All Products within Information Systems
-
.NET Mobile Web Developers Guide
Book, January 2002, by Syngress
-
10 Cool Lego Mindstorm Robotics Invention System 2 Projects
Book, October 2002, by Syngress
-
10 Cool Lego Mindstorm Ultimate Builders Projects
Book, November 2002, by Ferrari
-
3C Vision
Book, May 2011, by Cantoni
-
3D Game Engine Architecture
Book, December 2004, by Eberly
-
3G Evolution
Book, August 2008, by Dahlman
-
9th International World Wide Web Conference
Book, May 2000, by AUTHOR
-
A Complete Guide to DB2 Universal Database
Book, June 1998, by Chamberlin
-
A Guide to Microsoft Excel 2007 for Scientists and Engineers
Book, November 2008, by Liengme
-
A Mathematical Introduction to Logic
Book, December 2000, by Enderton
-
A Practical Logic of Cognitive Systems
Book, May 2005, by Gabbay
-
A Student Guide to Object-Oriented Development
Book, August 2004, by Britton
-
A Wavelet Tour of Signal Processing
Book, December 2008, by Mallat
-
AASRI Procedia
Journal, 2013
-
Advanced SQL:1999
Book, September 2002, by Melton
-
Advanced Systems Design with Java, UML and MDA
Book, April 2005, by Lano
-
Advanced Video Coding: Principles and Techniques
Book, August 1999, by Ngan
-
Advances in Computers
Book, April 2004, by Zelkowitz
-
Advances in Computers
Book, May 2009, by Zelkowitz
-
Advances in Computers
Book, August 2008, by Zelkowitz
-
Advances in Computers
Book, June 2009, by Zelkowitz
-
Advances in Computers
Book, June 2009, by Zelkowitz
-
Advances in Computers
Book, March 2010, by Zelkowitz
-
Advances in Computers
Book, June 1996, by Zelkowitz
-
Advances in Computers
Book, June 1997, by Zelkowitz
-
Advances in Computers
Book, August 1995, by Zelkowitz
-
Advances in Computers
Book, June 2003, by Zelkowitz
-
Advances in Computers
Book, August 1995, by Zelkowitz
-
Advances in Computers
Book, July 2007, by Zelkowitz
-
Advances in Computers
Book, April 2010, by Zelkowitz
-
Advances in Computers
Book, June 2007, by Zelkowitz
-
Advances in Computers
Book, July 2004, by Zelkowitz
-
Advances in Computers
Book, August 2003, by Zelkowitz
-
Advances in Computers
Book, May 2007, by Zelkowitz
-
Advances in Computers
Book, July 2010, by Zelkowitz
-
Advances in Computers
Book, May 2006, by Zelkowitz
-
Advances in Computers
Book, April 2006, by Zelkowitz
-
Advances in Computers
Book, May 2005, by Zelkowitz
-
Advances in Computers
Book, May 2004, by Zelkowitz
-
Advances in Computers
Book, April 2005, by Hurson
-
Advances in Computers
Book, July 2008, by Zelkowitz
-
Advances in Computers
Book, June 2008, by Zelkowitz
-
Advances in Computers
Book, November 2006, by Tseng
-
Advances in Image Communication
Book Series, by Biemond
-
Advances in Intelligence and Security Informatics
Book, April 2012, by Mao
-
Advances in Parallel Computing
Book Series, by Joubert
-
Agenda Relevance: A Study in Formal Pragmatics
Book, May 2003, by AUTHOR
-
Aggressive Network Self-Defense
Book, February 2005, by Wyler
-
Agile Data Warehousing Project Management
Book, September 2012, by Hughes
-
Agile Development & Business Goals
Book, June 2010, by Holtsnider
-
Agile User Experience Design
Book, November 2012, by Brown
-
Algorithmic Graph Theory and Perfect Graphs
Book, February 2004, by Golumbic
-
Algorithms and Architectures
Book, October 1997, by Leondes
-
Alternate Data Storage Forensics
Book, September 2007, by Schroader
-
An Intelligent System for Engine Tribological Design
Book, July 2004, by Zhang
-
An Introduction to Parallel Programming
Book, January 2011, by Pacheco
-
An Introduction to Ray tracing
Book, January 1989, by Glassner
-
An Ontological and Epistemological Perspective of Fuzzy Set Theory
Book, November 2005, by T rksen
-
Analog Interfacing to Embedded Microprocessor Systems
Book, October 2003, by Ball
-
Analyzing Social Media Networks with NodeXL
Book, August 2010, by Hansen
-
Analyzing the Social Web
Book, March 2013, by Golbeck
-
Android Forensics
Book, June 2011, by Hoog
-
Annotated C# Standard
Book, July 2007, by Jagger
-
API Design for C++
Book, February 2011, by Reddy
-
Application Administrators Handbook
Book, October 2013
-
Applications of Artificial Intelligence, 47
Book, October 1998, by Zelkowitz
-
Applied Chaos Theory
Book, November 1992, by Cambel
-
Applied Computing and Informatics
Journal, 2013
-
Applying UML
Book, October 2003, by Pooley
-
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children
Book, September 2011, by Betz
-
Architecture Design for Soft Errors
Book, February 2008, by Mukherjee
-
Architecture of Network Systems
Book, January 2011, by Serpanos
-
ARM Bundle
Book, November 2008, by Yiu
-
Artificial Intelligence for Games
Book, August 2009, by Funge
-
Artificial Intelligence for Games
Book, August 2009, by Millington
-
Artificial Vision
Book, September 1996, by Levialdi
-
Aspect-Oriented Programming with the e Verification Language
Book, August 2007, by Robinson
-
Atomic Transactions
Book, August 1993, by Lynch
-
Augmented Reality
Book, November 2012, by Kipper
-
Automata Reasoning ***Replacement*** Disk
Book, July 1996, by Replacement
-
AVIEN Malware Defense Guide for the Enterprise
Book, August 2007, by Vibert
-
Beyond the Usability Lab
Book, January 2010, by Albert
-
Bibliotheca Mathematica
Book Series
-
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
Book, August 2006, by St Denis
-
Bioinformatics
Book, July 2003, by Lacroix
-
Black Hat Physical Device Security: Exploiting Hardware and Software
Book, October 2004, by Miller
-
Bluetooth Application Developer's Guide
Book, January 2002, by Syngress
-
Bluetooth Application Programming with the Java APIs Essentials Edition
Book, February 2008, by Thompson
-
Botnets
Book, February 2007, by Bradley
-
Brain Theory
Book, May 1993, by Aertsen
-
Brainstorming and Beyond
Book, February 2013, by Wilson
-
Brave NUI World
Book, April 2011, by Wigdor
-
Breakthrough IT Change Management
Book, November 2003, by Lientz
-
Broadband Cable Access Networks
Book, October 2008, by Large
-
Broadband Communications, II
Book, September 1994, by Tohme
-
Budget constraints and optimization in sponsored search auctions
Book, August 2013
-
Buffer Overflow Attacks
Book, January 2005, by Deckard
-
Build And Upgrade Your Own Pc
Book, December 2004, by Sinclair
-
Building a Digital Forensic Laboratory
Book, October 2008, by Jones
-
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Book, August 2006, by Chaffin
-
Building an Object-Oriented Database System
Book, June 1992, by Bancilhon
-
Building Automated Trading Systems
Book, March 2007, by Van Vliet
-
Building DMZs For Enterprise Networks
Book, July 2003, by Syngress
-
Building Robots With Lego Mindstorms
Book, December 2001, by Ferrari
-
Building Robots with LEGO Mindstorms NXT
Book, June 2007, by Barry
-
Building the Agile Enterprise
Book, September 2008, by Cummins
-
BULLETPROOF WIRELESS SECURITY
Book, June 2005, by Chandra
-
Business Continuity and Disaster Recovery for InfoSec Managers
Book, September 2005, by Rittinghouse, PhD, CISM
-
Business Continuity and Disaster Recovery Planning for IT Professionals
Book, October 2013
-
Business Continuity and Disaster Recovery Planning for IT Professionals
Book, June 2007, by Snedaker
-
Business Intelligence
Book, October 2012, by Loshin
-
Business Metadata: Capturing Enterprise Knowledge
Book, September 2007, by Inmon
-
Business Modeling
Book, December 2008, by Bridgeland
-
Business Modeling and Data Mining
Book, May 2003, by Pyle
-
Business Process Change
Book, July 2007, by Harmon
-
C# For Java Programmers
Book, June 2002, by Cabrera
-
Call Center Operation
Book, April 2003, by Sharp
-
Capturing Intelligence
Book Series, by Dubois
-
CD and DVD Forensics
Book, December 2006, by Crowley
-
Check Point Next Generation with Application Intelligence Security Administration
Book, January 2004, by Syngress
-
Checkpoint Next Generation Security Administration
Book, April 2002, by Syngress
-
CheckPoint NG VPN 1/Firewall 1
Book, May 2003, by Syngress
-
Cisco AVVID and IP Telephony Design & Implementation
Book, December 2001, by Syngress
-
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Book, July 2009, by Liu
-
Cisco PIX Firewalls
Book, April 2005, by Khan
-
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Book, October 2003, by Syngress
-
Cisco Security Qos & AVVID Kit
Book, September 2001, by Syngress
-
Cisco Security Specialists Guide to PIX Firewall
Book, December 2002, by Syngress
-
CISSP Study Guide
Book, August 2012, by Conrad
-
Citrix XenDesktop Implementation
Book, September 2010, by James
-
Client-Side Attacks and Defense
Book, October 2012, by Oriyano
-
Coding and Decoding: Seismic Data
Book, April 2010, by Ikelle
-
Coding for Penetration Testers
Book, September 2011, by Andress
-
Cognitive Aspects of Visual Languages and Visual Interfaces
Book, April 1994, by Mahling
-
Cognitive Systems - Information Processing Meets Brain Science
Book, August 2005, by Morris
-
Coherent Systems
Book, September 2004, by Schlechta
-
Collaborative Enterprise Architecture
Book, August 2012, by Bente
-
Collision Detection in Interactive 3D Environments
Book, October 2003, by van den Bergen
-
Combating Spyware in the Enterprise
Book, August 2006, by Piccard
-
Commonsense Reasoning
Book, January 2006, by Mueller
-
Component Database Systems
Book, October 2000, by Dittrich
-
CompTIA Linux+ Certification Study Guide (2009 Exam)
Book, November 2009, by Barber
-
CompTIA Security+ Certification Study Guide
Book, July 2009, by Dubrawsky
-
Computability, Complexity, and Languages
Book, February 1994, by Davis
-
Computation and Storage in the Cloud
Book, February 2013, by Yuan
-
Computational Finance Set
Book, May 2008, by Levy
-
Computational Finance Using C and C#
Book, May 2008, by Levy
-
Computer and Information Security Handbook
Book, April 2013, by Vacca
-
Computer and Information Security Handbook
Book, May 2009, by Vacca
-
Computer Animation
Book, August 2012, by Parent
-
Computer Architecture
Book, September 2011, by Hennessy
-
Computer Hardware Maintenance
Book, December 1995, by Rood
-
Computer Incident Response and Forensics Team Management
Book, August 2013
-
Computer Organization and Design
Book, October 2011, by Patterson
-
Computer Simulation
Book, August 1991, by McHaney
-
Computer Systems Performance Evaluation and Prediction
Book, June 2003, by Fortier
-
Computerization and Controversy
Book, February 1996, by Kling
-
Computers & Mathematics with Applications
Journal, 2013
-
Computers & Operations Research
Journal, 2013
-
Computers and Conversation
Book, January 1990, by Luff
-
Computers and People
Book Series
-
Computers as Components
Book, May 2012, by Wolf
-
Computers in Industry
Journal, 2013
-
Computing with Mathematica
Book, October 2002, by Hoft
-
Configuring and Troubleshooting Windows XP Professional
Book, January 2002, by Syngress
-
Configuring Check Point NGX VPN-1/Firewall-1
Book, October 2005, by Stiefel
-
Configuring Cisco Voice Over IP 2E
Book, September 2002, by Syngress
-
Configuring IPv6 For Cisco IOS
Book, August 2002, by Syngress
-
Configuring ISA Server 2000
Book, May 2001, by Syngress
-
Configuring Juniper Networks NetScreen & SSG Firewalls
Book, December 2006, by Cameron
-
Configuring NetScreen Firewalls
Book, December 2004, by Cameron
-
Configuring SonicWALL Firewalls
Book, May 2006, by Bendell
-
Configuring Symantec AntiVirus Enterprise Edition
Book, March 2003, by Syngress
-
Configuring VMware ESX Server 2.5
Book, July 2005, by Muller
-
Configuring Windows 2000 without Active Directory
Book, September 2001, by Syngress
-
Connecting Microsoft Exchange Server
Book, October 1999, by McCorry
-
Constraint Processing
Book, May 2003, by Dechter
-
Consumers Guide to Cell Phones and Wireless Service Plans
Book, December 2001, by Syngress
-
Content Strategy at Work
Book, February 2012, by Bloomstein
-
Contextual Design
Book, September 1997, by Beyer
-
Controlling The World with Your PC
Book, May 1994, by Bergsman
-
Cooperative Information Systems
Book, October 1997, by Papazoglou
-
Coordinating User Interfaces for Consistency
Book, December 2001, by Nielsen
-
Corporate Portals Empowered with XML and Web Services
Book, November 2002, by Guruge
-
Cost-Justifying Usability
Book, April 2005, by Bias
-
CRM
Book, May 2002, by Peel
-
Cryptographic Boolean Functions and Applications
Book, March 2009, by Cusick
-
Cryptography for Developers
Book, December 2006, by St Denis
-
CUDA Application Design and Development
Book, October 2011, by Farber
-
Customizable Embedded Processors
Book, July 2006, by Ienne
-
CYA Securing Exchange Server 2003
Book, May 2004, by Fugatt
-
CYA Securing IIS 6.0
Book, May 2004, by Cheah
-
Cyber Adversary Characterization
Book, July 2004, by Parker
-
Cyber Crime Investigations
Book, March 2007, by Reyes
-
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Book, March 2005, by Cole
-
Cyber Warfare
Book, June 2011, by Andress
-
Cybercrime and Espionage
Book, January 2011, by Gragido
-
Cylindric Algebras
Book, February 1985, by AUTHOR
-
Data & Knowledge Engineering
Journal, 2013
-
Data Analysis for Database Design
Book, May 2001, by Howe
-
Data Architecture
Book, March 2011, by Tupper
-
Data Governance
Book, July 2012, by Ladley
-
Data Hiding Fundamentals and Applications
Book, August 2004, by Sencar
-
Data Insights
Book, November 2012, by Whitney
-
Data Mining and Predictive Analysis
Book, September 2006, by McCue
-
Data Mining: Concepts and Techniques
Book, June 2011, by Han
-
Data Mining: Know It All
Book, November 2008, by Chakrabarti
-
Data Mining: Practical Machine Learning Tools and Techniques
Book, January 2011, by Witten
-
Data Model Patterns: A Metadata Map
Book, June 2006, by Hay
-
Data Modeling Essentials
Book, November 2004, by Simsion
-
Data on the Web
Book, October 1999, by Abiteboul
-
Data Preparation for Data Mining Using SAS
Book, September 2006, by Refaat
-
Data Quality
Book, December 2002, by Olson
-
Data Quality
Book, December 2000, by Redman
-
Data Structures
Book, March 1975, by Berztiss
-
Data Virtualization for Business Intelligence Systems
Book, July 2012, by van der Lans
-
Data Warehousing
Book, August 2000, by Westerman
-
Data Warehousing And Business Intelligence For e-Commerce
Book, May 2001, by Simon
-
Data Warehousing in the Age of Big Data
Book, August 2013
-
Database and Data Communication Network Systems, Three-Volume Set
Book, July 2002, by Leondes
-
Database Archiving
Book, November 2008, by Olson
-
Database Design for Smarties
Book, February 1999, by Muller
-
Database Design: Know It All
Book, October 2008, by Teorey
-
Database Modeling and Design
Book, February 2011, by Teorey
-
Database Modeling with Microsoft® Visio for Enterprise Architects
Book, August 2003, by Halpin
-
Database Programming Languages 2nd
Book, September 1989, by Hull
-
Database Transaction Models for Advanced Applications
Book, April 1992, by Elmagarmid
-
Database Tuning
Book, May 2002, by Shasha
-
DCOM Explained
Book, August 1998, by ROCK-EVANS
-
Decision Support Systems
Journal, 2013
-
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Book, February 2005, by Craft
-
Deploying IP and MPLS QoS for Multiservice Networks
Book, March 2007, by Evans
-
Design for Emotion
Book, June 2012, by van Gorp
-
Design Research Through Practice
Book, September 2011
-
Design to Thrive
Book, February 2010, by Howard
-
Designer's Guide to the Cypress PSoC
Book, July 2005, by Ashby
-
Designing A Wireless Network
Book, July 2001, by Syngress
-
Designing and Building Enterprise DMZs
Book, October 2006, by Flynn
-
Designing Computer Programs
Book, October 1994, by Haigh
-
Designing Data-Intensive Web Applications
Book, December 2002, by Ceri
-
Designing SOCs with Configured Cores
Book, July 2006, by Leibson
-
Designing SQL Server 2000 Databases
Book, January 2001, by Syngress
-
Designing Storage for Exchange 2007 SP1
Book, August 2008, by Bijaoui
-
Designing the Search Experience
Book, December 2012, by Russell-Rose
-
Designing with the Mind in Mind
Book, May 2010, by Johnson
-
Developer's Guide to Web Application Security
Book, February 2007, by Cross
-
Developing .Net Web Services With Xml
Book, July 2002, by Syngress
-
Developing High Quality Data Models
Book, December 2010, by West
-
Developing User Interfaces
Book, February 1998, by Olsen
-
Dictionary of Distances
Book, October 2006, by Deza
-
Dictionary of Information Science and Technology
Book, February 1992, by Watters
-
Dictionary of Information Security
Book, August 2006, by Slade
-
Differential Equations with Mathematica
Book, February 2004, by Abell
-
Diffusion, Transfer and Implementation of Information Technology
Book, March 1994, by Levine
-
Digital Arithmetic
Book, June 2003, by Ercegovac
-
Digital Compression for Multimedia
Book, January 1998, by Gibson
-
Digital Design and Computer Architecture
Book, July 2012, by Harris
-
Digital Electronics and Design with VHDL
Book, January 2008, by Pedroni
-
Digital Forensics Processing and Procedures
Book, June 2013, by Watson
-
Digital Forensics with Open Source Tools
Book, April 2011, by Altheide
-
Digital Investigation
Journal, 2013
-
DIGITAL OUTCASTS
Book, April 2013, by Smith
-
Digital Triage Forensics
Book, June 2010, by Pearson
-
Digital Video and HD
Book, January 2012, by Poynton
-
Digital Watermarking and Steganography
Book, November 2007, by Cox
-
Directory Services
Book, December 2001, by Cox
-
Disappearing Cryptography
Book, April 2002, by Wayner
-
Discrete Mathematics with Applications
Book, December 2003, by Koshy
-
Displays
Journal, 2013
-
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Book, July 2010, by Street
-
Distributed Algorithms
Book, March 1996, by Lynch
-
Distributed and Cloud Computing
Book, October 2011, by Hwang
-
Dr. Tom Shinder's Configuring ISA Server 2004
Book, October 2004, by Littlejohn Shinder
-
Dr. Tom Shinder's ISA Server 2006 Migration Guide
Book, December 2007, by Shinder
-
DW 2.0: The Architecture for the Next Generation of Data Warehousing
Book, June 2008, by Inmon
-
Dynamic E-Business Implementation Management
Book, June 2000, by Lientz
-
Dynamic Model Development: Methods, Theory and Applications
Book, August 2003, by Macchietto
-
E-business Implementation:
Book, August 2002, by Watt
-
E-discovery: Creating and Managing an Enterprisewide Program
Book, October 2008, by Schuler
-
E-Mail Virus Protection Handbook
Book, November 2000, by Syngress
-
e.biz
Book, October 2003, by Sampson
-
Effective Prototyping with Excel
Book, January 2009, by Berger
-
Egyptian Informatics Journal
Journal, 2013
-
Electronic Design Automation
Book, February 2009, by Wang
-
Elementary Linear Programming with Applications
Book, June 1995, by Kolman
-
Eleventh Hour CISSP
Book, November 2010, by Conrad
-
Eleventh Hour Linux+
Book, November 2009, by Speake
-
Eleventh Hour Network+
Book, October 2009, by Alpern
-
Eleventh Hour Security+
Book, October 2009, by Dubrawsky
-
Elsevier's Dictionary of Computer Graphics
Book, September 2000, by Manoilov
-
Elsevier's Dictionary of Geographical Information Systems
Book, June 2002, by Delijska
-
Elsevier's Dictionary of Information Security
Book, January 2007, by Manoilov
-
Embedded Linux Development Using Eclipse
Book, November 2008, by Abbott
-
Embedded Media Processing
Book, September 2005, by Katz
-
Embedded Systems and Software Validation
Book, May 2009, by Roychoudhury
-
Encyclopedia of Information Systems, Four-Volume Set
Book, July 2002, by Bidgoli
-
Enemy at the Water Cooler
Book, October 2006, by Contos
-
Engineering a Compiler
Book, February 2011, by Cooper
-
Engineering Global E-Commerce Sites
Book, March 2003, by Bean
-
Enterprise Information Portals and Knowledge Management
Book, September 2002, by Firestone
-
Enterprise Knowledge Management
Book, January 2001, by Loshin
-
Entity Resolution and Information Quality
Book, December 2010, by Talburt
-
ERP: The Implementation Cycle
Book, December 2002, by Harwood
-
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Book, November 2006, by Bradley
-
Essential Java for Scientists and Engineers
Book, May 2002, by Hahn
-
Essential Mathematics for Games and Interactive Applications
Book, May 2008, by Van Verth
-
Ethereal Packet Sniffing
Book, February 2004, by Syngress
-
Evaluating Information Systems
Book, March 2008, by Irani
-
Executing Data Quality Projects
Book, July 2008, by McGilvray
-
Exploratory Image Databases
Book, August 2001, by Gibson
-
Face Processing: Advanced Modeling and Methods
Book, December 2005, by Zhao
-
Fast SOA
Book, November 2006, by Cohen
-
Feature Extraction & Image Processing for Computer Vision
Book, August 2012, by Nixon
-
Federal Cloud Computing
Book, November 2012, by Metheny
-
Federated Identity Primer
Book, December 2012, by Rountree
-
Fifth Generation Management
Book, April 1996, by Savage
-
Firewall Policies and VPN Configurations
Book, September 2006, by Syngress
-
FISMA and the Risk Management Framework
Book, November 2012, by Gantz
-
FISMA Certification and Accreditation Handbook
Book, November 2006, by Taylor
-
FISMA Compliance Handbook
Book, July 2013
-
Forms that Work
Book, November 2008, by Krug
-
FORTRAN 90 for Scientists and Engineers
Book, April 1994, by Hahn
-
Foundations of Analog and Digital Electronic Circuits
Book, July 2005, by Agarwal
-
Foundations of Artificial Intelligence
Book Series, by Hendler
-
Foundations of Multidimensional and Metric Data Structures
Book, August 2006, by Samet
-
Foundations of Set Theory
Book, December 1973, by Fraenkel
-
FPGAs: Instant Access
Book, July 2008, by Maxfield
-
Fundamental Data Compression
Book, November 2005, by Pu
-
Fundamentals of Optical Waveguides
Book, December 2005, by Okamoto
-
Fundamentals of Spatial Information Systems
Book, March 1992, by Laurini
-
Fundamentals of the Theory of Computation: Principles and Practice
Book, April 1998, by Greenlaw
-
Fuzzy Logic and Expert Systems Applications
Book, December 1997, by Leondes
-
Fuzzy Logic and the Semantic Web
Book, February 2006, by Sanchez
-
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration
Book, January 2005, by Cox
-
Fuzzy Theory Systems, Four-Volume Set
Book, September 1999, by Leondes
-
Game Console Hacking
Book, November 2004, by Grand
-
Game Physics
Book, December 2003, by Eberly
-
Game Physics Engine Development
Book, July 2010, by Millington
-
Game Physics Engine Development
Book, March 2007, by Millington
-
Game Usability
Book, August 2008, by Isbister
-
Geometric Algebra for Computer Science (Revised Edition)
Book, March 2009, by Dorst
-
Getting It Right
Book, August 2001, by Bock
-
GFI Network Security and PCI Compliance Power Tools
Book, September 2008, by Posey
-
Global UX
Book, November 2011, by Quesenbery
-
Globus® Toolkit 4
Book, December 2005, by Sotomayor
-
GMPLS
Book, December 2005, by Farrel
-
Google Hacking for Penetration Testers
Book, November 2007, by Long
-
Google Hacking for Penetration Testers, 1
Book, December 2004, by Long
-
Google Talking
Book, December 2006, by Brashars
-
GPU Computing Gems Emerald Edition
Book, January 2011, by Hwu
-
GPU Computing Gems Jade Edition
Book, September 2011, by Hwu
-
Grid Computing
Book, August 2005, by Plaszczak
-
Grid Computing: The New Frontier of High Performance Computing
Book, November 2005, by Grandinetti
-
Grounded Innovation
Book, April 2012, by Holmquist
-
Groundwater Modelling
Book, January 1986, by Kinzelbach
-
Groupware 92
Book, July 1992, by Coleman
-
GUI Bloopers 2.0
Book, August 2007, by Johnson
-
Guide to Human Genome Computing
Book, March 1998, by Bishop
-
Guide to Microsoft Excel 2002 for Scientists and Engineers
Book, July 2002, by Liengme
-
Guide to Neural Computing Applications
Book, January 1998, by Tarassenko
-
Hack Proofing ColdFusion
Book, April 2002, by Syngress
-
Hack Proofing Linux
Book, July 2001, by Syngress
-
Hack Proofing Sun Solaris 8
Book, October 2001, by Syngress
-
Hack Proofing Your Network 2E
Book, March 2002, by Syngress
-
Hack the Stack
Book, November 2006, by Gregg
-
Hacking a Terror Network: The Silent Threat of Covert Channels
Book, January 2005, by Rogers
-
Hacking and Penetration Testing Ultimate CD
Book, August 2009, by Beale
-
Hacking the Code
Book, April 2004, by Burnett
-
Hackproofing Your Wireless Network
Book, March 2002, by Syngress
-
Handbook of Air Pollution from Internal Combustion Engines
Book, March 1998, by Sher
-
Handbook of Complex Analysis
Book, December 2002, by Kuhnau
-
Handbook of Computer Crime Investigation
Book, October 2001, by Casey
-
Handbook of Constraint Programming
Book, August 2006, by Rossi
-
Handbook of Image and Video Processing
Book, June 2005, by Bovik
-
Handbook of Knowledge Representation
Book, December 2007, by van Harmelen
-
Handbook of Mathematical Fluid Dynamics
Book, March 2003, by Friedlander
-
Handbook of Mathematical Fluid Dynamics
Book, July 2002, by Friedlander
-
Handbook of Network and System Administration
Book, November 2007, by Bergstra
-
Handbook of Process Algebra
Book, March 2001, by Bergstra
-
Handbook of Proof Theory
Book, July 1998, by Buss
-
Handbook of Statistical Analysis and Data Mining Applications
Book, May 2009, by Miner
-
Handbook of Temporal Reasoning in Artificial Intelligence
Book, March 2005, by Fisher
-
Handbook of the Logic of Argument and Inference, ?
Book, September 2002, by Gabbay
-
Handbook of Time Series Analysis, Signal Processing, and Dynamics
Book, October 1999, by Pollock
-
Handbooks in Operations Research and Management Science
Book Series, by Lenstra
-
Handbooks in Operations Research and Management Science, 3: Computing
Handbook, November 1992, by Coffman Jr.
-
Handbooks in Operations Research and Management Science: Financial Engineering
Book, October 2007, by Birge
-
Hardware and Computer Organization
Book, May 2005, by Berger
-
Hardware Hacking
Book, January 2004, by Grand
-
Hardware/Firmware Interface Design
Book, November 2009, by Stringham
-
Harmonic Vector Fields
Book, October 2011, by Dragomir
-
HCI Models, Theories, and Frameworks
Book, April 2003, by Carroll
-
High-Technology Crime Investigator's Handbook
Book, August 2006, by Kovacich
-
Host Integrity Monitoring Using Osiris and Samhain
Book, July 2005, by Wotring
-
How to Become a Successful IT Consultant
Book, September 2002, by Remenyi
-
How to Build a Business Rules Engine
Book, October 2003, by Chisholm
-
How to Build a Digital Library
Book, October 2009, by Witten
-
How to Cheat at Administering Office Communications Server 2007
Book, January 2008, by Piltzecker
-
How to Cheat at Configuring Exchange Server 2007
Book, March 2007, by Walther
-
How to Cheat at Configuring ISA Server 2004
Book, March 2006, by Littlejohn Shinder
-
How to Cheat at Configuring VmWare ESX Server
Book, December 2007, by Rule
-
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Book, February 2006, by Barber
-
How to Cheat at Designing Security for a Windows Server 2003 Network
Book, December 2005, by Ruston
-
How to Cheat at IIS 7 Server Administration
Book, June 2007, by Frederick
-
How to Cheat at IT Project Management
Book, October 2005, by Snedaker
-
How to Cheat at Managing Information Security
Book, August 2006, by Osborne
-
How to Cheat at Managing Microsoft Operations Manager 2005
Book, March 2006, by Piltzecker
-
How to Cheat at Managing Windows Server Update Services
Book, December 2005, by Barber
-
How to Cheat at Managing Windows Small Business Server 2003
Book, September 2004, by Snedaker
-
How to Cheat at Microsoft Vista Administration
Book, July 2007, by Kanclirz
-
How to Cheat at Securing a Wireless Network
Book, August 2006, by Hurley
-
How to Cheat at Securing Linux
Book, October 2007, by Stanger
-
How to Cheat at Securing SQL Server 2005
Book, September 2007, by Horninger
-
How to Cheat at Windows System Administration Using Command Line Scripts
Book, October 2006, by Bhardwaj
-
Human-Centric Interfaces for Ambient Intelligence
Book, October 2009, by Aghajan
-
Human-Computer Interaction
Book, January 2013, by MacKenzie
-
IERI Procedia
Journal, 2013
-
IFIP Transactions A: Computer Science and Technology
Book Series
-
IFIP Transactions C: Communication Systems
Book Series
-
IFSR International Series on Systems Science and Engineering
Book Series
-
Image Fusion
Book, June 2008, by Stathaki
-
Implementation Techniques
Book, November 1997, by Leondes
-
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers
Book, September 2005, by Eady
-
Implementing Analytics
Book, June 2013, by Sheikh
-
Implementing Database Security and Auditing
Book, April 2005, by Ben Natan
-
Industrial and Manufacturing Systems
Book, November 1997, by Leondes
-
Industrial Network Security
Book, August 2011, by Knapp
-
Infinite Words
Book, February 2004, by Perrin
-
Information and Management
Journal, 2013
-
Information and Organization
Journal, 2013
-
Information and Software Technology
Journal, 2013
-
Information Assurance
Book, June 2002, by Boyce
-
Information Flow and Knowledge Sharing
Book, March 2008, by van Harmelen
-
Information Modeling and Relational Databases
Book, March 2008, by Halpin
-
Information Sciences
Journal, 2013
-
Information Security Risk Assessment Toolkit
Book, October 2012, by Talabis
-
Information Security Technical Report
Journal, 2013
-
Information Superhighways
Book, May 1995, by Monk
-
Information Systems
Journal, 2013
-
Information Systems Transformation
Book, February 2010, by Ulrich
-
Information Technology and Organizational Transformation
Book, February 2004, by Rivard
-
Information Visualization
Book, May 2012, by Ware
-
Information-Theoretic Methods for Estimating of Complicated Probability Distributions
Book, August 2006, by Zong
-
InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Book, June 2005, by Hurley
-
Infosecurity
Journal
-
InfoSecurity 2008 Threat Analysis
Book, October 2007, by Schooping
-
Innovation Happens Elsewhere
Book, April 2005, by Meyer
-
Inside the IMF
Book, October 1997, by Harper
-
Inside the SPAM Cartel
Book, November 2004, by Spammer-X
-
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Book, December 2005, by Cole
-
Insights Into Mobile Multimedia Communications
Book, October 1998, by Bull
-
Integrated Design and Simulation of Chemical Processes
Book, May 2003, by Dimian
-
Integrating ISA Server 2006 with Microsoft Exchange 2007
Book, May 2008, by Strachan
-
Integrating Wireless Technology in the Enterprise
Book, November 2003, by Wheeler
-
Intelligent Environments
Book, March 1997, by Droege
-
Intelligent Systems for Security Informatics
Book, February 2013, by Yang
-
Intelligent Systems in Process Engineering, Part I: Paradigms from Product and Process Design
Book, October 1995, by Han
-
Intelligent Systems in Process Engineering, Part II: Paradigms from Process Operations
Book, October 1995, by Stephanopoulos
-
Interaction Design for Complex Problem Solving
Book, November 2003, by Mirel
-
Interactive Technologies
Book Series, by Card
-
Interfacing with C
Book, December 2000, by Hutchings
-
International Journal of Information Management
Journal, 2013
-
Internet Multimedia Communications Using SIP
Book, January 2008, by Martinez Perea
-
Intersection
Book, October 2012
-
Introducing Information Management
Book, July 2005, by Hinton
-
Introduction to Cyber-Warfare
Book, June 2013
-
Introduction to Data Compression
Book, December 2005, by Sayood
-
Introduction to Data Compression
Book, October 2012, by Sayood
-
Introduction to e-Business
Book, February 2006, by Combe
-
Introduction to Matrix Computations
Book, May 1973, by Stewart
-
Introduction to Metamathematics
Book, January 1980, by Kleene
-
Introduction to Microprocessors and Microcontrollers
Book, November 2003, by Crisp
-
Introduction to Multimedia Systems
Book, October 2001, by Mitra
-
Introduction to the Graphical Kernal System (GKS)
Book, January 1986, by AUTHOR
-
Introduction to Web Matrix
Book, August 2003, by Hardy
-
Intrusion Prevention and Active Response
Book, March 2005, by Rash
-
Investigating Internet Crimes
Book, November 2013
-
Investigative Data Mining for Security and Criminal Detection
Book, December 2002, by Mena
-
iPhone and iOS Forensics
Book, March 2011, by Harrington
-
iPhone and iOS Forensics
Book, June 2011, by Hoog
-
IPv6
Book, December 2003, by Loshin
-
IPv6 Core Protocols Implementation
Book, October 2006, by Li
-
IT Manager's Handbook
Book, February 2012, by Holtsnider
-
IT Manager's Handbook: The Business Edition
Book, September 2009, by Holtsnider
-
IT Performance Management
Book, October 2003, by Wiggers
-
It's Our Research
Book, March 2012, by Sharon
-
Java Data Mining: Strategy, Standard, and Practice
Book, November 2006, by Hornick
-
JDBC
Book, August 2001, by Speegle
-
Joe Celko's Analytics and OLAP in SQL
Book, July 2006, by Celko
-
Joe Celko's Data and Databases
Book, July 1999, by Celko
-
Joe Celko's Data, Measurements and Standards in SQL
Book, September 2009, by Celko
-
Joe Celko's SQL for Smarties
Book, October 2010, by Celko
-
Joe Celko's SQL Programming Style
Book, April 2005, by Celko
-
Joe Celko's SQL Puzzles and Answers, Second Edition
Book, September 2006, by Celko
-
Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL
Book, January 2008, by Celko
-
Joe Celko's Trees and Hierarchies in SQL for Smarties
Book, January 2012, by Celko
-
Joe Celkos Complete Guide to NoSQL
Book, November 2013, by Celko
-
Journal of Engineering and Technology Management
Journal, 2013
-
Journal of King Saud University - Computer and Information Sciences
Journal, 2013
-
Journal of Manufacturing Processes
Journal, 2013
-
Journal of Manufacturing Systems
Journal, 2013
-
Journal of Systems and Software
Journal, 2013
-
Journal of Visual Languages and Computing
Journal, 2013
-
Journal of Web Semantics
Journal, 2013
-
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Book, December 2007, by Cameron
-
Keeping Found Things Found: The Study and Practice of Personal Information Management
Book, November 2007, by Jones
-
Kismet Hacking
Book, June 2008, by Thornton
-
Knowledge Acquisition and Machine Learning
Book, August 1993, by Morik
-
Knowledge Management
Book, September 2002, by Knight
-
Knowledge Networking
Book, September 1999, by Skyrme
-
Knowledge Representation and Reasoning
Book, May 2004, by Brachman
-
Knowledge-Based Systems, Four-Volume Set
Book, June 2000, by Leondes
-
Kohonen Maps
Book, June 1999, by Oja
-
L-System Fractals
Book, January 2007, by Mishra
-
Learning Through Knowledge Management
Book, November 2001, by Ahmed
-
Lego Software Power Tools With LDraw MLCad and LPub
Book, January 2003, by Syngress
-
Letting Go of the Words
Book, August 2012, by Redish
-
Light & Skin Interactions
Book, May 2010, by Baranoski
-
Linear Programs & Related Problems
Book, October 1992, by Nering
-
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Book, January 2013, by Malin
-
Location-Based Services
Book, April 2004, by Schiller
-
Logging and Log Management
Book, November 2012, by Chuvakin
-
Low Tech Hacking
Book, December 2011, by Wiles
-
Low-Power Design of Nanometer FPGAs
Book, September 2009, by Hassan
-
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Book, December 2008, by Varsalone
-
Machine Intelligence and Pattern Recognition
Book Series
-
Maintaining and Evolving Successful Commercial Web Sites
Book, December 2002, by Friedlein
-
Making Enterprise Information Management (EIM) Work for Business
Book, May 2010, by Ladley
-
Making IT Count
Book, August 2002, by Olson
-
Malware Forensics Field Guide for Linux Systems
Book, April 2013, by Malin
-
Manage IT as a Business
Book, August 2004, by Lientz
-
Managed Code Rootkits
Book, October 2010, by Metula
-
Management of Heterogeneous and Autonomous Database Systems
Book, October 1998, by Elmagarmid
-
Managing and Securing a Cisco Structured Wireless-Aware Network
Book, April 2004, by Wall
-
Managing Cisco Network Security 2E
Book, May 2002, by Syngress
-
Managing Data in Motion
Book, March 2013, by Reeve
-
Managing Financial Information in the Trade Lifecycle
Book, May 2008, by Groot
-
Managing Gigabytes
Book, May 1999, by Witten
-
Managing Information
Book, May 2002, by Wilson
-
Managing Information Security
Book, March 2010, by Vacca
-
Managing Microsoft's Remote Installation Services
Book, July 2005, by Rasmussen
-
Managing Systems Migrations and Upgrades
Book, May 2002, by Breakfield
-
Managing Time in Relational Databases
Book, July 2010, by Johnston
-
Many-Dimensional Modal Logics: Theory and Applications
Book, October 2003, by Kurucz
-
Maple By Example
Book, March 2005, by Abell
-
Market Data Explained
Book, October 2006, by Alvarez
-
Marketing Financial Services
Book, October 1995, by Ennew
-
Master Data Management
Book, September 2008, by Loshin
-
Mathematica by Example
Book, September 2008, by Abell
-
Mathematical Models of the Cell and Cell Associated Objects
Book, May 2006, by Ivanov
-
Mathematics for Dynamic Modeling
Book, September 1997, by Beltrami
-
Mathematics Mechanization and Applications
Book, July 2000, by Wang
-
Matlab
Book, July 2011, by Attaway
-
Matlab by Example
Book, January 2013, by Gdeisat
-
Matrix Perturbation Theory
Book, June 1990, by Stewart
-
Maya Python for Games and Film
Book, September 2011, by Mechtley
-
MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291)
Book, October 2003, by Syngress
-
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment (Exam 70-290)
Book, October 2003, by Syngress
-
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (Exam 70-292)
Book, October 2003, by Syngress
-
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)
Book, February 2003, by Syngress
-
MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)
Book, February 2004, by Syngress
-
MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293)
Book, October 2003, by Syngress
-
MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Exam 70-294)
Book, October 2003, by Syngress
-
MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 (Exam 70-296)
Book, November 2003, by Syngress
-
MDDL and the Quest for a Market Data Standard
Book, August 2007, by Sexton
-
Measuring Data Quality for Ongoing Improvement
Book, January 2013, by Sebastian-Coleman
-
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Book, September 2007, by Maynor
-
Microsoft Data Mining
Book, April 2001, by de Ville
-
Microsoft Exchange 2000 Infrastructure Design
Book, September 2001, by McCorry
-
Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2
Book, August 2006, by McCorry
-
Microsoft Exchange Server 2007 with SP1
Book, April 2008, by Redmond
-
Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation
Book, May 2007, by Redmond
-
Microsoft Log Parser Toolkit
Book, February 2005, by Giuseppini
-
Microsoft Outlook 2007 Programming
Book, May 2007, by Mosher
-
Microsoft Outlook Programming
Book, September 2002, by Mosher
-
Microsoft SharePoint 2007 Technologies
Book, December 2007, by Laahs
-
Microsoft SharePoint Technologies
Book, November 2004, by Laahs
-
Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook
Book, April 2007, by England
-
Microsoft Virtualization
Book, April 2010, by Olzak
-
Microsoft Vista for IT Security Professionals
Book, March 2007, by Piltzecker
-
Microsoft Windows 7 Administrator's Reference
Book, April 2010, by Orchilles
-
Microsoft Windows Security Fundamentals
Book, October 2006, by De Clercq
-
Microsoft Windows Server 2008 R2 Administrator's Reference
Book, July 2010, by Hannifin
-
Microsoft® Exchange Server 2003 Scalability with SP1 and SP2
Book, October 2006, by Bijaoui
-
Migrating to the Cloud
Book, October 2011, by Laszewski
-
Mining the Web
Book, October 2002, by Chakrabarti
-
Mission-Critical and Safety-Critical Systems Handbook
Book, November 2009, by Fowler
-
Mission-Critical Microsoft Exchange 2000
Book, December 2000, by Cochran
-
Mission-Critical Microsoft Exchange 2003
Book, November 2003, by Cochran
-
Mobile 3D Graphics
Book, November 2007, by Pulli
-
Mobile IPv6
Book, July 2009, by Li
-
Mobile Malware Attacks and Defense
Book, October 2008, by Dunham
-
Modeling Business Objects with XML Schema
Book, April 2003, by Hollander
-
Moderating Usability Tests
Book, February 2008, by Dumas
-
Modern Embedded Computing
Book, January 2012, by Barry
-
Modern Information Processing
Book, February 2006, by Bouchon-Meunier
-
Moving Objects Databases
Book, August 2005, by Hartmut Güting
-
MPLS: Next Steps
Book, April 2008, by Davie
-
Multifunction Peripherals for PCs
Book, January 2000, by Hobbs
-
Multilingual Speech Processing
Book, April 2006, by Schultz
-
Multimedia and Hypertext
Book, February 1995, by Nielsen
-
Multimedia Communications
Book, October 2000, by Gibson
-
Multimedia over IP and Wireless Networks
Book, March 2007, by van der Schaar
-
Multimedia Security Technologies for Digital Rights Management
Book, July 2006, by Zeng
-
Multiparametric Statistics
Book, September 2007, by Serdobolskii
-
MULTIPOINT METHODS FOR SOLVING NONLINEAR EQUATIONS
Book, January 2013, by Petkovic
-
Multiresolution Signal Decomposition
Book, October 2000, by Akansu
-
Multiscale Wavelet Methods for Partial Differential Equations
Book, August 1997, by Dahmen
-
Multivariate Polysplines
Book, June 2001, by Kounchev
-
Network and System Security
Book, March 2010, by Vacca
-
Network Routing
Book, March 2007, by Medhi
-
Network Security Evaluation Using the NSA IEM
Book, July 2005, by Rogers
-
Networked Graphics
Book, November 2009, by Steed
-
Networks on Chips
Book, July 2006, by Bertozzi
-
Newnes Interfacing Companion
Book, August 2002, by Fischer-Cripps
-
Next Generation Datacenters in Financial Services
Book, July 2009, by Bishop
-
Ninja Hacking
Book, September 2010, by Wilhelm
-
No Code Required
Book, April 2010, by Cypher
-
No Tech Hacking
Book, February 2008, by Mitnick
-
Nokia Firewall, VPN, and IPSO Configuration Guide
Book, November 2008, by Hay
-
Nokia Network Security Solutions Handbook
Book, December 2002, by Syngress
-
Nonlinear Computer Modeling of Chemical and Biochemical Data
Book, January 1996, by Rusling
-
Observing the User Experience
Book, September 2012, by Goodman
-
Ocean Modelling
Journal, 2013
-
OCEB Certification Guide
Book, September 2011, by Weiss
-
On Growth, Form and Computers
Book, October 2003, by Kumar
-
ON THE DEVELOPMENT OF CHINA'S INFORMATION TECHNOLOGY INDUSTRY
Book, November 2009, by Zemin
-
On Time Technology Implementation
Book, October 1999, by Lientz
-
On-Chip Communication Architectures
Book, April 2008, by Pasricha
-
Open Source Fuzzing Tools
Book, December 2007, by Rathaus
-
Open Source Software: Implementation and Management
Book, July 2004, by Kavanagh
-
OpenVMS with Apache, WASD, and OSU
Book, September 2002, by Winston
-
Optimization Techniques
Book, October 1997, by Leondes
-
Optimizing Compilers for Modern Architectures
Book, September 2001, by Allen
-
Optimizing Optimization
Book, October 2009, by Satchell
-
Oracle 10g Data Warehousing
Book, November 2004, by Hobbs
-
Oracle 10g Developing Media Rich Applications
Book, November 2006, by Dunckley
-
Oracle 10g RAC Grid, Services & Clustering
Book, May 2006, by Vallath
-
Oracle Data Warehouse Tuning for 10g
Book, September 2005, by Powell
-
Oracle Database Programming using Java and Web Services
Book, July 2006, by Mensah
-
Oracle Performance Tuning for 10gR2
Book, September 2006, by Powell
-
Oracle Real Application Clusters
Book, October 2003, by Vallath
-
Oracle SQL
Book, September 2004, by Powell
-
Organizing Information
Book, September 1985, by Soergel
-
OS X for Hackers at Heart
Book, November 2005, by Potter
-
Paper Prototyping
Book, April 2003, by Snyder
-
Parallel Computational Fluid Dynamics 2000
Book, April 2001, by Jenssen
-
Parallel Computational Fluid Dynamics 2005
Book, September 2006, by Deane
-
Parallel Computational Fluid Dynamics 2006
Book, August 2007, by Kwon
-
Parallel Processing for Artificial Intelligence 3
Book, February 1997, by Geller
-
Pascal for Students (including Turbo Pascal)
Book, December 1995, by Kemp
-
Past and Future of Information Systems
Book, March 2004, by Viborg Andersen
-
Pattern Recognition in Industry
Book, March 2005, by Bhagat
-
PC Interfacing
Book, January 1998, by An
-
PC Interfacing and Data Acquisition
Book, July 2000, by James
-
PCI Compliance
Book, August 2012, by Williams
-
Penetration Tester's Open Source Toolkit
Book, July 2011, by Faircloth
-
Perfect Password
Book, December 2005, by Burnett
-
Perl Scripting for Windows Security
Book, December 2007, by Carvey
-
Persuasive Technology
Book, December 2002, by Fogg
-
Pervasive Games
Book, June 2009, by Montola
-
Pervasive Information Architecture
Book, March 2011, by Resmini
-
Phishing Exposed
Book, November 2005, by Jevans
-
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Book, April 2007, by Cole
-
Physical Database Design
Book, March 2007, by Lightstone
-
Physical Security for IT
Book, November 2004, by Erbschloe
-
Physically Based Rendering
Book, June 2010, by Pharr
-
Pocket PC Clear & Simple
Book, April 2000, by Peacock
-
Point-Based Graphics
Book, June 2007, by Gross
-
Practical Anonymity
Book, May 2013, by Loshin
-
Practical Data Acquisition for Instrumentation and Control Systems
Book, June 2003, by Park
-
Practical Lock Picking
Book, September 2012, by Ollam
-
Practical Modern SCADA Protocols
Book, January 2004, by Clarke
-
Practical Oracle Security
Book, November 2007, by Shaul
-
Practical VoIP Security
Book, March 2006, by Porter, CISSP, CCNP, CCDA, CCS
-
Practical Web Analytics for User Experience
Book, October 2013, by Beasley
-
Predictive Data Mining
Book, August 1997, by Weiss
-
Principles of Big Data
Book, October 2013
-
Principles of Computer System Design
Book, June 2009, by Saltzer
-
Principles of Data Integration
Book, June 2012, by Doan
-
Principles of Database Query Processing for Advanced Applications
Book, December 1997, by Yu
-
Principles of Transaction Processing
Book, June 2009, by Bernstein
-
Probabilistic Methods for Bioinformatics
Book, April 2009, by Neapolitan
-
Probabilistic Methods for Financial and Marketing Informatics
Book, March 2007, by Neapolitan
-
Proceedings 1988 VLDB Conference
Book, December 1988, by VLDB
-
Proceedings 1989 VLDB Conference
Book, December 1989, by VLDB
-
Proceedings 1990 VLDB Conference
Book, November 1990, by VLDB
-
Proceedings 2002 VLDB Conference
Book, August 2002, by VLDB
-
Proceedings 2003 VLDB Conference
Book, September 2003, by VLDB
-
Processor Description Languages
Book, May 2008, by Mishra
-
Professional Penetration Testing
Book, August 2013, by Wilhelm
-
Programmer's Guide to Internet Mail
Book, October 1999, by Rhoton
-
Programming Language Pragmatics
Book, March 2009, by Scott
-
Programming Lego Mindstorms NXT
Book, June 2008, by Bishop
-
Programming Lego Mindstorms with Java
Book, April 2002, by Syngress
-
Programming Massively Parallel Processors
Book, December 2012, by Kirk
-
Quantifying Sustainable Development
Book, June 2000, by Hall
-
Quantifying the User Experience
Book, March 2012, by Sauro
-
Quantitative Finance
Book Series
-
Query Processing for Advanced Database Systems
Book, August 1993, by Freytag
-
Querying XML
Book, March 2006, by Melton
-
QUICKTIME DEVELOPER SERIES
Book Series
-
QuickTime for .NET and COM Developers
Book, January 2006, by Cromie
-
QuickTime Toolkit Volume One
Book, June 2004, by Monroe
-
Rapid Contextual Design
Book, December 2004, by Holtzblatt
-
Rapid System Prototyping with FPGAs
Book, September 2005, by Cofer
-
RAPID Value Management for the Business Cost of Ownership
Book, September 2003, by Wigodsky
-
Rdb
Book, September 1999, by Hobbs
-
Real Time Cameras
Book, April 2009, by DeLoura
-
Real-Life MDA
Book, December 2006, by Guttman
-
Real-Time Systems Development
Book, October 2005, by Williams
-
Reconfigurable Computing
Book, November 2007, by Hauck
-
Reinventing the IT Department
Book, August 2001, by White
-
Relational Database Design and Implementation
Book, July 2009, by Harrington
-
Relational Database Systems
Book, August 1995, by Simovici
-
Research in Information Systems
Book, November 2004, by Avison
-
Research Policy
Journal, 2013
-
Resilient Storage Networks
Book, April 2004, by Schulz
-
RF Engineering for Wireless Networks
Book, November 2004, by Dobkin
-
RFID Security
Book, June 2005, by Thornton
-
RFID+ Study Guide and Practice Exams
Book, February 2007, by Sanghera
-
Rick Gallahers MPLS Training Guide
Book, November 2003, by Syngress
-
Risk-Based Reliability Analysis and Generic Principles for Risk Reduction
Book, November 2006, by Todinov
-
Ruby Developers Guide
Book, February 2002, by Syngress
-
Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
Book, September 2005, by Lahti
-
Sarbanes-Oxley IT Compliance Using Open Source Tools
Book, December 2007, by Lahti
-
Scaling Microsoft Exchange 2000
Book, January 2002, by Bijaoui
-
Scene of the Cybercrime
Book, June 2008, by Littlejohn Shinder
-
Scientific and Engineering Computations for the 21st Century - Methodologies and Applications
Book, December 2002, by Mori
-
Scientific Computing and Differential Equations
Book, September 1991, by Golub
-
Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
Book, November 2006, by Muller
-
SDL '97: Time for Testing
Book, August 1997, by Cavalli
-
SDL '99
Book, June 1999, by Dssouli
-
Secure Your Network for Free
Book, February 2007, by Seagren
-
Securing Citrix XenApp Server in the Enterprise
Book, June 2008, by Azad
-
Securing HP NonStop Servers in an Open Systems World
Book, August 2006, by XYPRO Technology Corp
-
Securing IM and P2P Applications for the Enterprise
Book, July 2005, by Sachs
-
Securing SQL Server
Book, August 2012, by Cherry
-
Securing SQL Server
Book, January 2011, by Cherry
-
Securing the Smart Grid
Book, September 2010, by Flick
-
Securing Windows Server 2008
Book, May 2008, by Tiensivu
-
Security Assessment
Book, January 2004, by Syngress
-
Security for Microsoft Windows System Administrators
Book, September 2010, by Rountree
-
Security Log Management
Book, January 2006, by Babbin
-
Security Risk Management
Book, May 2011, by Wheeler
-
Security Sage's Guide to Hardening the Network Infrastructure
Book, May 2004, by Andres
-
Self-Modifying Systems in Biology and Cognitive Science
Book, March 1991, by Kampis
-
Semantic Web for the Working Ontologist
Book, May 2011, by Allemang
-
Semantics in Business Systems
Book, September 2003, by McComb
-
Sendmail: Theory and Practice
Book, February 1995, by Avolio
-
Service Science, Management, and Engineering:
Book, April 2012, by Xiong
-
Set Theory An Introduction To Independence Proofs
Book, December 1983, by Kunen
-
Setting the PACE in Product Development
Book, July 1996, by McGrath
-
Seven Deadliest Microsoft Attacks
Book, March 2010, by Kraus
-
Seven Deadliest Network Attacks
Book, April 2010, by Prowell
-
Seven Deadliest Social Network Attacks
Book, April 2010, by Timm
-
Seven Deadliest Unified Communications Attacks
Book, April 2010, by York
-
Seven Deadliest USB Attacks
Book, April 2010, by Anderson
-
Seven Deadliest Web Application Attacks
Book, March 2010, by Shema
-
Seven Deadliest Wireless Technologies Attacks
Book, March 2010, by Haines
-
Simulation
Book, October 2012, by Ross
-
Sketching User Experiences: Getting the Design Right and the Right Design
Book, April 2007, by Buxton
-
Sketching User Experiences: The Workbook
Book, December 2011, by Greenberg
-
Skype Me! From Single User to Small Enterprise and Beyond
Book, October 2005, by Daehne
-
Smart Phone and Next Generation Mobile Computing
Book, December 2005, by Zheng
-
Smart Things: Ubiquitous Computing User Experience Design
Book, August 2010, by Kuniavsky
-
Sniffer Pro Network Optimization & Troubleshooting Handbook
Book, August 2002, by Syngress
-
Snort 2.1 Intrusion Detection, Second Edition
Book, June 2004, by Caswell
-
Snort Intrusion Detection and Prevention Toolkit
Book, March 2007, by Caswell
-
Social Game Design
Book, December 2011, by Marques
-
Social Media Investigation for Law Enforcement
Book, November 2012, by Miller
-
Social Media Security
Book, August 2013, by Etue
-
Socially Engineered
Book, July 2013, by Cohen
-
Socially Responsible IT Management
Book, September 2002, by Erbschloe
-
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Book, April 2005, by Foster
-
Software Design Methodology
Book, March 2005, by Zhu
-
Software Development for Embedded Multi-core Systems
Book, April 2008, by Domeika
-
Software Development for Engineers
Book, September 1997, by Buchanan
-
Software Piracy Exposed
Book, April 2005, by Honick
-
SonicWALL Secure Wireless Networks Integrated Solutions Guide
Book, June 2008, by Levy
-
Spatial Databases
Book, May 2001, by Rigaux
-
Special Ops: Host and Network Security for Microsoft Unix and Oracle
Book, January 2003, by Syngress
-
Spin-stand Microscopy of Hard Disk Data
Book, December 2006, by Mayergoyz
-
Spoken Dialogue With Computers
Book, April 1998, by De Mori
-
SQL
Book, May 2001, by Melton
-
SQL
Book, August 2005, by Donahoo
-
SQL Clearly Explained
Book, April 2010, by Harrington
-
Start Right in E-Business
Book, September 2000, by Lientz
-
Starting Embedded Linux Development on an ARM Architecture
Book, October 2013, by Nicholson
-
Stealing the Network
Book, May 2004, by Russell
-
Stealing The Network
Book, May 2003, by Syngress
-
Stealing the Network
Book, February 2007, by Long
-
Stealing the Network: How to Own an Identity
Book, July 2005, by Russell
-
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Book, April 2009, by Long
-
Stochastic Local Search
Book, September 2004, by Hoos
-
Stop IT Project Failures
Book, June 1999, by Remenyi
-
Straight Through Processing for Financial Services
Book, November 2007, by Khanna
-
Strategic Intelligence Management
Book, March 2013
-
Strategies for Growth in SMEs
Book, November 2004, by Levy
-
Studies in Logic and Practical Reasoning
Book Series, by Gärdenfors
-
Subband Compression of Images: Principles and Examples
Book, July 1995, by Ramstad
-
Subdivision Methods for Geometric Design
Book, October 2001, by Warren
-
Supply Chain Design and Management
Book, December 2001, by Govil
-
Synchronous Precharge Logic
Book, August 2012, by Smoszna
-
Syngress Force Emerging Threat Analysis
Book, November 2006, by Graham
-
System Architecture with XML
Book, June 2002, by Daum
-
System Assurance
Book, December 2010, by Mansourov
-
Systems Engineering with SysML/UML
Book, February 2008, by Weilkiens
-
Systems Thinking
Book, June 2011, by Gharajedaghi
-
TCP/IP Sockets in C#
Book, April 2004, by Makofske
-
Teaching and Learning Formal Methods
Book, September 1996, by Hinchey
-
Techniques for 3-D Machine Perception
Book, February 1986, by Rosenfeld
-
Techno Forensics 2008
Book, December 2008, by Syngress
-
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
Book, March 2007, by Cole
-
Techno Security's Guide to Securing SCADA
Book, July 2008, by Wiles
-
Telecommunications Policy
Journal, 2013
-
Telematics and Informatics
Journal, 2013
-
Temporal Data & the Relational Model
Book, November 2002, by Date
-
Text Entry Systems
Book, March 2007, by MacKenzie
-
Texturing and Modeling
Book, December 2002, by Ebert
-
The Basics of Digital Forensics
Book, February 2012, by Sammons
-
The Basics of Hacking and Penetration Testing
Book, July 2011, by Engebretson
-
The Basics of Information Security
Book, June 2011, by Andress
-
The Best Damn Cisco Internetworking Book Period
Book, November 2003, by Syngress
-
The Best Damn Exchange, SQL and IIS Book Period
Book, December 2007, by Walther
-
The Best Damn Windows Server 2008 Book Period
Book, June 2008, by Piltzecker
-
The Craft of Information Visualization
Book, April 2003, by Bederson
-
The Designer's Guide to VHDL
Book, May 2008, by Ashenden
-
The Digital Crown
Book, October 2013
-
The E-Commerce Book
Book, October 2000, by Korper
-
The Elsevier and Mondo Visione World Capital Markets
Book Series
-
The Encyclopedia of Integer Sequences
Book, March 1995, by Sloane
-
The Engineering of Large Systems
Book, September 1998, by Zelkowitz
-
The Enterprise Architecture IT Project
Book, January 2003, by Longépé
-
The Essential Guide to Video Processing
Book, May 2009, by Bovik
-
The Essential Persona Lifecycle: Your Guide to Building and Using Personas
Book, May 2010, by Adlin
-
The Grid 2
Book, November 2003, by Foster
-
The Handbook of Global User Research
Book, October 2009, by Schumacher
-
The History of Information Security
Book, August 2007, by de Leeuw
-
The Information Systems Security Officer's Guide
Book, August 2003, by Kovacich
-
The Internet Security Guidebook
Book, January 2001, by Ellis
-
The IT / Digital Legal Companion
Book, June 2008, by Landy
-
The IT Regulatory and Standards Compliance Handbook:
Book, June 2008, by Wright
-
The Journal of Logic and Algebraic Programming
Journal, 2013
-
The Journal of Strategic Information Systems
Journal, 2013
-
The Mezonic Agenda: Hacking the Presidency
Book, September 2004, by Thomson
-
The Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook
Book, March 2001, by England
-
The Mobile Connection
Book, May 2004, by Ling
-
The Moderator's Survival Guide
Book, October 2013, by Tedesco
-
The Object Data Standard
Book, January 2000, by Cattell
-
The Official CHFI Study Guide (Exam 312-49)
Book, November 2007, by Kleiman
-
The Practitioner's Guide to Data Quality Improvement
Book, October 2010, by Loshin
-
The Profit Impact of Business Intelligence
Book, December 2006, by Williams
-
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit
Book, April 2009, by Horninger
-
The Real MCTS SQL Server 2008 Exam 70-433 Prep Kit
Book, April 2009, by Horninger
-
The Theory of Matrices
Book, May 1985, by Lancaster
-
The Usability Engineering Lifecycle
Book, March 1999, by Mayhew
-
The UX Book
Book, February 2012, by Hartson
-
Theory and Applications of Numerical Analysis
Book, July 1996, by Phillips
-
Theory of Linear Operations
Book, March 1987, by Banach†
-
Theory of Modeling and Simulation
Book, January 2000, by Zeigler
-
Theory of Relations
Book, December 2000, by Fraisse
-
Thor's Microsoft Security Bible
Book, July 2011, by Mullen
-
Thor's OS Xodus
Book, September 2013
-
Thoughts on Interaction Design
Book, January 2011, by Kolko
-
Three-dimensional Integrated Circuit Design
Book, September 2008, by Pavlidis
-
Topics on System Analysis and Integrated Water Resources Management
Book, October 2006, by Castelletti
-
Topological Algebras
Book, November 2000, by Balachandran
-
Total Information Risk Management
Book, September 2013
-
Transaction Processing
Book, September 1992, by Gray
-
Transactional Information Systems
Book, May 2001, by Weikum
-
Trojans, Worms, and Spyware
Book, August 2004, by Erbschloe
-
Troubleshooting Windows 2000 TCP/IP
Book, March 2000, by Syngress
-
Truth, Possibility and Probability
Book, June 1991, by Chuaqui
-
Ultimate SOS CD Library Season 1
Book, September 2007, by Wolf
-
Ultimate SOS CD Library Season 2
Book, September 2007, by Wolf
-
Understanding and Designing Computer Networks
Book, March 1995, by King
-
Understanding Augmented Reality
Book, May 2013
-
Understanding Digital Libraries
Book, December 2004, by Lesk
-
Understanding Mobile Human-Computer Interaction
Book, September 2005, by Love
-
Understanding Motion Capture for Computer Animation
Book, December 2010, by Menache
-
Understanding the New SQL
Book, October 1992, by Melton
-
Understanding Your Users
Book, December 2004, by Courage
-
Unified Communications Forensics
Book, August 2013
-
Usability Engineering
Book, September 1994, by Nielsen
-
Usability Engineering
Book, October 2001, by Rosson
-
Usability in Government Systems
Book, May 2012, by Buie
-
Usability Testing Essentials
Book, October 2010, by Barnum
-
User Experience in the Age of Sustainability
Book, May 2012, by Kramer
-
User Experience Management
Book, April 2011, by Lund
-
User Experience Re-Mastered
Book, October 2009, by Wilson
-
User Interface Design and Evaluation
Book, March 2005, by Stone
-
Using Open Source Platforms for Business Intelligence
Book, September 2012, by Wise
-
UTM Security with Fortinet
Book, November 2012, by Tam
-
Value Creation from E-Business Models
Book, August 2004, by Currie
-
Value-Driven IT Management
Book, April 2003, by Aitken
-
VHDL-2008
Book, November 2007, by Ashenden
-
Video Coding for Mobile Communications
Book, April 2002, by Al-Mualla
-
Video Conferencing over IP: Configure, Secure, and Troubleshoot
Book, March 2006, by Gough
-
Virtualization and Forensics
Book, May 2010, by Barrett
-
Virtualization for Security
Book, December 2008, by Hoopes
-
Virtualization with Microsoft Virtual Server 2005
Book, October 2006, by Jones
-
Visual Effects in A Digital World
Book, July 2001, by Goulekas
-
Visual Thinking
Book, April 2008, by Ware
-
VLSI Test Principles and Architectures
Book, July 2006, by Abdel-Hafez
-
Voice Interaction Design
Book, December 2004, by Harris
-
WarDriving and Wireless Penetration Testing
Book, November 2006, by Hurley
-
WarDriving: Drive, Detect, Defend
Book, March 2004, by Hurley
-
Web Application Design Handbook
Book, June 2004, by Fowler
-
Web Application Obfuscation
Book, December 2010, by Heiderich
-
Web Bloopers
Book, April 2003, by Johnson
-
Web Dragons
Book, November 2006, by Witten
-
Web Services, Service-Oriented Architectures, and Cloud Computing
Book, April 2003, by Barry
-
Web Services, Service-Oriented Architectures, and Cloud Computing
Book, January 2013, by Barry
-
Why Programs Fail
Book, June 2009, by Zeller
-
Windows 2000 Active Directory 2E
Book, September 2001, by Syngress
-
Windows 2000 Server System Administration Handbook
Book, February 2000, by Syngress
-
Windows 2012 Server Network Security
Book, April 2013, by Rountree
-
Windows 95 Clear & Simple
Book, March 1996, by MCBRIDE
-
Windows Forensic Analysis DVD Toolkit
Book, April 2007, by Carvey
-
Windows Server 2012 Security from End to Edge and Beyond
Book, May 2013
-
Winternals Defragmentation, Recovery, and Administration Field Guide
Book, June 2006, by Kleiman
-
Wireless Networking Complete
Book, August 2009, by Zheng
-
Wireless Networks
Book, April 2006, by Franceschetti
-
Wireless Reconnaissance in Penetration Testing
Book, October 2012, by Neely
-
Wireless Security: Know It All
Book, September 2008, by Chandra
-
Writing Effective Business Rules
Book, January 2012, by Witt
-
Writing Security Tools and Exploits
Book, January 2006, by Foster
-
XML for Data Architects
Book, June 2003, by Bean
-
XML in Data Management
Book, June 2004, by Aiken
-
Your Wish is My Command
Book, February 2001, by Lieberman
-
Zero-Day Exploit:
Book, July 2004, by Litchfield