O'Reilly Media Inc., c2009
Format: Book
Call Number: QA76.76.I59 C52 2009
Description: With this book you will quickly learn everything you need to know about Apple's incredible productivity programs, including the Pages word-processor, the Numbers spreadsheet, and the Keynote presentation program that Al Gore and Steve Jobs made famous. This book gives you jargon-free explanations of iWork's capabilities, advantages, and limitations to help you quickly produce stunning documents and cinema-quality digital presentations --Publisher's description
- iWork '08
- Author: Harrington, Richard, 1972-
Publication information: Berkeley, CA : Peachpit Press, c2008
Format: Digital Resource
Call Number: QA76.76.I59 H3763 2008
Description: Provides instructions on using iWork '08 to create and publish business presentations
- Hacking exposed Linux
- Publication information: New York : McGraw-Hill, c2008
Format: Book
Call Number: QA76.76.O63 H375 2008
- Microsoft's Vista
- Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2007
Format: DVD
Call Number: QA76.76.O63 M523 2007
Description: Examines the launch of the Vista operating system. Takes viewers into the meetings -- and inside the minds -- that decided on key aspects of the operating system and its debut. CEO Steve Ballmer, Windows Marketing Vice President Mike Sievert, Vista Design Director Tjeerd Hoek, Vista Creative Director Jenny Lam, and others in the know discuss the development of Vista, the Vista Wow advertising campaign, pre-launch PR events, the maddening delays that plagued the project, and even the design of the iconic Start button. Includes background on Bill Gates and Microsoft
- Ubuntu kung fu
- Author: Thomas, Keir
Publication information: Raleigh, N.C. : Pragmatic Bookshelf, c2008
Format: Book
Call Number: QA76.76.O63 T4964 2008
- OpenSUSE 11.0 and SUSE Linux enterprise server bible
- Author: Whittaker, Roger, 1955-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Digital Resource
Call Number: QA76.76.O63 W488 2008
- Principles of information systems security
- Author: Dhillon, Gurpreet, 1963-
Publication information: Hoboken, NJ : John Wiley & Sons, c2007
Format: Book
Call Number: QA76.9.A25 D525 2007
- E-mail alert
- Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: QA76.9.A25 E435 2008
Description: Learn how deleted e-mails are retrieved and how those indiscreet bits of e-evidence are influencing litigation and causing consternation for companies in North America
- Hacking
- Author: Erickson, Jon, 1977-
Publication information: San Francisco, CA : No Starch Press, c2008
Format: Digital Resource
Call Number: QA76.9.A25 E75 2008
- Windows Vista security
- Author: Grimes, Roger A
Publication information: Indianapolis, IN : Wiley Pub., c2007
Format: Book
Call Number: QA76.9.A25 G777 2007
- Computer security and cryptography
- Author: Konheim, Alan G., 1934-
Publication information: Hoboken, N.J. : Wiley-Interscience, c2007
Format: Book
Call Number: QA76.9.A25 K638 2007
- Risks, controls, and security
- Author: Raval, Vasant H. (Vasant Harishanker), 1940-
Publication information: Hoboken, NJ : Wiley, c2007
Format: Book
Call Number: QA76.9.A25 R38 2007
- Sc@mmed
- Publication information: Princeton, N.J. : Films for the Humanities & Sciences , c2007
Format: DVD
Call Number: QA76.9.A25 S296 2007
Description: Examines phishing, the illegal gathering of others' personal information online in order to steal all their money--and even their identities. Shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving up their most sensitive financial and personal information
- Hacking exposed Windows
- Author: Scambray, Joel
Publication information: New York, NY : McGraw-Hill, c2008
Format: Book
Call Number: QA76.9.A25 S3 2008
- Schneier on security
- Author: Schneier, Bruce, 1963-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: QA76.9.A25 S35145 2008
- Implementing email and security tokens
- Author: Turner, Sean H
Publication information: Indianapolis, IN : Wiley, c2008
Format: Book
Call Number: QA76.9.A25 T874 2008
- Algorithms
- Author: Heineman, George T
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: QA76.9.A43 H45 2008
- 97 things every software architect should know
- Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: QA76.9.A73 N56 2009
- BBS
- Publication information: [S.l. : s.n.], 2005
Format: DVD
Call Number: QA76.9.B84 B37 2005
Description: Examines the history of the dial-up Bulletin Board System
- Windows Small business server 2008 unleashed
- Publication information: Indianapolis, Ind. : Sams, c2009
Format: Book
Call Number: QA76.9.C55 W55 2009
- Grid computing security
- Author: Chakrabarti, Anirban
Publication information: Berlin New York : Springer, 2007
Format: Book
Call Number: QA76.9.C58 C53 2007
- Electric dreams
- Author: Friedman, Ted
Publication information: New York : New York University Press, c2005
Format: Book
Call Number: QA76.9.C66 F745 2005
- Programming entity framework
- Author: Lerman, Julia
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: QA76.9.D26 L47 2009
- Scripting your world
- Author: Moore, Dana, 1947-
Publication information: Indianapolis, Ind. : Wiley Pub., c2008
Format: Book
Call Number: QA76.9.E57 M66 2008
- Computing for the older and wiser
- Author: Arnold, Adrian
Publication information: Chichester, England Hoboken, NJ : John Wiley & Sons, c2008
Format: Book
Call Number: QA76.9.O43 A76 2008
- Virtualization
- Author: Ruest, Danielle
Publication information: New York : McGraw Hill, c2009
Format: Book
Call Number: QA76.9.V5 R88 2009
- An army of Davids
- Author: Reynolds, Glenn H
Publication information: Nashville, Tenn. : Thomas Nelson, c2007
Format: Book
Call Number: T14.5 .R48 2007
- IT security interviews exposed
- Publication information: Indianapolis, IN : Wiley, c2007
Format: Book
Call Number: T58.5 .I836 2007
- Watching me watching you
- Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.1
Description: Discusses the use of nanotechnology in terms of privacy and public safety
- Forever young?
- Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.2
Description: Discusses the use of nanotechnology to improve medical care and enhance the human body
- Clean, green and unseen
- Publication information: [Hamilton, NJ] : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: T174.7 .N377 2008 pt.3
Description: Discusses the use of nanotechnology and its impact on ecosystems and communities
- Hacking exposed wireless
- Author: Cache, Johnny
Publication information: New York, NY : McGraw-Hill, c2007
Format: Book
Call Number: TK5103.2 .C23 2007
- CCNA portable command guide
- Author: Empson, Scott
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Book
Call Number: TK5105.5 .E4352 2008
- Interconnecting Cisco network devices
- Author: McQuerry, Steve
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Book
Call Number: TK5105.5 .M33992 2008
- CCNP BSCI official exam certification guide
- Author: Stewart, Brent
Publication information: Indianapolis, Ind. : Cisco Press, c2008
Format: Digital Resource
Call Number: TK5105.5 .S848 2008
- Building scalable Cisco internetworks (BSCI)
- Author: Teare, Diane
Publication information: Indianapolis, Ind. : Cisco Press, c2007
Format: Book
Call Number: TK5105.5 .T4177 2007
- Cisco routers for the desperate
- Author: Lucas, Michael, 1967-
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: TK5105.543 .L83 2009
- IP addressing and subnetting
- Author: Wegner, J. D
Publication information: Rockland, Mass. : Syngress Media, c2000
Format: Book
Call Number: TK5105.585 .W44 2000
- Can you hack it?
- Publication information: Hamilton, NJ : Films for the Humanities & Sciences, c2008
Format: CD
Call Number: TK5105.59 .C36 2008
Description: Examines how crippling database invasions can be launched from almost any computer, grabbing massive chunks of personal information seemingly out of thin air. Features several case studies--including one retailer that recently announced the theft of 40 million credit card numbers--as well as the consequences arising when businesses are not obligated to disclose security breaches
- Security+ guide to network security fundamentals
- Author: Ciampa, Mark D
Publication information: Clifton Park, N.Y. : Delmar Learning London : Cengage Learning [distributor], 2009
Format: Digital Resource
Call Number: TK5105.59 .C53 2009
- Cyber security
- Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: TK5105.59 .C924 2008
Description: The Internet offers vast possibilities for learning, making a living, and having fun. It can also destroy reputations, empty bank accounts, and ruin lives. Highlights the importance of setting up a firewall and keeping one's operating system up-to-date to protect against hackers, viruses, Trojan horses, spyware, adware, phishing emails, and other high-tech threats
- Security monitoring
- Author: Fry, Chris
Publication information: Beijing Cambridge [Mass.] : O'Reilly, c2009
Format: Book
Call Number: TK5105.59 .F79 2009
- Implementing 802.1X security solutions for wired and wireless networks
- Author: Geier, James T
Publication information: Indianapolis, IN : Wiley, c2008
Format: Book
Call Number: TK5105.59 .G45 2008
- Build your own security lab
- Author: Gregg, Michael (Michael C.)
Publication information: Indianapolis, IN : Wiley, c2008
Format: Digital Resource
Call Number: TK5105.59 .G73 2008
- Disaster survival guide for business communications networks
- Author: Grigonis, Richard
Publication information: New York, NY : CMP Books Berkeley, CA : Publishers Group West [distributor], c2002
Format: Book
Call Number: TK5105.59 .G75 2002
- Handbook of information security
- Publication information: Hoboken, N.J. : John Wiley, c2006
Format: Book
Call Number: TK5105.59 .H35 2006
- Web security testing cookbook
- Author: Hope, Paco
Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: TK5105.59 .H67 2009
- The CISSP and CAP prep guide
- Author: Krutz, Ronald L., 1938-
Publication information: Indianapolis, IN: Wiley, c2007
Format: Digital Resource
Call Number: TK5105.59 .K782 2007
- Hacking exposed 6
- Author: McClure, Stuart
Publication information: New York : McGraw-Hill, c2009
Format: Book
Call Number: TK5105.59 .M48 2009
- CCSP
- Author: Menga, Justin
Publication information: San Francisco, Calif. London : SYBEX, 2004
Format: Digital Resource
Call Number: TK5105.59 .M49 2004
- CISSP for dummies
- Author: Miller, Lawrence
Publication information: Indianapolis, IN : Wiley Pub., 2007
Format: Digital Resource
Call Number: TK5105.59 .M55 2007
- Network security 1 and 2 companion guide
- Author: Rufi, Antoon W
Publication information: Indianapolis, Ind. : Cisco Press, c2007
Format: Digital Resource
Call Number: TK5105.59 .R837 2007
- CISSP
- Author: Stewart, James Michael
Publication information: Indianapolis, Ind. : Wiley Pub., c2008
Format: Digital Resource
Call Number: TK5105.59 .T5735 2008
- CCNA security official exam certification guide
- Author: Watkins, Michael, CCNA
Publication information: Indianapolis, IN : Cisco Press, c2008
Format: Book
Call Number: TK5105.59 .W37 2008
- Secure computer and network systems
- Author: Ye, Nong
Publication information: Chichester, England Hoboken, NJ : J. Wiley & Sons, c2008
Format: Book
Call Number: TK5105.59 .Y44 2008
- Implementing NAP and NAC security technologies
- Author: Hoffman, Daniel (Daniel V.), 1972-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: TK5105.597 .H64 2008
- Txtng
- Author: Crystal, David, 1941-
Publication information: Oxford New York : Oxford University Press, 2008
Format: Book
Call Number: TK5105.73 .C79 2008
- Email is ruining my life!
- Publication information: Hamilton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK5105.73 .E435 2008
Description: Examines the phenomenon of the e-mail avalanche--its origins, its effects on work and everyday life, and how it can be avoided or at least reduced. Includes commentary from Ray Tomlinson, the principal inventor of e-mail
- Spam
- Publication information: Lawrenceville, N.J. : Cambridge Educational, c2005
Format: DVD
Call Number: TK5105.73 .S663 2005
Description: Explains how shady advertisers send spam and presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation, and greater cooperation between legitimate businesses, Internet and online service providers, and consumers
- Network know-how
- Author: Ross, John, 1947-
Publication information: San Francisco : No Starch Press, c2009
Format: Book
Call Number: TK5105.75 .R667 2009
- The book of wireless
- Author: Ross, John, 1947-
Publication information: San Francisco : No Starch Press, c2008
Format: Book
Call Number: TK5105.78 .R67 2008
- CCNP BSCI portable command guide
- Author: Empson, Scott
Publication information: Indianapolis, IN : Cisco Press, c2007
Format: Book
Call Number: TK5105.8.C57 E56 2007
- Using the Internet safely for seniors for dummies
- Author: Criddle, Linda
Publication information: Hoboken, NJ : Wiley Pub. Chichester : John Wiley [distributor], c2009
Format: Book
Call Number: TK5105.875.I57 C72 2009
- Internet careers
- Publication information: South Charleston, WV : Cambridge Educational, c2008
Format: DVD
Call Number: TK5105.875.I57 I544 2008
Description: Explores Internet careers in three main areas: the front end, the back end, and everywhere in between. Front-end insights come from a programmer, a graphic designer, and a quality assurance tester back-end information is provided by a webmaster, a help desk specialist, and a sales associate and an IT recruiter, an advertising sales rep, and an entrepreneur explain how they've integrated the Internet into their careers
- The web application hacker's handbook
- Author: Stuttard, Dafydd, 1972-
Publication information: Indianapolis, IN : Wiley Pub., c2008
Format: Book
Call Number: TK5105.875.I57 S85 2008
- SharePoint for project managers
- Author: Sy, Dux Raymond
Publication information: Farnham : O'Reilly, 2009
Format: Book
Call Number: TK5105.875.I6 S9 2009
- Cyber ethics
- Publication information: Princeton, NJ : Cambridge Educational, 2008, c2007
Format: DVD
Call Number: TK5105.878 .C924 2008
Description: This program aims to help students build an ethically sound Internet presence and lifestyle. Discusses issues such as intellectual property, pornography, gaming, chat rooms, and social networks
- Should we be afraid of Google?
- Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK5105.885.G66 S568 2007
Description: Tells the history of Google along with the pros and cons of some of Google's other initiatives. Presents detailed background on cofounders Larry Page and Sergey Brin
- Cisco CallManager fundamentals
- Publication information: Indianapolis, Ind. : Cisco Press, c2006 (2009 printing)
Format: Book
Call Number: TK5105.8865 .C35 2006
- Implementing Cisco Unified Communications manager
- Author: Hartmann, Dennis
Publication information: Indianapolis, Ind. : Cisco Press, c2008-c2009
Format: Book
Call Number: TK5105.8865 .H38 2008
- Cisco Voice over IP (CVOICE)
- Author: Wallace, Kevin, CCNP
Publication information: Indianapolis, IN : Cisco Press, c2009
Format: Digital Resource
Call Number: TK5105.8865 .W3345 2009
- Twitter
- Author: McFedries, Paul
Publication information: Indianapolis, IN : Wiley Publishing, Inc., c2009
Format: Book
Call Number: TK5105.888 .M3414 2009
- Twitter API
- Author: Makice, Kevin
Publication information: Beijing Sebastopol, CA : O'Reilly, c2009
Format: Book
Call Number: TK5105.888 .M34395 2009
Description: This groundbreaking book provides you with the skills and resources necessary to build web applications for Twitter. --Publishers description
- The web design business kit
- Author: Sinclair, Brendon
Publication information: Collingwood, Vic. : SitePoint, 2007
Format: Digital Resource
Call Number: TK5105.888 .S572 2007
- RESTful.NET
- Author: Flanders, Jon, 1969-
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.88813 .F53 2009
- Java web services
- Author: Kalin, Martin
Publication information: Sebastopol, Calif. : O'Reilly, 2009
Format: Book
Call Number: TK5105.88813 .K355 2009
- Semantic Web for dummies
- Author: Pollock, Jeffrey T
Publication information: Hoboken, N.J. : Wiley Publishing, c2009
Format: Book
Call Number: TK5105.88815 .P65 2009
- MediaWiki
- Author: Barrett, Daniel J
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.8882 .B37 2008
- Blogging for dummies
- Author: Gardner, Susannah
Publication information: Hoboken, N.J. : Wiley Pub. Co., c2008
Format: Book
Call Number: TK5105.8884 .G37 2008
Description: Provides information on setting up, publishing, and maintaining a blog
- Building a WordPress blog people want to read
- Author: McNulty, Scott
Publication information: Berkeley, Calif. : Peachpit London : Pearson Education [distributor], 2009
Format: Book
Call Number: TK5105.8884 .M36 2009
Description: Learn how to: install and get your WordPress blog running set up your site to ensure it can easily grow with you and your readers be the master of user accounts manage your site with the WordPress Dashboard and extend its capabilities with plug-ins, and maintain your site while fixing common problems
- Professional ASP.NET MVC 1.0
- Publication information: Indianapolis, IN : Wiley Pub., c2009
Format: Book
Call Number: TK5105.8885.A26 P7874 2009
- High performance web sites
- Author: Souders, Steve
Publication information: Farnham : O'Reilly, 2007
Format: Book
Call Number: TK5105.8885.A26 S66 2007
Description: Presents a collection of fourteen rules to help optimize the performance of a Web site
- Beginning ASP.NET 3.5 in C# and VB
- Author: Spaanjaars, Imar
Publication information: Indianapolis, IN : Wrox/Wiley Technology Pub., c2008
Format: Book
Call Number: TK5105.8885.A26 S6815 2008
- ASP.NET 3.5 unleashed
- Author: Walther, Stephen
Publication information: Indianapolis, Ind. : Sams, c2008
Format: Digital Resource
Call Number: TK5105.8885.A26 W3516 2008
- Professional ASP.NET 3.5 Ajax
- Publication information: Indianapolis, IN : Wiley Pub., c2009
Format: Book
Call Number: TK5105.8885.A52 P76 2009
Description: Describes how to create interactive Web applications using ASP.NET 3.5 Ajax, covering such topics as JavaScript, using the ScriptManager, working with animations, building custom controls, and testing and debugging
- Dojo
- Author: Russell, Matthew A
Publication information: Farnham : O'Reilly, 2008
Format: Book
Call Number: TK5105.8885.A52 R87 2008
- Learning Drupal 6 module development
- Author: Butcher, Matt
Publication information: Birmingham, [England] : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885 .D78 B88 2008
- Drupal for education and e-learning
- Author: Fitzgerald, Bill, 1968-
Publication information: Birmingham, UK : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885.D78 .F58 2008
- Drupal 6 themes
- Author: Shreves, Ric
Publication information: Birmingham : Packt Publishing, 2008
Format: Book
Call Number: TK5105.8885.D78 S57 2008
- Using Drupal
- Publication information: Beijing Cambridge, [MA] : O'Reilly, c2009
Format: Book
Call Number: TK5105.8885.D78 U84 2009
- Google Apps
- Author: Conner, Nancy
Publication information: Beijing Sebastopol, CA : O'Reilly, 2008
Format: Book
Call Number: TK5105.8885.G643 C66 2008
- Google apps hacks
- Author: Lenssen, Philipp
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: TK5105.8885.G643 L46 2008
Description: Can Google applications really become an alternative to the venerable Microsoft Office suite? Conventional wisdom may say no, but practical wisdom says otherwise. Google Apps Hacks gets you in on the action with several ingenious ways to push Google's web, mobile, and desktop apps to the limit
- iPhone hacks
- Author: Jurick, David
Publication information: Beijing Sebastopol, CA : O'Reilly, 2009
Format: Book
Call Number: TK6570.M6 J87 2009
- Beginning iPhone development
- Author: Mark, Dave
Publication information: Berkeley, CA : Apress New York, NY : Springer-Verlag New York [distributor], c2009
Format: Book
Call Number: TK6570.M6 M37 2009
- iPhone open application development
- Author: Zdziarski, Jonathan A
Publication information: Beijing Cambridge [MA] : O'Reilly, 2009
Format: Book
Call Number: TK6570.M6 Z397 2009
- Biometrics
- Publication information: Princeton, NJ : Films for the Humanities & Sciences, c2008
Format: DVD
Call Number: TK7882.B56 B566 2008
Description: Showcases examples of high-tech biometrics in action, including electronic recognition of iris patterns, fingerprints, faces, hand vein patterns, handwriting and gait
- Big brother, big business
- Publication information: Princeton, N.J. : Films for the Humanities & Sciences, [2008]
Format: DVD
Call Number: TK7882.E2 B54 2008
Description: Examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light
- Troubleshooting your PC for dummies
- Author: Gookin, Dan
Publication information: Hoboken, N.J. : Wiley Chichester : John Wiley [distributor], 2008
Format: Book
Call Number: TK7887 .G68 2008
Description: Provides information on PC maintenance and repair, covering such topics as system restore, using tech support, startup noises, a slow PC, finding lost files, Internet connections, changes in Windows Vista, Windows event logs, and computer shutdown
- Information literacy meets library 2.0
- Publication information: London : Facet Publ., 2008
Format: Book
Call Number: Z674.75.I58 I54 2008
- Our new public, a changing clientele
- Publication information: Westport, Conn. : Libraries Unlimited, c2008
Format: Book
Call Number: Z678 .O92 2008
- Practical pedagogy for library instructors
- Publication information: Chicago : Association of College and Research Libraries, 2008
Format: Book
Call Number: Z711.25.C65 P73 2008
- Virtual reference on a budget
- Publication information: Columbus, Ohio : Linworth Pub., c2008
Format: Book
Call Number: Z711.45 V575 2008
- Research-based readers' advisory
- Author: Moyer, Jessica E
Publication information: Chicago : American Library Association, 2008
Format: Book
Call Number: Z711.55 .M69 2008
- A disciplinary blueprint for the assessment of information literacy
- Author: Warner, Dorothy, 1948-
Publication information: Westport, Conn. : Libraries Unlimited, 2008
Format: Book
Call Number: ZA3075 .W37 2008
- Wikipedia
- Author: Broughton, John
Publication information: Beijing Cambridge : O'Reilly, c2008
Format: Book
Call Number: ZA4482 .B76 2008
Description: Wikipedia may be the biggest group writing project ever, but the one thing you won't find in this amazingly comprehensive encyclopedia is easy-to-follow guidance on how to contribute. This Missing Manual helps you avoid beginners' blunders and get you sounding like a pro from your first edit --P. [4] of cover;Provides information on editing, creating, and maintaining Wikipedia articles, collaborating with other editors, formatting and illustrating articles, and building a stronger encyclopedia
- Wikipedia reader's guide
- Author: Broughton, John
Publication information: Sebastopol, Calif. : O'Reilly Media, c2008
Format: Book
Call Number: ZA4482 .B762 2008