# | Title | Author | Publisher | Category | JKU Bib Reference | Win Bib Reference | Status | Borrower |
---|---|---|---|---|---|---|---|---|
1 | Client/Server - Konzepte | Rene Löschl | JKU | Bachelorarbeiten | nan | 21.018 |
Available |
No One |
2 | Dynamische Webanwendung; Konzepte und Techniken der Frameworks Angular JS and React | Thomas Ernst Stöllner | JKU | Diplomarbeiten / Masterarbeit | nan | 19.401 |
Available |
No One |
3 | Analyse von NodeJS Template-Engnes | Stefan Wolfsteiner | JKU | Bachelorarbeiten | nan | 21.017 |
Available |
No One |
4 | Datenschutz-Grundverordnung | Jürgen Kühling | C.H.Beck | Sonstiges | Win.g.49 | 18.374 |
Borrowed |
Stefan Schiffer |
5 | Handbuch IT-Management: Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis | Ernst Tiemeyer | Carl Hanser Verlag GmbH & CO. KG | Sonstiges | Win.f.569 | 18.377 |
Available |
No One |
6 | Erste Hilfe zur Datenschutz-Grundverordnung für Unternehmen und Vereine: Was müssen Verantwortliche beachten? | Bayerischen Landesamt für Datenschutzaufsicht | C.H.Beck | Sonstiges | Win.g.50 | 18.378 |
Available |
No One |
7 | Datenschutz-Compliance nach der DS-GVO: Handlungshilfe für Verantwortliche inklusive Prüffragen für Aufsichtsbehörden | Thomas Kranig, Andreas Sachs, Markus Gierschmann | Bundesanzeiger | Sonstiges | Win.g.48 | 18.372 |
Available |
No One |
8 | Neuerungen im europäischen Datenschutzrecht für Unternehmen | Christoph Grabenwarter, Ferdinand Graf, Maria Mercedes Ritschl | MANZ Verlag Wien | Sonstiges | Win.g.47 | 18.369 |
Available |
No One |
9 | The DevOPS Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations | Gene Kim, John Willis, Patrick Debois, Jez Humble | It Revolution Press | Sonstiges | Win.a.369 | 18.367 |
Available |
No One |
10 | Infrastructure as Code: Managing Servers in the Cloud | Kief Morris | O'Reilly UK Ltd. | Sonstiges | Win.f.741 | 18.371 |
Borrowed |
Johannes Sametinger |
11 | Site Reliability Engineering: How Google Runs Production Systems | Betsy Beyer, Chris Jones, Jennifer Petoff, Niall Richard Murphy | O'Reilly UK Ltd. | Sonstiges | Win.h.258 | 18.366 |
Borrowed |
Johannes Sametinger |
12 | Domain-Driven Design Reference: Definitions and Pattern Summaries | Eric Evans | Dog Ear Pub Llc | Software Engineering | Win.h.1486 | 8.819 |
Borrowed |
Reinhold Plösch |
13 | Design Science Methodology for Information Systems and Software Engineering | Roel J. Wieringa | Springer | Software Engineering | Win.h.1443 | 8.820 |
Available |
No One |
14 | EU-DSGVO: EU-Datenschutz-Grundverordnung | Lukas Feiler, Nikolaus Forgó | Verlag Österreich | Sonstiges | Win.g.46 | 18.370 |
Available |
No One |
15 | Research Methods for Cyber Security | Thomas W. Edgar, David O. Manz | Syngress | Sonstiges | Win.f.750 | 18.373 |
Borrowed |
Johannes Sametinger |
16 | Computer and Information Security Handbook | John R. Vacca | Morgan Kaufmann | Sonstiges | WIn.f.1739 | 18.368 |
Borrowed |
Johannes Sametinger |
17 | Clean Architecture: A Craftsman's Guide to Software Structure and Design (Robert C. Martin) | Robert C. Martin | Prentice Hall | Software Engineering | Win.h.1487 | 8.822 |
Available |
No One |
18 | Clean Architecture: A Craftsman's Guide to Software Structure and Design (Robert C. Martin) | Robert C. Martin | Prentice Hall | Grundlagen der Informatik | Win.h.1487 | 0.227 |
Borrowed |
Rainer Weinreich |
19 | Recommender Systems: The Textbook | Charu C. Aggarwal | Springer | Sonstiges | Win.d.1018 | 18.360 |
Available |
No One |
20 | Recommender Systems: An Introduction | Dietmar Jannach, Markus Zanker, Alexander Felfernig, Gerhard Friedich | Cambridge University Press | Sonstiges | Win.d.784 | 18.359 |
Available |
No One |
21 | Evidence-Based Software Engineering and Systematic Reviews (Chapman & Hall/CRC Innovations in Software Engineering and S) | David Budgen, Barbara Ann Kitchenham, Pearl Brereton | Chapman & Hall/Crc Innovations in Software Engineering and Software Development Series | Software Engineering | Win.h.1484 | 8.821 |
Borrowed |
Iris Groher |
22 | An Introduction to Design Science | Paul Johannesson, Erik Perjons | Springer | Sonstiges | Wina.365 | 18.364 |
Borrowed |
Rainer Weinreich |
23 | Software Architecture in Action: Designing and Executing Architectural Models with SysADL Grounded on the OMG SysML Standard | Flavio Oquendo | Springer | Software Engineering | Win.h.1482 | 8.816 |
Borrowed |
Rainer Weinreich |
24 | Automotive Software Architectures: An Introduction | Miroslaw Staron | Springer | Software Engineering | Win.h.1483 | 8.814 |
Borrowed |
Rainer Weinreich |
25 | Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science) | Wolfgang Ertel | Springer | Grundlagen der Informatik | Win.a.221 | 0.228 |
Borrowed |
Rainer Weinreich |
26 | Software Architecture for Big Data and the Cloud | Ivan Mistrik, Rami Bahsoon, Nour Ali, Maritta Heisel, Bruce Maxim | Morgan Kaufmann Publishers | Software Engineering | Win.d.1019 | 8.818 |
Borrowed |
Rainer Weinreich |
27 | Concise Guide to Software Engineering: From Fundamentals to Application Methods (Undergraduate Topics in Computer Science) | Gerard O'Regan | Springer | Software Engineering | Win.h.1481 | 8.815 |
Borrowed |
Rainer Weinreich |
28 | The Knowledge Manager's Handbook: A Step-by-Step Guide to Embedding Effective Knowledge Management in Your Organization | Nick Milton, Patrick Lambe | Kogan Page | Wirtschaftsinformatik | Win.s.606 | 10.118 |
Borrowed |
Rainer Weinreich |
29 | Working Knowledge: How Organizations Manage What They Know (Englisch | Thomas H. Davenport | Harvard Business Review Press | Wirtschaftsinformatik | Org.b.178 | 10.119 |
Available |
No One |
30 | Java-Grundkurs für Wirtschaftsinformatiker: Die Grundlagen Verstehen - Objektorientierte Programmierung - Fortgeschrittene Konzepte Kennenlernen | Klaus-Georg Deck | Vieweg+Teubner Verlag | Programmiersprachen | Win.g.441 | 2.320 |
Borrowed |
Iris Groher |
31 | Einführung in die Programmierung mit Java (Pearson Studium - IT) | Robert Sedgewick, Kevin Wayne | Pearson Studium | Programmiersprachen | Win.b.443 | 2.321 |
Borrowed |
Iris Groher |
32 | Qualitative Inhaltsanalyse. Methoden, Praxis, Computerunterstützung (Grundlagentexte Methoden) | Udo Kuckartz | Beltz Juventa | Nachbardisziplinen und Hilfswissenschaften | For.288 | 14.067 |
Borrowed |
Iris Groher |
33 | Experteninterviews und qualitative Inhaltsanalyse : als Instrumente rekonstruierender Untersuchungen | Jochen Gläser, Grit Laudel | VS Verlag für Sozialwissenschaften | Nachbardisziplinen und Hilfswissenschaften | Win.f.569 | 14.068 |
Borrowed |
Iris Groher |
34 | The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation | Ikujiro Nonaka, Hirotaka Takeuchi | Oxford University Press | Sonstiges | Org.e.168 | 18.361 |
Borrowed |
Rainer Weinreich |
35 | Datenschutz-Grundverordnung: Das neue Datenschutzrecht in Österreich und der EU (Praxishandbuch) | Rainer Knyrim | MANZ Verlag Wien | Sonstiges | Jus.489 | 18.363 |
Available |
No One |
36 | Einführung in die qualitative Sozialforschung (Beltz Studium) | Philipp Mayring | Beltz | Software Engineering | For.174 | 8.817 |
Borrowed |
Iris Groher |
37 | Qualitative Inhaltsanalyse: Grundlagen und Techniken (Beltz Pädagogik) | Philipp Mayring | Beltz | Software Engineering | Mar.b.466 | 8.813 |
Borrowed |
Iris Groher |
38 | Case Study Research in Software Engineering: Guidelines and Examples | Per Runeson, Martin Host, Austen Rainer, Bjorn Regnell | John Wiley & Sons | Software Engineering | Win.h.1395 | 8.812 |
Borrowed |
Iris Groher |
39 | Leading Digital | von George Westerman, Didier Bonnet, Andrew McAfee | Harvard Business Review Press | Sonstiges | nan | 18.346 |
Available |
No One |
40 | How to Measure Anything in Cybersecurity Risk 1st Edition | Douglas W. Hubbard, Richard Seiersen Daniel E. Geer, Jr. Stuart McClure | Wiley | Sonstiges | Win.h.1474 | 18.347 |
Available |
No One |
41 | Fundamentals Of Information Systems Security 3rd Edition | David Kim, Michael G. Solomon | Jones & Bartlett Learning | Sonstiges | Win.f.738 | 18.362 |
Borrowed |
Johannes Sametinger |
42 | Management of Information Security 5th Edition | by Michael E. Whitman, Herbert J. Mattord (Author) | Course Technology | Sonstiges | Win.f.735 | 18.358 |
Available |
No One |
43 | The Complete Privacy & Security Desk Reference: Volume I: Digital (Volume 1) | Michael Bazzell, Justin Carroll | CreateSpace Independent Publishing Platform | Sonstiges | Win.1477/1 | 18.355 |
Borrowed |
Johannes Sametinger |
44 | Essential Guide to Smart Home Safety & Security: Use Smart Homes to Increase Your Families Safety Levels (Smart Home Automation Essential Guides) | Mr Gerard O'Driscoll | Independently | Sonstiges | Win.i.431 | 18.357 |
Borrowed |
Johannes Sametinger |
45 | Healthcare Information Security and Privacy 1st Edition | Sean P. Murphy Vice President SAIC Health Solutions | McGraw-Hill Education | Sonstiges | Win.g.43 | 18.365 |
Borrowed |
Johannes Sametinger |
46 | Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur | Gary Hall, Erin Watson (Author) | CreateSpace Independent Publishing Platform | Sonstiges | Win.1476 | 18.353 |
Borrowed |
Johannes Sametinger |
47 | Dark Territory: The Secret History of Cyber War | Fred Kaplan | Simon and Schuster | Sonstiges | Win.a.361 | 18.348 |
Borrowed |
Johannes Sametinger |
48 | Hacking: Basic Security, Penetration Testing and How to Hack | Isaac Sharpe | CreateSpace Independent Publishing Platform | Sonstiges | Win.h.1478 | 18.352 |
Borrowed |
Johannes Sametinger |
49 | Cybersecurity for Beginners | Raef Meeuwisse | Cyber Simplicity Ltd | Sonstiges | Win.h.1475 | 18.350 |
Borrowed |
Johannes Sametinger |
50 | CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide 1st Edition | O'Hara | SYBEX | Sonstiges | Win.b.439 | 18.356 |
Borrowed |
Johannes Sametinger |
First | previous | next | last » |