Search Results for Course Technology: Cengage Learning. - Narrowed by: Short LoansSirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dCourse$002bTechnology$00253A$002bCengage$002bLearning.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ASHORT-LOAN$002509Short$002bLoans$0026ps$003d300?dt=list2025-12-27T01:22:49ZSimple program design : a step-by-step approachent://SD_ILS/0/SD_ILS:105682025-12-27T01:22:49Z2025-12-27T01:22:49Zby Robertson, Lesley Anne.<br/>Format: Books<br/>Publication Date 2003<br/>A beginner's guide to programming logic and design. Comprehensive versionent://SD_ILS/0/SD_ILS:27162025-12-27T01:22:49Z2025-12-27T01:22:49Zby Farrell, Joyce.<br/>Format: Books<br/>Publication Date 2013<br/>Database principles : fundamentals of design, implementation, and managementent://SD_ILS/0/SD_ILS:472622025-12-27T01:22:49Z2025-12-27T01:22:49Zby Coronel, Carlos.<br/>Format: Books<br/>Publication Date 2013<br/>Concepts in enterprise resource planningent://SD_ILS/0/SD_ILS:582025-12-27T01:22:49Z2025-12-27T01:22:49Zby Monk, Ellen F.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281842&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281842&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2013<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:19692025-12-27T01:22:49Z2025-12-27T01:22:49Zby Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format: Books<br/>Publication Date 2012<br/>MIS2ent://SD_ILS/0/SD_ILS:31322025-12-27T01:22:49Z2025-12-27T01:22:49Zby Bidgoli, Hossein.<br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-12-27T01:22:49Z2025-12-27T01:22:49Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>A guide to service desk conceptsent://SD_ILS/0/SD_ILS:15192025-12-27T01:22:49Z2025-12-27T01:22:49Zby Knapp, Donna.<br/>Format: Books<br/>Publication Date 2010<br/>C? programming : from problem analysis to program designent://SD_ILS/0/SD_ILS:19182025-12-27T01:22:49Z2025-12-27T01:22:49Zby Doyle, Barbara.<br/>Format: Books<br/>Publication Date 2010<br/>Best business practices for photographersent://SD_ILS/0/SD_ILS:8382025-12-27T01:22:49Z2025-12-27T01:22:49Zby Harrington, John, 1966-<br/>Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1212/2009933314-d.html">http://catdir.loc.gov/catdir/enhancements/fy1212/2009933314-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1212/2009933314-t.html">http://catdir.loc.gov/catdir/enhancements/fy1212/2009933314-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2009933314-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2009933314-b.html</a><br/>Format: Books<br/>Publication Date 2010<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:15222025-12-27T01:22:49Z2025-12-27T01:22:49Zby Ciampa, Mark D.<br/>Format: Electronic Resources<br/>Publication Date 2009<br/>The business analyst's handbookent://SD_ILS/0/SD_ILS:98282025-12-27T01:22:49Z2025-12-27T01:22:49Zby Podeswa, Howard.<br/>Format: Books<br/>Publication Date 2009<br/>E-businessent://SD_ILS/0/SD_ILS:214102025-12-27T01:22:49Z2025-12-27T01:22:49Zby Schneider, Gary P., 1952-<br/>Format: Books<br/>Publication Date 2009<br/>