Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (blues OR clues)
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Search alternatives
:
blues »
blue
Showing
101
-
120
of
153
Search:
'(blues OR clues)'
,
query time: 0.10s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
101
Automata, Languages and Programming : 30th International Colloquium, ICALP 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003. Proceedings
Published 2003
Springer Berlin Heidelberg
Table of Contents:
“
...-Restricted MST and Red-
Blue
Separation Problem -- Approximating Steiner k-Cuts -- MAX k-CUT and Approximating...
”
Read Now
102
Learning robotic process automation : create software robots and automate business processes with the leading RPA tool, UiPath
by
Tripathi, Alok Mani
Published 2018
Packt Publishing
Table of Contents:
“
... and plugins -- Bot runner -- Control center -- RPA platforms -- Automation Anywhere -- UiPath --
Blue
Prism...
”
Call Number:
QA76.76.A65
Read Now
103
Cybersecurity first principles : a reboot of strategy and tactics
by
Howard, Richard
Published 2023
John Wiley & Sons, Incorporated
Table of Contents:
“
...Red/
Blue
/Purple Team Operations: A Tactic for Intrusion Kill Chain Prevention -- Intelligence...
”
Call Number:
QA76.9.A25
Read Now
104
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
by
Death, Darren
Published 2017
Packt Publishing
Table of Contents:
“
... -- White hat or ethical hacker --
Blue
hat hacker -- Grey hat hacker -- Penetration testing -- Hacktivist...
”
Call Number:
TK5105.59
Read Now
105
Building serverless web applications : build scalable web apps using Serverless Framework on AWS
by
Zanon, Diego
Published 2017
Packt Publishing
Table of Contents:
“
... -- Development workflow --
Blue
-green deployment -- Deploying new versions with a different database model...
”
Call Number:
TK5105.8883
Read Now
106
High-Performance Computing and Networking : 7th International Conference, HPCN Europe 1999 Amsterdam, The Netherlands, April 12–14, 1999 Proceedings
Published 1999
Springer Berlin Heidelberg
Table of Contents:
“
... probes for virtual environments -- A gang-scheduling system for ASCI
blue
-pacific -- Towards quality...
”
Read Now
107
Jenkins 2.x continuous integration cookbook : over 90 recipes to produce great results using pro-level practices, techniques, and solutions
by
Soni, Mitesh
,
Berg, Alan Mark
Published 2017
Packt Publishing
Table of Contents:
“
...-to-end automation -- Getting ready -- How to do it... -- Getting started with the
Blue
Ocean dashboard...
”
Call Number:
QA76.76.Q35
Read Now
108
Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
by
Chebbi, Chiheb
Published 2018
Packt Publishing
Table of Contents:
“
... testing teams -- Red teaming --
Blue
teaming -- Purple teaming -- Pentesting standards and guidance...
”
Call Number:
QA76.9.A25
Read Now
109
Probabilistic data structures for blockchain-based internet of things applications
by
Kumar, Neeraj
,
Miglani, Arzoo
Published 2020
CRC Press
Table of Contents:
“
... Filter -- 10.2.3.9. Hierarchical BF -- 10.2.3.10. Stochastic Fair
Blue
-- 10.3. Quotient Filter -- 10.4...
”
Call Number:
QA76.9.B56
Read Now
110
LDAP in the Solaris operating environment : deploying secure directory services
by
Haines, Michael
Published 2004
Prentice Hall PTR
“
... performance LDAP in the Solaris Operating Environment is a follow-on to the Sun
Blue
Prints book Solaris...
”
Call Number:
QA76.76.O63
Read Now
111
The pentester blueprint : starting a career as an ethical hacker
by
Wylie, Phillip L.
Published 2021
John Wiley
“
...The Pentester
Blue
Print: Your Guide to Being a Pentester offers readers a chance to delve deeply...
”
Call Number:
TK5105.59
Read Now
112
Firewalls Don't Stop Dragons : A Step-by-Step Guide to Computer Security for Non-Techies
by
Parker, Carey
Published 2018
Apress
“
... most people, you have no
clue
how these things work and don't know the real threats. Protecting your...
”
Read Now
113
Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches
by
Orzach, Yoram
Published 2022
Packt Publishing Limited
“
... and email services Who this book is for This book is for red team and
blue
team pentesters, security...
”
Call Number:
TK5105.59
Read Now
114
More iPhone 3 Development : Tackling iPhone SDK 3
by
Mark, David
,
LaMarche, Jeff
Published 2009
Apress
“
... variety of networking mechanisms, from GameKit’s relatively simple
Blue
Tooth peer-to-peer model...
”
Read Now
115
Concise Guide to Object-Oriented Programming : An Accessible Approach Using Java
by
Sage, Kingsley
Published 2019
Springer International Publishing
“
... of programming languages, and a concise introduction to programming in Java using
Blue
J. Discusses classes...
”
Read Now
116
Certified Kubernetes application developer (CKAD)
Published 2022
Pearson IT Certification
“
... Kubernetes Use the Helm Package Manager Work with custom resources Implement
blue
/green deployments Implement...
”
Call Number:
QA76.76.A65
Read Now
117
Ethical hacking workshop : explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
by
Pillay, Rishalin
,
Abutheraa, Mohammed
Published 2023
Packt Publishing
“
... are looking to learn about ethical hacking. Individuals who are part of security teams,
blue
teams, purple...
”
Call Number:
QA76.9.A25
Read Now
118
J2EE™ Technology in Practice : Building Business Applications With the Java™ 2 Platform, Enterprise Edition
by
Cattell, R. G. G.
,
Partners, Jim
Published 2001
Addison-Wesley Professional
“
... International used the HP
Blue
Stone J2EE platform to implement the Web's first online catalog shopping portal...
”
Read Now
119
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
by
Borges, Dan
Published 2022
Packt Publishing
Call Number:
QA76.9.A25
Read Now
120
Operating system concepts
by
Silberschatz, Abraham
Published 2008
J. Wiley & Sons
“
... sports substantive revisions and organizational changes that
clue
you in to such cutting-edge...
”
Call Number:
QA76.77.O63
1
2
3
4
5
6
7
8
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
25
500 - Natural sciences & mathematics
11
620 - Engineering & allied operations
10
004 - Data processing & computer science
8
658 - General management
6
more ...
364 - Criminology
5
374 - Adult education
3
384 - Communications; telecommunication
3
745 - Decorative arts
3
330 - Economics
2
510 - Mathematics
2
001 - Knowledge
1
003 - Systems
1
300 - Social sciences
1
323 - Civil & political rights
1
332 - Financial economics
1
338 - Production
1
363 - Other social problems & services
1
600 - Technology
1
see all ...
less ...
Language
English
152
German
1
Collection
O'Reilly
95
Springer eBooks 2005-
46
Springer Book Archives -2004
12
Author
Parker, Carey
3
Barker, Jacquie
2
Bettany, Andrew
2
Both, David P.
2
Death, Darren
2
Dingare, Pranoday Pramod
2
more ...
Diogenes, Yuri
2
F. C.
2
Halsey, Mike
2
Horovitz, Alex
2
LaMarche, Jeff
2
Mark, David
2
Ozkaya, Erdal
2
Pathania, Nikhil
2
Stull, Edward
2
ACI Learning
1
Abbott, Doug
1
Abutheraa, Mohammed
1
Adams, Ed
1
Admasu, Bimrew Tamrat
1
Ajmi, Ahmad
1
Anandan, Sha
1
Anderson, Hyrum S.
1
Antonelli, Marcelo
1
Antony, Ranjith
1
Arcuri, Jennifer
1
Ardito, Carmelo
1
Asano, Takao
1
Ayele, Delele Worku
1
Badrinath, Ramamurthy
1
Baeten, Jos C.M.
1
Barker, Dylan
1
Barker, Philip
1
Beauchemin, Bob
1
Berg, Alan Mark
1
Berman, Jules J.
1
Bernhaupt, Regina
1
Bertino, Elisa
1
Bialaski, Tom
1
Bjönander, Stefan
1
Björnander, Stefan
1
Blair, Rebecca
1
Bodungen, Clint E.
1
Borges, Dan
1
Bostan, Barbaros
1
Both, David
1
Brabetz, Sebastian
1
Bravo, Cesar
1
Brion, Paul
1
Bruni, Paolo
1
Bubak, Marian
1
Burton, Bonnie
1
Calamoneri, Tiziana
1
Campbell, Ruairidh
1
Carey, Marcus J.
1
Cattell, R. G. G.
1
Chamberlain, Bradford L.
1
Chebbi, Chiheb
1
Chen, Hsinchun
1
Chen, Liqun
1
Cheok, Adrian David
1
Chinese Academy of Cyberspace Studies
1
Cirne, Walfredo
1
Copeland, Marshall
1
Courcier, Scar de
1
Crawley, Kim
1
Crow, Aaron
1
Damsgaard Jensen, Christian
1
Delir Haghighi, Pari
1
Desai, Narayan
1
Diaz, Josep
1
Dingledine, Roger
1
Dingsøyr, Torgeir
1
Domoney, Colin
1
Dongarra, Jack
1
Fanta, Solomon Workneh
1
Gagne, Greg
1
Gagné, Marcel
1
Galvin, Peter B.
1
Gerofi, Balazs
1
Goel, Ashok K.
1
Golle, Philippe
1
Gonzalez, David
1
Graham, Alan
1
Groom, Frank M.
1
Groom, Kevin M.
1
Gunasekera, Sheran
1
Habtu, Nigus Gabbiye
1
Hackett, Michael
1
Hagiya, Masami
1
Haines, Michael
1
Halldorsson, Magnus M.
1
Hammerbacher, Jeff
1
Hardy, Paul David
1
Heck, Norbert
1
Hedberg, Viktor
1
Heiser, Jay G.
1
Hertzberger, Bob
1
Hettema, Hinne
1
Hickey, Matthew
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=6&filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%28blues+OR+clues%29&type=AllFields
Send by Email
×
Loading...