New eBooks October 2023
The following is a list of new ebooks received by the Library during October. More complete listings for the year can be found on our website’s new books page
Title | Author |
Academia and higher learning in popular culture / Marcu | |
After the enlightenment [electronic resource] : politic | Guilhot, Nicolas, 1970- |
AI, machine learning and deep learning : a security per | |
Algorithms for optimization. / Mykel J. Kochenderfer, T | Kochenderfer, Mykel J., 1980- |
Artificial intelligence : a guide for thinking humans / | Mitchell, Melanie |
Because internet : understanding how language is changi | McCulloch, Gretchen |
Blockchain applications in cybersecurity solutions / ed | |
British tramp shipping, 1750-1914 / Robin Craig | Craig, Robin |
Building a trauma-responsive educational practice : les | Daniels, Em |
Capitalism and the new political unconscious [electroni | |
Combating crime on the Dark Web : learn how to access t | Nearchou, Nearchos |
Contemporary crime fiction crossing boundaries, merging | |
Contemporary performance lighting [electronic resource] | |
Corpus approaches to language in social media [electron | Di Cristofaro, Matteo |
Counterintelligence in a cyber world / Paul A. Watters | Watters, Paul A. |
Cryptography for payment professionals / Ilya Dubinsky | Dubinsky, Ilya |
Cultural psychology [electronic resource] : a perspecti | Ratner, Carl |
Cyber investigations : a research based textbook for ad | |
Cyber Resilience [electronic resource] : Defence-In-dep | Calder, Alan, 1957- |
Cyber security threats and challenges facing human life | |
Cyber security using modern technologies : artificial i | |
Cybersecurity issues, challenges, and solutions in the | |
Cybersecurity, privacy and data protection in EU law : | Porcedda, Maria Grazia |
Data exfiltration threats and prevention techniques : m | Tari, Zahir, 1961- |
Dead aid [electronic resource] : why aid makes things w | Moyo, Dambisa |
Digital forensics / edited by Andre´ A°rnes | |
Drawing for urban design [electronic resource] / Lorrai | Farrelly, Lorraine |
Effective cybersecurity operations for enterprise-wide | |
English corpus linguistics [electronic resource] : an i | Meyer, Charles F. |
Environment and ecology in the long nineteenth-century | |
Environmental justice in the Anthropocene [electronic r | |
Examining multimedia forensics and content integrity / | |
Exploring cyber criminals and data privacy measures / e | |
Family life, family law, and family justice : tying the | Garrison, Marsha, 1949- |
Fashion writing : journalism and content creation / Jos | Collins, Josephine |
Female rebelion in young adult dystopian fiction / edit | |
Film festivals : history, theory, method, practice / ed | |
Firewalls don’t stop dragons : a step-by-step guide to | Parker, Carey |
Forensic colonialism : genetics and the capture of Indi | Munsterhjelm, Mark, 1966- |
Guarding against crime : measuring guardianship within | Reynald, Danielle M. |
Guide to cybersecurity in digital transformation : tren | Moller, Dietmar |
Handbook of Innovation Indicators and Measurement / edi | |
Handbook of Teaching and Learning Social Research Metho | Nind, Melanie |
Handbook of Violence Risk Assessment / Kevin Douglas | Douglas, Kevin |
Histories and philosophies of carceral education : aims | Harmes, Marcus K. |
Holistic approach to quantum cryptography in cyber secu | |
How to measure anything in cybersecurity risk / Douglas | Hubbard, Douglas W., 1962- |
Interior design : conceptual basis / Anthony Sully | Sully, Anthony |
International case studies in the management of disaste | George, Babu |
Just as deadly [electronic resource] : the psychology o | Harrison, Marissa A. |
Living with desistance [electronic resource] : breaking | Honeywell, David |
Lurking under the surface : Horror, religion, and the q | Grafius, Brandon R. |
Managing long-term conditions and chronic illness in pr | Carrier, Judith, 1960- |
Mao [electronic resource] : the unknown story / Jung Ch | Chang, Jung, 1952- |
Mind the tech gap : addressing the conflicts between IT | Robinson, Nikki |
Mothers : an essay on love and cruelty / Jacqueline Ros | Rose, Jacqueline |
MUBI and the curation model of video on demand / Mattia | Frey, Mattias |
New age cyber threat mitigation for cloud computing net | Bhardwaj, Akashdeep |
Non-governmental organisations and the law : self-regul | Carolei, Domenico |
Offending and desistance : the importance of social rel | Weaver, Beth |
Perspectives on Ethical Hacking and Penetration Testing | |
Planting clues [electronic resource] : how plants solve | Gibson, David J. |
Posttraumatic stress disorder : scientific and professi | |
Proceeding of 2022 international conference on wireless | |
Regulating cyber technologies : privacy vs security / e | |
Research methods in critical security studies : an intr | |
Secure data management for online learning applications | |
Security and resilience of cyber physical systems / edi | |
Security awareness design in the new normal age / Wendy | Goucher, Wendy |
Simulating sovereignty [electronic resource] : interven | Weber, Cynthia |
Social Psychology / Nyla R. Branscombe, Robert A. Baron | Branscombe, Nyla. R. |
Social work with disadvantaged and marginalised people | Parker, Jonathan, 1960- |
Spatial practices : modes of action and engagement with | |
Strategic cyber security management / Peter Trim, Yang- | Trim, Peter R. J. |
Sway [electronic resource] : unravelling unconscious bi | Agarwal, Pragya |
The ambiguities of desistance : ex-offenders, higher ed | Honeywell, David |
The child’s world : the essential guide to assessing vu | |
The dialectics of dependency / Ruy Mauro Marini ; edite | Marini, Ruy Mauro |
The Emerald international handbook of activist criminol | |
The European Union after Brexit / edited by Scott Gree | |
The good research guide : research methods for small-sc | Denscombe, Martyn |
The myth of 1648 : class, geopolitics, and the making o | Teschke, Benno |
The Oxford History of British and Irish Catholicism [el | |
The Palgrave handbook of screenwriting studies / Rosamu | |
The Routledge handbook on the international dimension o | |
Transgender people and criminal justice : an examinatio | |
What film is good for : on the values of spectatorship | |
What to do when you get hacked : a practitioner’s guide | Brathwaite, Shimon |
Why do so many incompetent men become leaders? : (and h | Chamorro-Premuzic, Tomas |
Women and criminal justice : from the Corston Report to | |
Women in policing around the world [electronic resource | Garcia, Venessa |
World on fire [electronic resource] : humans, animals, | Rowlands, Mark |
Leave a Comment (note: all comments are moderated)