Central Library

Computer Science

Elsevier Science Direct E-Books

SL. No. E-Book Titles Author

See MIPS Run

Dominic Sweetman

Multimedia over IP and Wireless Networks

Mihaela van der Schaar, Philip A Chou


Don Brutzman, Leonard Daly

Fault-Tolerant Systems

Israel Koren, C. Mani Krishna

Effective Prototyping for Software Makers

Jonathan Arnowitz, Michael Arent, Nevin Berger

Network Routing

Deepankar Medhi, Karthikeyan Ramasamy

Physical Database Design

Sam S. Lightstone, Toby J. Teorey, Tom Nadeau

Geometric Algebra for Computer Science

Leo Dorst, Daniel Fontijne, Stephen Mann

High-Performance Embedded Computing

Wayne Wolf

Letting Go of the Words

Janice (Ginny) Redish


Frank Cohen

Customizable Embedded Processors

Paolo Ienne, Rainer Leupers

Java Data Mining: Strategy, Standard, and Practice

Mark F. Hornick, Erik Marcadé, Sunil Venkayala

Probabilistic Methods for Financial and Marketing Informatics

Richard E Neapolitan, Xia Jiang

IPv6 Advanced Protocols Implementation

Qing Li, Jinmei Tatuya, Keiichi Shima

Network Analysis, Architecture, and Design

James D. McCabe

IT Manager's Handbook

Bill Holtsnider, Brian D. Jaffe

Digital Design and Computer Architecture

David Harris, Sarah Harris

Deploying IP and MPLS QoS for Multiservice Networks

John William Evans, Clarence Filsfils

Real-Life MDA

Michael Guttman, John Parodi

Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

Charles T. Betz

Visualization in Medicine

Bernhard Preim, Dirk Bartz

Point-Based Graphics

Markus Gross, Hanspeter Pfister

User-Centered Design Stories

Carol Righi, Janice James

Web Dragons

Ian H. Witten, Marco Gori, Teresa Numerico

Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks

Gerald R. Ash

Strategic Security Management

Karim Vellani

The Profit Impact of Business Intelligence

Steve Williams, Nancy Williams

Practical Model-Based Testing

Mark Utting, Bruno Legeard

Groovy Programming

Kenneth Barclay, John Savage

ESL Design and Verification

Grant Martin, Brian Bailey, Andrew Piziali

Data Preparation for Data Mining Using SAS

Mamdouh Refaat

Wireless Communications & Networking

Vijay Garg

UML 2 Certification Guide

Tim Weilkiens, Bernd Oestereich

Text Entry Systems

I. Scott MacKenzie, Kumiko Tanaka-Ishii

Joe Celko's SQL Puzzles and Answers

Joe Celko

Ethernet Networking for the Small Office and Professional Home Office

Jan L. Harrington

Sketching User Experiences: Getting the Design Right and the Right Design

Bill Buxton

Business Process Change

Paul Harmon

IPv6 Core Protocols Implementation

Qing Li, Tatuya Jinmei, Keiichi Shima

The History of Information Security

Karl Maria Michael de Leeuw

Parallel Computational Fluid Dynamics 2005: Theory and Applications

A. Deane, Gunther Brenner, A. Ecer, David Emerson, James McDonough, J. Periaux, N. Satofuka, Damien Tromeur-Dervout

Parallel Computational Fluid Dynamics 2006

Jang-Hyuk Kwon, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox

Wireless Networking Technology

Steve Rackley

CCTV Surveillance

Herman Kruegle

Data Mining and Predictive Analysis

Colleen McCue

Security Operations Management, 2nd ed.

Robert McCrie

Integrated Security Systems Design

Thomas L. Norman, CPP, PSP, CSC

Systems Thinking

Gharajedaghi, Jamshid

The Art of War for Security Managers

Scott Watson

Electronic Security Systems

Robert Pearson

Secure Roaming in 802.11 Networks

Raymond Greenlaw, Paul Goransson

Security Convergence

Dave Tyson

Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

Pierre Bijaoui

Developing Practical Wireless Applications

Dean A. Gratton

Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook

Ken England, Gavin JT Powell

Oracle 10g Developing Media Rich Applications

Lynne Dunckley, Larry Guros

Microsoft Windows Security Fundamentals

Jan De Clercq, Guido Grillenmeier

Oracle Performance Tuning for 10gR2

Gavin JT Powell

Microsoft Outlook 2007 Programming

Sue Mosher

Microsoft Exchange 2007: Tony Redmond's Guide to Successful Implementation

Tony Redmond

Computational Intelligence

Russell C. Eberhart, Yuhui Shi

System Level Design with Rosetta

Perry Alexander

Google Talking

Joshua Brashars, Johnny Long

Syngress Force Emerging Threat Analysis

Robert Graham

Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

Al Muller

Developer's Guide to Web Application Security

Michael Cross

Wireshark & Ethereal Network Protocol Analyzer Toolkit

Angela Orebaugh, Gilbert Ramirez, Jay Beale

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

James Foster, David Maynor

Stealing the Network

Johnny Long, Timothy Mullen, Ryan Russell

Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders

Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson

Snort Intrusion Detection and Prevention Toolkit

Brian Caswell, Jay Beale, Andrew Baker

Designing and Building Enterprise DMZs

Hal Flynn

Network Security Assessment

Steve Manzuik, Ken Pfeil, Andrew Gold

Cryptography for Developers

Tom St Denis

How to Cheat at Windows System Administration Using Command Line Scripts

Pawan K Bhardwaj

Virtualization with Microsoft Virtual Server 2005

Andy Jones, Rogier Dittner, David Rule, Ken Majors, Matthijs ten Seldam, Twan Grotenhuis, Geoffrey Green

Hack the Stack

Michael Gregg

WarDriving and Wireless Penetration Testing

Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

T. Bradley

FISMA Certification and Accreditation Handbook

L. Taylor

Configuring Juniper Networks NetScreen & SSG Firewalls

Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin

Secure Your Network for Free

Eric Seagren

CD and DVD Forensics

Paul Crowley

Enemy at the Water Cooler

Brian T Contos

Cyber Crime Investigations

Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel

RFID+ Study Guide and Practice Exams

Paul Sanghera


Craig Schiller, Jim Binkley

How to Cheat at Configuring Exchange Server 2007

Henrik Walther

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood

Microsoft Vista for IT Security Professionals

Tony Piltzecker

Asterisk Hacking

Joshua Brashars

Building Robots with LEGO Mindstorms NXT

Mario Ferrari, Guilio Ferrari, David Astolfo

Security+ Study Guide

Ido Dubrawsky, Jeremy Faircloth

Cross Site Scripting Attacks

Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager

How to Cheat at IIS 7 Server Administration

Chris Adams, Brian Frederick

Windows Forensic Analysis DVD Toolkit

Harlan Carvey

Alternate Data Storage Forensics

Amber Schroader, Tyler Cohen

PCI Compliance

Tony Bradley, Anton Chuvakin, Anatoly Elberg, Brian J. Koerner

Linksys WRT54G Ultimate Hacking

Paul Asadoorian, Larry Pesce

Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress

David E. Williams

Zen and the Art of Information Security

Ira Winkler

How to Cheat at VoIP Security

Thomas Porter, Michael Gough

How to Cheat at Configuring Open Source Security Tools

Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty

Business Continuity and Disaster Recovery for IT Professionals

Susan Snedaker

Perl Scripting for Windows Security

Harlan Carvey

How to Cheat at Microsoft Vista Administration

Jan Kanclirz

How to Cheat at Configuring VmWare ESX Server

David Rule

Open Source Fuzzing Tools

Noam Rathaus, Gadi Evron

How to Cheat at Securing SQL Server 2005

Mark Horninger

The Official CHFI Study Guide (Exam 312-49)

Dave Kleiman

Practical Oracle Security

Josh Shaul, Aaron Ingram

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Thomas W Shinder

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Rob Cameron, Neil R. Wyler

The Designer's Guide to VHDL

Peter J. Ashenden

Digital Modeling of Material Appearance

Julie Dorsey, Holly Rushmeier, François Sillion

Architecture Design for Soft Errors

Shubu Mukherjee

Reconfigurable Computing

Scott Hauck, André DeHon

Verification Techniques for System-Level Design

Masahiro Fujita, Indradeep Ghosh, Mukul Prasad

GUI Bloopers 2.0

Jeff Johnson

Keeping Found Things Found: The Study and Practice of Personal Information Management

William Jones

Visual Thinking

Colin Ware

Annotated C# Standard

Jon Jagger, Nigel Perry, Peter Sestoft

Image Fusion

Tania Stathaki

Wireless Sensor and Actuator Networks

Roberto Verdone, Davide Dardari, Gianluca Mazzini, Andrea Conti

Microscope Image Processing

Qiang Wu, Fatima Merchant, Kenneth Castleman

Digital Watermarking and Steganography

Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker

Semantic Web for the Working Ontologist

Dean Allemang, James Hendler

Measuring the User Experience

Thomas Tullis, William Albert

Information Assurance

Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi

Information Modeling and Relational Databases

Terry Halpin, Tony Morgan

Microsoft SharePoint 2007 Technologies

Kevin Laahs, Emer McKenna, Veli-Matti Vanamo

Business Metadata: Capturing Enterprise Knowledge

William H. Inmon, Bonnie O'Neil, Lowell Fryman

On-Chip Communication Architectures

Sudeep Pasricha, Nikil Dutt

Moderating Usability Tests: Principles and Practices for Interacting

Joseph S. Dumas, Beth A. Loring

System-on-Chip Test Architectures

Laung-Terng Wang, Charles E. Stroud, Nur A. Touba

HCI Beyond the GUI

Philip Kortum

Unleashing Web 2.0

Gottfried Vossen, Stephan Hagemann

Evaluating Children's Interactive Products

Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi

Embedded DSP Processor Design

Dake Liu

Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL

Joe Celko

Aspect-Oriented Programming with the e Verification Language

David Robinson


Peter J. Ashenden, Jim Lewis

Wireless Networking

Anurag Kumar, D. Manjunath, Joy Kuri

TCP/IP Sockets in Java

Kenneth L. Calvert, Michael J. Donahoo

Systems Engineering with SysML/UML

Tim Weilkiens

Processor Description Languages

Prabhat Mishra, Nikil Dutt

Internet Multimedia Communications Using SIP

Rogelio Martinez Perea

DW 2.0: The Architecture for the Next Generation of Data Warehousing

William H. Inmon, Derek Strauss, Genia Neushloss

Bluetooth Application Programming with the Java APIs Essentials Edition

Timothy J. Thompson, C Bala Kumar, Paul Kline

Executing Data Quality Projects

Danette McGilvray

Practical Guide to SysML

Sanford Friedenthal, Rick Steiner, Alan Moore

MPLS: Next Steps

Bruce S. Davie, Adrian Farrel

Network Security: Know It All

James Joshi

Digital Signal Processing System Design

Nasser Kehtarnavaz

Memory Systems

Bruce Jacob, Spencer Ng, David Wang

Handbook of Knowledge Representation

Frank van Harmelen, Vladimir Lifschitz, Bruce Porter

Information Flow and Knowledge Sharing

Flavio Soares Correa da Silva, Jaume Agusti-Cullell, Frank van Harmelen

Introduction to CDMA Wireless Communications

Mosa Ali Abu-Rgheff

Designing Storage for Exchange 2007 SP1

Pierre Bijaoui, Juergen Hasslauer

Microsoft Exchange Server 2007 with SP1

Tony Redmond

Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

Joe Grand, Frank Thornton, Albert Yarusso, Lee Barken, Tom Owad, Ryan Russell, Bobby Kinstle, Marcus R Brown, Job de Haas, Deborah Kaplan

Kismet Hacking

Frank Thornton

Physical and Logical Security Convergence: Powered By Enterprise Security Management

William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole

AVIEN Malware Defense Guide for the Enterprise

David Harley

Google Hacking for Penetration Testers

Johnny Long

SonicWALL Secure Wireless Network Integrated Solutions Guide

Khai Tran, Joe Levy, Lauren Pederson

How to Cheat at Securing Linux

James Stanger

Nessus Network Auditing

Russ Rogers

Web Application Vulnerabilities

Steven Palmer

How to Cheat at Administering Office Communications Server 2007

Anthony Piltzecker

No Tech Hacking

Johnny Long, Kevin D. Mitnick

Sarbanes-Oxley IT Compliance Using Open Source Tools

Christian B Lahti, Roderick Peterson

The Best Damn Server Virtualization Book Period

Rogier Dittner, David Rule

The Best Damn Firewall Book Period

Thomas W Shinder

The Best Damn Exchange, SQL and IIS Book Period

Henrik Walther, Mark Horninger, Chris Adams

TechnoSecurity's Guide to E-Discovery and Digital Forensics

Jack Wiles

InfoSecurity 2008 Threat Analysis

Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg

The Best Damn IT Security Management Book Period

Susan Snedaker, Robert McCrie, Karim Vellani

The Best Damn Cybercrime and Digital Forensics Book Period

Jack Wiles, Anthony Reyes

How to Cheat at Deploying and Securing RFID

Frank Thornton, Paul Sanghera

How to Cheat at Securing Your Network

Ido Dubrawsky

Reverse Engineering Code with IDA Pro

Chris Paget, Walter Pearce, Damon Cortesi

Managing Catastrophic Loss of Sensitive Data

Constantine Photopoulos

OSSEC Host-Based Intrusion Detection Guide

Rory Bray, Daniel Cid, Andrew Hay

Nmap in the Enterprise

Angela Orebaugh, Becky Pinkard

Microsoft Forefront Security Administration Guide

Jesse Varsalone

Check Point NGX R65 Security Administration

Ralph Bonnell

OS X Exploits and Defense

David Harley

Secrets Stolen, Fortunes Lost

Christopher Burgess, Richard Power

The IT Digital Legal Companion

Gene K. Landy, Amy J. Mastrobattista

Netcat Power Tools

Giovanni Giacobbi

The IT Regulatory and Standards Compliance Handbook:

Craig S. Wright

Nagios 3 Enterprise Network Monitoring

Max Schubert, Derrick Bennett, Andreas Ericsson

Malware Forensics

Cameron H. Malin, Eoghan Casey, James M. Aquilina

The Best Damn Windows Server 2008 Book Period

Anthony Piltzecker, Susan Snedaker

Integrating ISA Server 2006 with Microsoft Exchange 2007

Fergus Strachan

Scene of the Cybercrime

Debra Littlejohn Shinder, Michael Cross

Programming Lego Mindstorms NXT

Owen Bishop

Securing Windows Server 2008

Aaron Tiensivu

Securing Citrix Presentation Server in the Enterprise

Tariq Azad

Techno Security's Guide to Securing SCADA

Jack Wiles

Effective Prototyping with Excel

Jonathan Arnowitz, Michael Arent, Nevin Berger, Fred Sampson

Probabilistic Methods for Bioinformatics

Richard E Neapolitan, Xia Jiang

Building Intelligent Interactive Tutors

Beverly Park Woolf

Technical, Commercial and Regulatory Challenges of QoS

XiPeng Xiao

Business Modeling

David M. Bridgeland, Ron Zahavi

Partial-Update Adaptive Signal Processing

Kutluyil Dogancay

P2P Networking and Applications

John Buford, Heather Yu, Eng Keong Lua

Master Data Management

David Loshin

Web Application Design Patterns

Pawan Vora

Three-dimensional Integrated Circuit Design

Vasilis F. Pavlidis, Eby G. Friedman

Computer and Information Security Handbook

John R. Vacca

Broadband Cable Access Networks

David Large, James Farmer

Networked Graphics

Steed, Anthony

Low-Power Design of Nanometer FPGAs

Mohab Anis, Hassan Hassan

Building the Agile Enterprise

Cummins, Fred

Deploying QoS for Cisco IP and Next Generation Networks

Vinod Joseph, Tony Jeffress, Brett Chapman

Disappearing Cryptography

Peter Wayner

Why Programs Fail

Andreas Zeller

TCP/IP Sockets in C

Michael J. Donahoo, Kenneth L. Calvert

The Illustrated Network

Walter Goralski

Database Archiving

Jack E. Olson

Joe Celko's Data, Measurements and Standards in SQL

Celko, Joe

Relational Database Design and Implementation

Harrington, Jan

Handbook of Global User Research

Schumacher, Robert

How to Build a Digital Library

Witten, Ian

SOA and Web Services Interface Design

Bean, James

Mobile Technology for Children

Druin, Allison

Geometric Algebra for Computer Science (Revised Edition)

Dorst, Leo

Developing Virtual Reality Applications

Craig, Alan

Principles of Computer System Design

Saltzer, Jerome

Semiconductors and the Information Revolution

Orton, John

RF and Digital Signal Processing for Software-Defined Radio

Tony J. Rouphael

Embedded Linux Development Using Eclipse

Doug Abbott

Principles of Transaction Processing

Philip A. Bernstein, Eric Newcomer

Forms that Work

Caroline Jarrett, Gerry Gaffney

Next Generation SSH2 Implementation

Justin Peltier

SAP Security Configuration and Deployment

Joey Hirao

GFI Network Security and PCI Compliance Power Tools

Brien Posey

Nokia Firewall, VPN, and IPSO Configuration Guide

Andrew Hay, Keli Hay, Peter Giannoulis

E-discovery: Creating and Managing an Enterprisewide Program

Karen A. Schuler

Mobile Malware Attacks and Defense

Ken Dunham

Virtualization for Security

John Hoopes

Cisco Router and Switch Forensics

Liu, Dale

SQL Injection Attacks and Defense

Clarke, Justin

Professional Penetration Testing

Wilhelm, Thomas

Eleventh Hour Security+

Dubrawsky, Ido

Eleventh Hour Network+

Alpern, Naomi

Bebop to the Boolean Boogie

Clive Maxfield

The Practitioner's Guide to Data Quality Improvement

Loshin, David

Optical Networks

Ramaswami, Rajiv

Handbook of Digital Forensics and Investigation

Casey, Eoghan

Electronic Design Automation

Wang, Laung-Terng

Beyond the Usability Lab

Albert, William

Smart Things: Ubiquitous Computing User Experience Design

Kuniavsky, Mike

Information Systems Transformation

Ulrich, William

Design to Thrive

Howard, Tharon

Designing with the Mind in Mind

Johnson, Jeff

Managing Time in Relational Databases

Johnston, Tom

Physically Based Rendering

Pharr, Matt

Usability Testing Essentials

Barnum, Carol

Light and Skin Interactions

Baranoski, Gladimir

User Experience Re-Mastered

Wilson, Chauncey

Interconnecting Smart Objects with IP

Vasseur, Jean-Philippe

Making Enterprise Information Management (EIM) Work for Business

Ladley, John

SQL Clearly Explained

Harrington, Jan

Thoughts on Interaction Design

Kolko, Jon


Jiang, Zemin

System Assurance

Mansourov, Nikolai

The Essential Persona Lifecycle: Your Guide to Building and Using Personas

Adlin, Tamara

Understanding Motion Capture for Computer Animation

Menache, Alberto

Agile Development and Business Goals

Holtsnider, Bill

No Code Required

Cypher, Allen

Entity Resolution and Information Quality

Talburt, John

Joe Celko's SQL for Smarties

Celko, Joe

Analyzing Social Media Networks with Microsoft NodeXL

Hansen, Derek

Cyber Attacks

Amoroso, Edward

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

Liu, Dale

Microsoft Virtualization

Olzak, Thomas

A Guide to Kernel Exploitation

Perla, Enrico

Eleventh Hour Linux+

Speake, Graham

PCI Compliance

Chuvakin, Anton

Digital Forensics for Network, Internet, and Cloud Computing

Garrison, Clint

Seven Deadliest Wireless Technologies Attacks

Haines, Brad

Seven Deadliest Web Application Attacks

Shema, Mike

Seven Deadliest Social Network Attacks

Timm, Carl

Seven Deadliest Unified Communications Attacks

York, Dan

Seven Deadliest Network Attacks

Prowell, Stacy

Seven Deadliest Microsoft Attacks

Kraus, Rob

Seven Deadliest USB Attacks

Anderson, Brian

Virtualization and Forensics

Barrett, Diane

Microsoft Windows 7 Administrator's Reference

Orchilles, Jorge

CISSP Study Guide

Conrad, Eric

Eleventh Hour CISSP

Conrad, Eric

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Street, Jayson

Securing the Smart Grid

Flick, Tony

Managed Code Rootkits

Metula, Erez

Microsoft Windows Server 2008 R2 Administrator's Reference

Hannifin, Dustin

Citrix XenDesktop Implementation..

James, Gareth R.

Ninja Hacking

Wilhelm, Thomas

Security for Microsoft Windows System Administrators

Rountree, Derrick

Digital Video Surveillance and Security

Caputo, Anthony

Metrics and Methods for Security Risk Management

Young, Carl

Heuristic Search

Edelkamp, Stefan

Architecture of Network Systems

Serpanos, Dimitrios

Data Mining: Practical Machine Learning Tools and Techniques

Witten, Ian

Developing High Quality Data Models

West, Matthew

Global UX

Sherman, Paul

Thoughts on Interaction Design

Kolko, Jon

Data Mining

Han, Jiawei

Effective Security Management

Sennewald, Charles

Database Modeling and Design

Teorey, Toby

Electronic Access Control

Little, Karen

Pervasive Information Architecture

Resmini, Andrea

Brave NUI World

Wigdor, Dennis

Private Cloud Computing

Smoot, Stephen

Deploying Next Generation Multicast-enabled Applications

Joseph, Vinod

GPU Computing Gems Emerald Edition


API Design for C++

Reddy, Martin

Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

Betz, Charles

Data Architecture

Tupper, Charles

A Practical Guide to SysML

Friedenthal, Sanford

3C Vision


Design Research through Practice

Koskinen, Ilpo

Systems Thinking

Gharajedaghi, Jamshid

GPU Computing Gems Jade Edition


Semantic Web for the Working Ontologist

Allemang, Dean

Private Security and the Law

Nemeth, Charles

OCEB Certification Guide

Weilkiens, Tim

Heterogeneous Computing with OpenCL

Gaster, Benedict

CUDA Application Design and Development

Farber, Rob

Thor's Microsoft Security Bible

Mullen, Timothy

Securing the Cloud

Winkler, J.R. ("Vic")

Web Application Obfuscation

Heiderich, Mario

Security Risk Management

Wheeler, Evan

Securing SQL Server

Cherry, Denny

Digital Forensics for Legal Professionals

Daniel, Larry

Industrial Network Security

Knapp, Eric

Migrating to the Cloud

Laszewski, Tom

The Basics of Information Security

Andress, Jason

The Basics of Hacking and Penetration Testing

Engebretson, Patrick

iPhone and iOS Forensics

Hoog, Andrew

Low Tech Hacking

Wiles, Jack

Moving To The Cloud

Dinkar, Sitaram

Coding for Penetration Testers

Andress, Jason

Information Visualization

Ware, Colin

Sketching User Experiences: The Workbook

Greenberg, Saul

Risk Analysis and the Security Survey

Broder, James F.


Flynt, Clif

Observing the User Experience

Kuniavsky, Mike

Quantifying the User Experience

Sauro, Jeff

Writing Effective Business Rules

Witt, Graham

It's Our Research

Sharon, Tomer

User Experience Management

Lund, Arnie

Business Intelligence

Loshin, David

Letting Go of the Words

Redish, Janice (Ginny)

Grounded Innovation

Holmquist, Lars Erik

Design for Emotion

van Gorp, Trevor

Joe Celko's Trees and Hierarchies in SQL for Smarties

Celko, Joe

Data Insights

Whitney, Hunter

User Experience in the Age of Sustainability

Kramer, Kem-Laurin


Guenther, Milan

Usability in Government Systems

Buie, Elizabeth

Content Strategy at Work

Bloomstein, Margot

Digital Video and HD

Poynton, Charles

Data Virtualization for Business Intelligence Systems

van der Lans, Rick

Agile Data Warehousing Project Management

Hughes, Ralph

Designing the Search Experience

Russell-Rose, Tony

Temporal QOS Management in Scientific Cloud Workflow Systems

Liu, Xiao

Security Consulting

Sennewald, Charles

Synchronous Precharge Logic

Smoszna, Marek

The Basics of Cyber Warfare

Winterfeld, Steve

Federated Identity Primer

Rountree, Derrick

Introduction to Data Compression

Sayood, Khalid

Homeland Security

Bullock, Jane

Using Open Source Platforms for Business Intelligence

Wise, Lyndsay

Handbook on Securing Cyber-Physical Critical Infrastructure

Das, Sajal

Data Governance

Ladley, John

Computer Animation

Parent, Rick

Effective Physical Security

Fennelly, Lawrence

CUDA Programming

Cook, Shane

Collaborative Enterprise Architecture

Bente, Stefan

IT Manager's Handbook

Holtsnider, Bill

Agile User Experience Design

Brown, Diana

Structured Parallel Programming

McCool, Michael

Cargo Theft, Loss Prevention, and Supply Chain Security

Burges, Dan

Principles of Data Integration

Halevy, Alon

Malware Forensic Field Guide for Windows Systems

Malin, Cameron

Client-Side Attacks and Defense

Oriyano, Sean-Philip

Logging and Log Management

Chuvakin, Anton

FISMA and the Risk Management Framework

Gantz, Stephen

Wireless Reconnaissance in Penetration Testing

Neely, Matthew

Augmented Reality

Kipper, Greg

Information Security Risk Assessment Toolkit

Talabis, Mark

Federal Cloud Computing

Metheny, Matthew


Gragido, Will

Data Hiding

Raggo, Michael

UTM Security with Fortinet

Tam, Kenneth

Securing SQL Server

Cherry, Denny

PCI Compliance

Chuvakin, Anton

Advanced Persistent Threat

Cole, Eric

The Hacker's Guide to OS X

Ghassemlouei, Alijohn

Hacking Web Apps

Shema, Mike

Violent Python

O'Connor, TJ

CISSP Study Guide

Conrad, Eric

Network Intrusion Analysis

Fichera, Joe

SQL Injection Attacks and Defense

Clarke, Justin

Keys to the Kingdom

Ollam, Deviant

Practical Lock Picking

Ollam, Deviant

Beyond CISSP

Wheeler, Evan

Customer Interviewing

Alvarez, Cindy

Cyber Security and IT Infrastructure Protection

Vacca, John

Going Parallel with C++

Hummel, Joe

Insights in Computer Science 1

Doe, John

Insights in Computer Science 2

Doe, John

Managing Information Security

Vacca, John

Network and System Security

Vacca, John

Programming with CUDA and OpenACC

Farber, Rob

UI Inspection Methods


Computer and Information Security Handbook

Vacca, John

Learning Processing

Shiffman, Daniel

Writing for Interaction

Newman Lior, Linda

Data Modeling Essentials

Simsion, Graeme

UI is Communication

McKay, Everett

Measuring Data Quality for Ongoing Improvement

Sebastian-Coleman, Laura

Managing Data in Motion

Reeve, April

Social Data Analytics

Rogers, Shawn

Network Convergence

Joseph, Vinod

Web Services, Service-Oriented Architectures, and Cloud Computing

Barry, Douglas K.

Visual Usability

Levinson, Deborah

Application Administrators Handbook

Bourne, Kelly

Implementing Analytics

Sheikh, Nauman

Principles of Big Data

Berman, Jules

Combinatorial Topology and Distributed Computing

Herlihy, Maurice

Practical Web Analytics for User Experience

Beasley, Michael

Cloud Computing

Marinescu, Dan

Moderating One-on-One User Research

Tedesco, Donna


Smith, Kel

Hacking the Scene

Cohen, Tyler

Enterprise Data Services

Sarkar, Pushpak

Analyzing the Social Web

Golbeck, Jennifer

Total Information Risk Management

Borek, Alexander

Human-Computer Interaction

MacKenzie, I. Scott

FISMA Compliance Handbook

Taylor, Laura

A Practical Guide to Business Analytics

Fitzgerald, Jaime

Data Warehousing in the Age of Big Data

Krishnan, Krish

Heterogeneous Computing with OpenCL

Gaster, Benedict

The Basics of Cloud Computing

Rountree, Derrick

Brainstorming and Beyond

Wilson, Chauncey

Joe Celko’s Complete Guide to NoSQL

Celko, Joe

The Digital Crown

Leibtag, Ahava

High Performance Deformable Image Registration Algorithms for Manycore Processors

Shackleford, James

Penetration Testing with Backtrack 5

Broad, James

Computation and Storage in the Cloud

Yuan, Dong

Software Engineering

Schmidt, Richard

Agile Software Architect

Babar, Muhammad Ali

Enterprise Application Administration

Faircloth, Jeremy

Introduction to Cyber-Warfare

Shakarian, Paulo

Investigating Internet Crimes

Shipley, Todd

Accelerating Matlab with GPU

Suh, Jung

Mobile User Experience Archetypes

Mendoza, Adrian

Assessing Vendors

More, Josh

User Interface Inspection Methods

Wilson, Chauncey

Credible Checklists and Quality Questionnaires

Wilson, Chauncey

Interview Techniques for UX Practitioners

Wilson, Chauncey

Practical Anonymity

Loshin, Pete

The Wireshark Field Guide

Shimonski, Robert

Intel Xeon Phi Coprocessor High Performance Programming

Jeffers, Jim

Thor's OS Xodus

Mullen, Timothy "Thor"

Business Continuity and Disaster Recovery Planning for IT Professionals

Snedaker, Susan

Analytical Approaches for Customer Centricity

Loshin, David

Using Information to Develop a Culture of Customer Centricity

Loshin, David

Mastering Cloud Computing

Buyya, Rajkumar

The Case for the Top Data Job

Aiken, Peter

Emerging Trends in ICT Security

Akhgar, Babak

Mastering Private Cloud with Windows Server 2012

Chou, Yung

Simple Steps to Data Encryption:

Loshin, Pete

Measuring the User Experience

Tullis, Thomas

Visualization in Medicine

Preim, Bernhard

Understanding Augmented Reality

Craig, Alan B.

Malware Forensics Field Guide for Linux Systems

Malin, Cameron

When Botnets Attack

Zachry, Josh

Digital Forensics Processing and Procedures

Watson, David

Windows 2012 Server Network Security

Rountree, Derrick

IT Audit

Tuuri, Dan

Hacking .NET

Simon, Robert

Windows Server 2012 Security from End to Edge and Beyond

Shinder, Thomas W

Social Media Security

Etue, David

Professional Penetration Testing

Wilhelm, Thomas

Risk Management Framework

Broad, James

Computer Incident Response and Forensics Team Management

Johnson, Leighton

Applied Cyber Security and the Smart Grid

Knapp, Eric

Time Frequency Analysis

Boualem Boashash

Network Simulation Experiments Manual

Emad Aboelela

XML in Data Management: Understanding and Applying Them Together

Peter Aiken, M. David Allen

QuickTime Toolkit Volume One: Basic Movie Playback and Media Types

Tim Monroe

QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types

Tim Monroe

GMPLS: Architecture and Applications

Adrian Farrel, Igor Bryskin

Face Processing: Advanced Modeling and Methods

Wenyi Zhao, Rama Chellappa

Proceedings 2004 VLDB Conference: The 30th International Conference on Very Large Databases (VLDB)


Network Processor Design: Issues and Practices, Volume 3

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices

George Varghese

Complete Maya Programming Volume II: An In-depth Guide to 3D Fundamentals, Geometry, and Modeling

David Gould

An Introduction to Programming with IDL

Kenneth Bowman

Smart Phone and Next Generation Mobile Computing

Pei Zheng, Lionel Ni

MEL Scripting for Maya Animators

Mark R. Wilkins, Chris Kazmier

Joe Celko's SQL Programming Style

Joe Celko

Data Model Patterns: A Metadata Map

David C. Hay

Moving Objects Databases

Ralf Hartmut Güting, Markus Schneider

Cost-Justifying Usability: An Update for the Internet Age

Randolph G. Bias, Deborah J. Mayhew

Practical Time-Frequency Analysis

Rene Carmona, WenLiang Hwang, Bruno Torresani

Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization

Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper

C# 2.0: Practical Guide for Programmers

Michel de Champlain, Brian G. Patrick

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration

Earl Cox

Network Processor Design: Issues and Practices, Volume 2

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

Multiscale Wavelet Methods for Partial Differential Equations

Wolfgang Dahmen, Andrew Kurdila, Peter Oswald

Machine Vision: Theory, Algorithms, Practicalities

E. R. Davies

SQL: Practical Guide for Developers

Michael J. Donahoo, Gregory D. Speegle

Mac OSX Developer Guide

Jesse Feiler

Time-Frequency/Time-Scale Analysis

Patrick Flandrin

Visual Effects in A Digital World: A Comprehensive Glossary of over 7000 Visual Effects Terms

Karen Goulekas

Network Security: A Practical Approach

Jan L. Harrington

Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design

Karen Holtzblatt, Jessamyn Burns Wendell, Shelley Wood

Joe Celko's SQL for Smarties: Advanced SQL Programming

Joe Celko

Commonsense Reasoning

Erik T. Mueller

Spine Technology Handbook

Steven M. Kurtz, Avram Edidin

Globus® Toolkit 4: Programming Java Services

Borja Sotomayor, Lisa Childers

Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G

Luis M. Correia

Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control

Giorgio Franceschetti, Sabatino Stornelli

Programming with Quartz: 2D and PDF Graphics in Mac OS X

David Gelphman, Bunny Laden

Joe Celko's Analytics and OLAP in SQL

Joe Celko

Networks on Chips: Technology and Tools

Giovanni De Micheli, Luca Benini, Luca Benini

VLSI Test Principles and Architectures: Design for Testability

Laung-Terng Wang, Cheng-Wen Wu, Xiaoqing Wen

Designing SOCs with Configured Cores: Unleashing the Tensilica Xtensa and Diamond Cores

Steve Leibson

Multiprocessor Systems-on-Chips

Ahmed Jerraya, Wayne Wolf

Communication Networking: An Analytical Approach

Anurag Kumar, D. Manjunath, Joy Kuri

VHDL: Coding and Logic Synthesis with SYNOPSYS

Weng Fook Lee

Fuzzy Theory Systems

Cornelius Leondes

Knowledge-Based Systems

Cornelius Leondes

Expert Systems

Cornelius Leondes

Database and Data Communication Network Systems

Cornelius Leondes

Enterprise Knowledge Management: The Data Quality Approach

David Loshin

TCP/IP Sockets in C#: Practical Guide for Programmers

David Makofske, Michael J. Donahoo, Kenneth L. Calvert

ASIC and FPGA Verification: A Guide to Component Modeling

Richard Munden

Physically Based Rendering: From Theory to Implementation

Matt Pharr, Greg Humphreys

Routing, Flow, and Capacity Design in Communication and Computer Networks

Michal Pióro, Deepankar Medhi

The Persona Lifecycle: Keeping People in Mind Throughout Product Design

John Pruitt, Tamara Adlin

High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting

Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec

Nonlinear Computer Modeling of Chemical and Biochemical Data

James Rusling / Thomas Kumosinski

Introduction to Data Compression


JSTL: Practical Guide for JSP Programmers

Sue Spielman

Multirate and Wavelet Signal Processing

Bruce Suter

Database Modeling and Design: Logical Design

Toby J. Teorey, Sam S. Lightstone, Tom Nadeau

Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS

Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester

Proceedings 2003 VLDB Conference: 29th International Conference on Very Large Databases (VLDB)


Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers

David Wall

Grid Computing

Pawel Plaszczak, Richard Wellner, Jr.

Java Cryptography Extensions: Practical Guide for Programmers

Jason Weiss

QuickTime for .NET and COM Developers

John Cromie

Signal and Image Representation in Combined Spaces

Yehoshua Zeevi, Ronald Coifman

Chaos and Fractals

C.A. Pickover

Neuromimetic Semantics

Harry Howard

SDL '99: The Next Millennium

R. Dssouli/G.V. Bochmann/Y. Lahav

Kohonen Maps

Oja, E. / Kaski, S.

Charging Communication Networks

D.J. Songhurst

A Computational Framework for Segmentation and Grouping

Medioni, G. / Lee, Mi-Suen / Tang, Chi-Keung

CAFE: An Industrial-Strength Algebraic Formal Method

Futatsugi, K. / Nakagawa, A.T. / Tamai, T.

Parallel Computational Fluid Dynamics 2001: Practice and Theory

P. Wilders, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 2000: Trends and Applications

C.B. Jenssen, T. Kvamdal, H.I. Andersson, B. Pettersen, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 2002: New Frontiers and Multi-Disciplinary Applications

K. Matsuno, A. Ecer, P Fox, J. Periaux, N. Satofuka

Handbook of Automated Reasoning

Alan Robinson / Andrei Voronkov

Handbook of Computer Aided Geometric Design

G. Farin / J. Hoschek / M.-S. Kim

Intelligent Systems for Information Processing

B. Bouchon-Meunier / L. Foulloy / R.R. Yager

Handbook of Temporal Reasoning in Artificial Intelligence

Michael Fisher, Dov M. Gabbav, Lluis Vila

Parallel Computational Fluid Dynamics 2003: Advanced Numerical Methods, Software and Applications

Boris Chetverushkin, A. Ecer, Jacques Periaux, N. Satofuka

Parallel Computing: Software Technology, Algorithms, Architectures & Applications

Gerhard Joubert, Wolfgang Nagel, Frans Peters, Wolfgang Walter

Fuzzy Logic and the Semantic Web

Elie Sanchez

Grid Computing: The New Frontier of High Performance Computing

Lucio Grandinetti

Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications

Gabriel Winter, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox

Reaction-Diffusion Computers

Andrew Adamatzky/Benjamin De Lacy Costello/Tetsuya Asai

Modern Information Processing

Bernadette Bouchon-Meunier / Giulianella Coletti / Ronald Yager

Handbook of Constraint Programming

Francesca Rossi, Peter van Beek, Toby Walsh

The Economics of Open Source Software Development

Jürgen Bitzer / Philipp Schröder

Recent Research Towards Advanced Man-Machine Interface Through Spoken Language

H. Fujisaki

Principles of Logic and Logic Programming

G. Metakides, A. Nerode

Symbiosis of Human and Artifact

Yuichiro Anzai, Katsuhiko Ogawa, Hirohiko Mori

Handbook of Human-Computer Interaction

Helander, M.G. / Landauer, T.K. / Prabhu, P.V.

Parallel Computational Fluid Dynamics 1993: New Trends and Advances

Akin Ecer, J. Hauser, P. Leca, J. Periaux

Algorithms and Parallel VLSI Architectures III

M. Moonen / F. Catthoor

SVD and Signal Processing III

Marc Moonen, Bart De Moor

High Performance Computing: Technology, Methods and Applications

Dongarra, J.J.

Problem Solving: Methods, Programming and Future Concepts

O.V. German, D.V. Ofitserov

Intelligent Robots and Systems

Volker Graefe

Time-Varying Image Processing and Moving Object Recognition, 4

V. Cappellini

Parallel Computational Fluid Dynamics 1995: Implementations and Results Using Parallel Computers

A. Ecer, J. Periaux, N. Satofuka, S. Taylor

Parallel Computational Fluid Dynamics 1996: Algorithms and Results Using Advanced Computers

P. Schiano, A. Ecer, J. Periaux, N. Satofuka

Intelligent Environments

Droege, P.

Statistical Optimization for Geometric Computation: Theory and Practice

K. Kanatani

Parallel Processing for Artificial Intelligence 3

J. Geller, H. Kitano, C.B. Suttner

Proceedings IWISP '96

B.G. Mertzios, P. Liatsis

SDL '97: Time for Testing

A. Cavalli/A. Sarma

Handbook of Process Algebra

J.A. Bergstra / A. Ponse / S.A. Smolka

Parallel Computational Fluid Dynamics 1997: Recent Developments and Advances Using Parallel Computers

D. Emerson, A. Ecer, P. Fox, J. Periaux, N. Satofuka

Parallel Computational Fluid Dynamics 1998: Development and Applications of Parallel Technology

C.A. Lin, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 1999: Towards Teraflops, Optimization and Novel Formulations

D. Keyes, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computing: Fundamentals, Applications and New Directions

D'Hollander, E.H.

Topological Algorithms for Digital Image Processing

T. Yung Kong, Azriel Rosenfeld

Sewers: Replacement and New Construction

Geoffrey F Read

Newnes Data Communications Pocket Book

Steve Winder, Mike Tooley

Newnes Radio and RF Engineering Pocket Book

Steve Winder, Joseph Carr

Applying UML: Advanced Applications

Rob Pooley, Pauline Wilcox

Newnes PC Troubleshooting Pocket Book

Howard Anderson, Mike Tooley

Software Design Methodology: From Principles to Architectural Styles

Hong Zhu

Introduction to Web Matrix: ASP.NET Development for Beginners

Colin Hardy, Simon Stobart

Object-Oriented Design with UML and Java

Kenneth Barclay, John Savage

A Student Guide to Object-Oriented Development

Carol Britton, Jill Doake

Student's Essential Guide to .NET

Tony Grimer

Value Creation from E-Business Models

Wendy Currie

Fundamental Data Compression

Ida Mengyi Pu

Strategies for Growth in SMEs: The Role of Information and Information Sytems

Margi Levy, Philip Powell

Understanding Mobile Human-Computer Interaction

Steve Love

Real-Time Systems Development

Rob Williams

Advanced Systems Design with Java, UML and MDA

Kevin Lano

Ultra Wideband Systems: Technologies and Applications

Roberto Aiello, Ph.D., Anuj Batra, Ph.D.

Digital Signal Processing System-Level Design Using LabVIEW

Nasser Kehtarnavaz, Namjin Kim

High-Technology Crime Investigator’s Handbook

Gerald L. Kovacich, Andy Jones

Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking

Doron Drusinsky

Embedded Software: The Works

Colin Walls

Voice Over IPv6: Architectures for Next Generation VoIP Networks

Daniel Minoli

OpenVMS Alpha Internals and Data Structures: Memory Management

Ruth Goldenberg

High Performance Data Network Design: Design Techniques and Tools

Tony Kenyon

Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management

Barry de Ville

OpenVMS System Management Guide

Lawrence Baldwin, Steve Hoffman, David Miller

Networking Explained

Michael Gallo, William M. Hancock, PhD, CISSP, CI

Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle

Charles Breakfield, Roxanne Burkey

TruCluster Server Handbook

Scott Fafrak, Jim Lola, Dennis O'Brien, Gregory Yates, Brad Nichols

Computer Systems Performance Evaluation and Prediction

Paul Fortier, Howard Michel

CRM: Redefining Customer Relationship Management

Jeffrey Peel

OpenVMS with Apache, WASD, and OSU: The Nonstop Webserver

Alan Winston

Understanding WMI Scripting: Exploiting Microsoft's Windows Management Instrumentation in Mission-Critical Computing Infrastructures

Alain Lissoir

Linux and OpenVMS Interoperability: Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems

John Robert Wisniewski

Data Networks: Routing, Security, and Performance Optimization

Tony Kenyon

Linux and the Unix Philosophy

Mike Gancarz

Tru64 UNIX Troubleshooting: Diagnosing and Correcting System Problems

Martin Moore, Steven Hancock

UNIX for OpenVMS Users

Philip Bourne, Richard Holstein, Joseph McMullen

Call Center Operation: Design, Operation, and Maintenance

Duane Sharp

Getting Started with OpenVMS: A Guide for New Users

Michael D Duffy

Corporate Portals Empowered with XML and Web Services

Anura Guruge

Getting Started with OpenVMS System Management

David Miller

Web Services: Theory and Practice

Anura Guruge

Windows Server 2003 Security Infrastructures: Core Security Features

Jan De Clercq

Microsoft Outlook Programming: Jumpstart for Administrators, Developers, and Power Users

Sue Mosher

RAPID Value Management for the Business Cost of Ownership: Readiness, Architecture, Process, Integration, Deployment

Andrew Wigodsky

Socially Responsible IT Management

Michael Erbschloe

Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers

Jerry Cochran

Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices

William Wheeler

Firewalls: Jumpstart for Network and Systems Administrators

John R. Vacca, Scott Ellis

Internet Security: A Jumpstart for Systems Administrators and IT Managers

Tim Speed, Juanita Ellis

Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems

Alain Lissoir

Microsoft SharePoint Technologies: Planning, Design and Implementation

Kevin Laahs, Emer McKenna, Veli-Matti Vanamo

Monitoring and Managing Microsoft Exchange Server 2003

Mike Daugherty

Cybersecurity Operations Handbook

John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CI

Debugging by Thinking: A Multidisciplinary Approach

Robert Charles Metzger

Resilient Storage Networks: Designing Flexible Scalable Data Infrastructures

Greg Schulz

Implementing Homeland Security for Enterprise IT

Michael Erbschloe

Managing Software Deliverables: A Software Development Management Methodology

John Rittinghouse, PhD, CISM

HP NonStop Server Security: A Practical Handbook

XYPRO Technology Corp

Network programming in .NET: C# & Visual Basic .NET

Fiach Reid

Microsoft® Exchange Server 2003 Deployment and Migration

Kieran McCorry

Wireless Operational Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

IPv6 Network Programming

Jun-ichiro itojun Hagino

Open Source Software: Implementation and Management

Paul Kavanagh

Oracle 10g RAC Grid, Services & Clustering

Murali Vallath

Oracle 10g Data Warehousing

Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith

Oracle SQL: Jumpstart with Examples

Gavin JT Powell, Carol McCullough-Dieter

Physical Security for IT

Michael Erbschloe

Deploying LINUX on the Desktop

Edward Haletky

Oracle Database Programming using Java and Web Services

Kuassi Mensah

Tony Redmond's Microsoft Exchange Server 2003: with SP1

Tony Redmond

Voice over Internet Protocol (VoIP) Security

James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM

Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions

René J. Chevance

Implementing Database Security and Auditing

Ron Ben Natan

Oracle Data Warehouse Tuning for 10g

Gavin JT Powell

Managing Microsoft's Remote Installation Services

Soren Rasmussen, Michael Iversen

IM Instant Messaging Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

Business Continuity and Disaster Recovery for InfoSec Managers

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL

XYPRO Technology Corp

Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2

Kieran McCorry

Understanding Virtual Reality: Interface, Application, and Design

William R. Sherman, Alan Craig

Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

Ron Goldman

Subdivision Methods for Geometric Design: A Constructive Approac

Joe Warren, Henrik Weimer

SQL: 1999 - Understanding Relational Language Components

Jim Melton, Alan R. Simon

Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery

Gerhard Weikum, Gottfried Vossen

Telecommunications Law in the Internet Age

Sharon K. Black

Computer Animation: Algorithms and Techniques

Richard Parent

Spatial Databases: With Application to GIS

Philippe Rigaux, Michel Scholl, Agnès Voisard

Geometric Tools for Computer Graphics

Philip Schneider, David H. Eberly

Swarm Intelligence

Russell C. Eberhart, Yuhui Shi, James Kennedy

Internet QoS: Architectures and Mechanisms for Quality of Service

Zheng Wang

Skew-Tolerant Circuit Design

David Harris

Illustrating Evolutionary Computation with Mathematica

Christian Jacob

Object-Oriented Reengineering Patterns

Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz

Component Database Systems

Klaus R. Dittrich, Andreas Geppert

Persuasive Technology: Using Computers to Change What We Think and Do

B.J. Fogg

Distributed Systems Architecture: A Middleware Approach

Arno Puder, Kay Römer, Frank Pilhofer

Readings in Multimedia Computing and Networking

Kevin Jeffay, Hong Jiang Zhang

Business Modeling and Data Mining

Dorian Pyle

Optical Networks: A Practical Perspective

Rajiv Ramaswami, Kumar Sivarajan

Usability for the Web: Designing Web Sites that Work

Tom Brinck, Darren Gergle, Scott D. Wood

Advanced Graphics Programming Using OpenGL

Tom McReynolds, David Blythe

An Introduction to NURBS: With Historical Perspective

David F. Rogers

Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design

Terry Halpin

Creative Evolutionary Systems

David W. Corne, Peter J. Bentley

The Designer's Guide to VHDL

Peter J. Ashenden

Advanced SQL:1999: Understanding Object-Relational and Other Advanced Features

Jim Melton

Data Warehousing: Using the Wal-Mart Model

Paul Westerman

TCP/IP Sockets in Java: Practical Guide for Programmers

Kenneth L. Calvert, Michael J. Donahoo

Object-Oriented Construction Handbook: Developing Application-Oriented Software with the Tools & Materials Approach

Heinz Züllighoven

Your Wish is My Command: Programming By Example

Henry Lieberman

Practical IDL Programming

Liam E. Gumley

Higher-Order Perl: Transforming Programs with Programs

Mark Jason Dominus

Readings in Hardware/Software Co-Design

Giovanni De Micheli, Rolf Ernst, Wayne Wolf

Querying XML: XQuery, XPath, and SQL/XML in context

Jim Melton, Stephen Buxton

Usability Engineering: Scenario-Based Development of Human-Computer Interaction

Mary Beth Rosson, John M. Carroll

Data Warehousing And Business Intelligence For e-Commerce

Alan R. Simon, Steven L. Shaffer

Digital Watermarking

Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller

Foundations of Genetic Algorithms 2001 (FOGA 6)

William Spears, Worthy N. Martin, Worth Martin

JDBC: Practical Guide for Java Programmers

Gregory D. Speegle

Curves and Surfaces for CAGD: A Practical Guide

Gerald Farin

System Architecture with XML

Berthold Daum, Udo Merten

Interactive QuickTime: Authoring Wired Media

Matthew R. Peterson

The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling

Peter J. Ashenden, Gregory D. Peterson, Darrell A. Teegarden

MPLS Network Management: MIBs, Tools, and Techniques

Thomas D. Nadeau

Web Application Design Handbook: Best Practices for Web-Based Software

Susan Fowler, Victor Stanwick

Database Tuning: Principles, Experiments, and Troubleshooting Techniques

Dennis Shasha, Philippe Bonnet

Mining the Web: Discovering Knowledge from Hypertext Data

Soumen Chakrabarti

Design Methods for Reactive Systems: Yourdon, Statemate, and the UML

R. J. Wieringa

Applying Knowledge Management: Techniques for Building Corporate Memories

Ian Watson

Embedded Computing: A VLIW Approach to Architecture, Compilers and Tools

Joseph A. Fisher, Paolo Faraboschi, Cliff Young

Voice Interaction Design:Crafting the New Conversational Speech Systems

Randy Allen Harris

Disappearing Cryptography: Information Hiding: Steganography & Watermarking

Peter Wayner

Developing IP-Based Services: Solutions for Service Providers and Vendors

Monique Morrow, Kateel Vijayananda

TCP/IP Clearly Explained

Pete Loshin

Blondie24: Playing at the Edge of AI

David B. Fogel

Non-Photorealistic Computer Graphics: Modeling, Rendering, and Animation

Thomas Strothotte, Stefan Schlechtweg

How to Build a Digital Library

Ian H. Witten, David Bainbridge

Digital Video and HDTV: Algorithms and Interfaces

Charles Poynton

Evolutionary Computation in Bioinformatics

Gary B. Fogel, David W. Corne

Digital Arithmetic

Miloš D. Ercegovac, Tomás Lang

Tcl/Tk: A Developer's Guide

Clif Flynt

HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science

John M. Carroll

IPv6: Theory, Protocol, and Practice

Pete Loshin

Modeling Business Objects with XML Schema

Berthold Daum

Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit

Peter Braun, Wilhelm R. Rossak

Information Visualization: Perception for Design

Colin Ware

Relational Database Design Clearly Explained

Jan L. Harrington


Markus Knasmüller

TCP/IP Sockets in C: Practical Guide for Programmers

Michael J. Donahoo, Kenneth L. Calvert

Modern Cable Television Technology

Walter Ciciora, James Farmer, David Large, Michael Adams

Bioinformatics: Managing Scientific Data

Zoé Lacroix, Terence Critchlow

Maintaining and Evolving Successful Commercial Web Sites: Managing Change, Content, Customer Relationships, and Site Measurement

Ashley Friedlein

Interaction Design for Complex Problem Solving: Developing Useful and Usable Software

Barbara Mirel

Content Networking: Architecture, Protocols, and Practice

Markus Hofmann, Leland R. Beaumont

Complete Maya Programming: An Extensive Guide to MEL and C++ API

David Gould

JSP: Practical Guide for Programmers

Robert Brunner

Level of Detail for 3D Graphics

David Luebke, Martin Reddy, Jonathan D. Cohen, Amitabh Varshney, Benjamin Watson, Robert Huebner

Web Bloopers: 60 Common Web Design Mistakes, and How to Avoid Them

Jeff Johnson

Designing Data-Intensive Web Applications

Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera

Multicast Sockets: Practical Guide for Programmers

David Makofske, Kevin Almeroth

Texturing and Modeling: A Procedural Approach

David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, Steven Worley

Interconnection Networks

Jose Duato, Sudhakar Yalamanchili, Lionel Ni

Real-Time Shader Programming

Ron Fosner

Temporal Data & the Relational Model

C.J. Date, Hugh Darwen, Nikos Lorentzos

Automated Planning: Theory & Practice

Malik Ghallab, Dana Nau, Paolo Traverso

Policy-Based Network Management: Solutions for the Next Generation

John Strassner

Jim Blinn's Corner: Notation, Notation, Notation

Jim Blinn

Digital Geometry: Geometric Methods for Digital Picture Analysis

Reinhard Klette, Azriel Rosenfeld

The Struts Framework: Practical Guide for Java Programmers

Sue Spielman

Why Programs Fail: A Guide to Systematic Debugging

Andreas Zeller

Unit Testing in Java: How Tests Drive the Code

Johannes Link

VLDB '02: Proceedings of the 28th International Conference on Very Large Databases


Paper Prototyping: The Fast and Easy Way to Design and Refine User Interfaces

Carolyn Snyder

Stochastic Local Search: Foundations & Applications

Holger H. Hoos, Thomas Stützle

ARM System Developer's Guide: Designing and Optimizing System Software

Andrew Sloss, Dominic Symes, Chris Wright

Network Processor Design: Issues and Practices, Volume 1

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

SQL Clearly Explained

Jan L. Harrington

Innovation Happens Elsewhere: Open Source as Business Strategy

Ron Goldman, Richard P. Gabriel

Constraint Processing

Rina Dechter

Data Quality: The Accuracy Dimension

Jack E. Olson

Engineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions

James Bean

Java Web Services Architecture

James McGovern, Sameer Tyagi, Michael Stevens, Sunil Mathew

Web Services and Service-Oriented Architectures

Douglas K. Barry

XML for Data Architects: Designing for Reuse and Integration

James Bean

Java: Practical Guide for Programmers

Michael Sikora

Virtual Machines: Versatile Platforms for Systems and Processes

Jim Smith, Ravi Nair

The Internet and Its Protocols: A Comparative Approach

Adrian Farrel

Wireless Sensor Networks: An Information Processing Approach

Feng Zhao, Leonidas Guibas

The Craft of Information Visualization: Readings and Reflections

Benjamin B. Bederson, Ben Shneiderman

Business Intelligence

David Loshin

Semantics in Business Systems

Dave McComb

How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering

Malcolm Chisholm

Database Modeling with Microsoft® Visio for Enterprise Architects

Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean

Joe Celko's Trees and Hierarchies in SQL for Smarties

Joe Celko

Observing the User Experience: A Practitioner's Guide to User Research

Mike Kuniavsky

Understanding Digital Libraries

Michael Lesk

Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation

Axel Jantsch

Location-Based Services

Jochen Schiller, Agnès Voisard

Knowledge Representation and Reasoning

Ronald Brachman, Hector Levesque

The Grid 2: Blueprint for a New Computing Infrastructure

Ian Foster, Carl Kesselman

Bluetooth Application Programming with the Java APIs

C Bala Kumar, Paul Kline, Tim Thompson

Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques

Catherine Courage, Kathy Baxter

The Mobile Connection: The Cell Phone's Impact on Society

Rich Ling

Cisco PIX Firewalls

Umer Khan

Sockets, Shellcode, Porting, & Coding

James Foster

Stealing the Network

Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch

InfoSec Career Hacking

Chris Hurley, Johnny Long, Aaron Bayles, Ed Brindley

Securing IM and P2P Applications for the Enterprise

Marcus Sachs, Paul Piccard

Host Integrity Monitoring Using Osiris and Samhain

Brian Wotring

Virtualization with VMware ESX Server

Al Muller, Seburn Wilson

Nessus, Snort, & Ethereal Power Tools

Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus

Penetration Tester's Open Source Toolkit

Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore

How to Cheat at Managing Windows Server Update Services

B. Barber

Phishing Exposed

Lance James

Configuring Check Point NGX VPN-1/Firewall-1

Barry Stiefel, Simon Desmeules

Skype Me!

Markus Daehne

Network Security Evaluation

Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

Christian Lahti, Roderick Peterson

How to Cheat at IT Project Management

Susan Snedaker

OS X for Hackers at Heart

Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers

Perfect Password

Mark Burnett

Security Log Management

Jacob Babbin

RFID Security

Frank Thornton, Chris Lanthem

Insider Threat

Eric Cole, Sandra Ring

How to Cheat at Configuring ISA Server 2004

Thomas Shinder, Debra Littlejohn Shinder

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure

B. Barber, Melissa Craft, Michael Cross, Hal Kurz

Practical VoIP Security

Thomas Porter

Video Conferencing over IP

Michael Gough

Combating Spyware in the Enterprise

Paul Piccard

Syngress IT Security Project Management Handbook

Susan Snedaker

Building a VoIP Network with Nortel’s Multimedia Communication Server 5100

Larry Chaffin


Dave Kleiman, Laura Hunter

How to Cheat at Securing a Wireless Network

Chris Hurley, Lee Barken

Firewall Policies and VPN Configurations

Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, jennifer Davis

How to Cheat at Managing Information Security

Mark Osborne

BigNum Math

Tom St Denis

How to Cheat at Designing Security for a Windows Server 2003 Network

Chris Ruston, Chris Peiris

Configuring SonicWALL Firewalls

Chris Lathem

How to Cheat at Managing Microsoft Operations Manager 2005

Tony Piltzecker

Writing Security Tools and Exploits

James Foster

The Enterprise Architecture IT Project: The Urbanisation Paradigm

Christophe Longépé

IP Addressing & Subnetting INC IPV6: Including IPv6

J D Wegner, Robert Rockell, Syngress Media

DBAs Guide to Databases Under Linux

David Egan, Paul Zikopoulos, Chris Rogers

Managing Windows 2000 Network Services

Dr. Thomas W. Shinder, Debra Littlejohn Shinder, Thomas W. Shinder, Syngress

Windows 2000 Configuration Wizards

Syngress Media, Brian M. Collins, Paul Shields

Windows 2000 Server System Administration Handbook

Paul Shields, Ralph W Crump, Martin Weiss

Troubleshooting Windows 2000 TCP/IP

Syngress Media Inc, Debra Littlejohn Shinder, Thomas W Shinder, Syngress

Building Cisco Remote Access Networks

Wayne Lawson

Configuring Cisco AVVID

Syngress Publishing, Erik Rozell, Sandy C. Kronenberg, Wayne Lawson

Mission Critical Windows 2000 Server Administration

Robin Walshaw, Syngress Publishing

Configuring Citrix MetaFrame for Windows 2000 Terminal Services

Melissa Craft, Allen V. Keele, et. al

Designing SQL Server 2000 Databases

Travis Laird, Robert Patton, and Jennifer Ogle

E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

Syngress Media Inc, Brian Bagnall, Syngress Publishing, James Stanger

Configuring Exchange Server 2000

James Stagner

ASP Configuration Handbook

John Gunson, Dale Booth, Sean Thurston

Hack Proofing Your E-Commerce Site - The only way to stop a hacker is to think like one

Ryan Russell

Configuring ISA Server 2000

Thomas W. Shinder, Inc. Syngress Media

Hack Proofing Your Web Applications - The Only Way to stop a hacker is to think like one

Ryan Russell, Inc. Syngress Media, Syngress Media

Palm OS Web Application Developer's Guide - Including PQA and Web Clipping

Ben Coombe, R. Eric Lyons, David C. Matthews, Rory Lysaght

Hack Proofing Linux

James Stanger, Patrick T. Lane

BizTalk Server 2000 Developer's Guide

Scott Roberts, Milton Todd, Chris Farmer, Robert Shimonski

Bluetooth Application Developer's Guide

Jennifer Bray, Brian Senese, Gordon McNutt, Bill Munday

Hack Proofing Sun Solaris 8

Ed Mitchell, Ido Dubrawsky, Wyman Miles, F Williams Lynch

Designing A Wireless Network

Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely

Webmaster's Guide to the Wireless Internet

Ryan Fife, Wei Meng Lee, Dan A. Olsen

XML .NET Developer's Guide

Henk-Evert Sonder, Jonothon Ortiz, Adam Sills

VB.net Developer's Guide

Cameron Wakefield, Henk-Evert Sonder, Wei Meng Lee

C#.Net Developer's Guide

Saurabh Nandu, dotthatcom.com, Greg Hack, Adrian Turtschi

ASP .NET Web Developer's Guide

Jonothon Ortiz, Mesbah Ahmed, Chris Garrett, Jeremy Faircloth, Wei Meng Lee, Adam Sills, Chris Payne

Configuring Windows 2000 without Active Directory

Carol Bailey, Tom Shinder, Dr Thomas W Shinder, Thomas Shinder MD

.NET Mobile Web Developers Guide

Steve Milroy, Ken Cox, DotThatCom.com, Amit Kalani

Building A Cisco Wireless LAN

Ron Fuller, Tim Blankenship

Hackproofing Your Wireless Network

Tony Bautts, Erif Ouellet, Eric Ouellet, Neal O'Farrell

Windows 2000 Active Directory 2E

Melissa Craft

Ruby Developers Guide

Michael Neumann, Robert Feldt, Lyle Johnson

Building Robots With Lego Mindstorms

Mario Ferrari, Giulio Ferrari, Ralph Hempel

Hack Proofing Your Network

Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh

Hack Proofing ColdFusion

Steve Casco, Rob Rusher, Greg Meyer, Sarge

Configuring and Troubleshooting Windows XP Professional

Martin Grasdal, Brian Barber, Chad Todd, Norris L. Johnson Jr.

Developing .Net Web Services With Xml

David Jorgensen

Cisco AVVID and IP Telephony Design & Implementation

Robert Padjen, Larry Keefer, Sean Thurston, Jeff Bankston

Configuring IPv6 For Cisco IOS

Edgar, Jr. Parenti, Eric Knipp, Brian Browne

Developing Web Services with Java APIs for XML (JAX Pack)

Robert Hablutzel

Hacking a Terror Network: The Silent Threat of Covert Channels

Russ Rogers, Matthew Devost

Security Sage's Guide to Hardening the Network Infrastructure

Steven Andres, Brian Kenyon, Erik Pack Birkholz

Wardriving: Drive, Detect, Defend: A Guide to Wireless Security

Chris Hurley

Snort 2.1 Intrusion Detection

Brian Caswell, Jay Beale

Stealing the Network: How to Own a Continent

Ryan Russell, Joe Grand, Tom Craig

Nessus Network Auditing: Jay Beale Open Source Security Series

Jay Beale, Haroon Meer, Charl van der Walt, Renaud Deraison

Zero-Day Exploit:: Countdown to Darkness

Rob Shein, Marcus Sachs

Cyber Adversary Characterization: Auditing the Hacker Mind

Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz

The Best Damn Windows Server 2003 Book Period

Debra Littlejohn Shinder, Thomas Shinder

Dr. Tom Shinder's Configuring ISA Server 2004

Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal

Aggressive Network Self-Defense

Neil Wyler

Richard Thieme's Islands in the Clickstream

Richard Thieme

CYA Securing Exchange Server 2003

Mark Fugatt, Henrik Walther, Pattrick Santry

CYA Securing IIS 6.0

Chris Peiris, Bernard Cheah, Ken Schaefer

Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari, & Sega

Joe Grand, Albert Yarusso

Google Hacking for Penetration Testers

Johnny Long

Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

Lee Barken

Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover

David Allen

Apple I Replica Creation: Back to the Garage

Tom Owad

Cyber Spying

Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole

Network+ Study Guide & Practice Exams

Robert Shimonski, Laura Hunter, Norris Johnson

Hack Proofing Windows 2000 Server

Chad Todd, Norris L., Jr. Johnson

Hack Proofing XML

Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis Jr Franklin

Hack Proofing Your Identity

Teri Bidwell

Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1

Melissa Craft

C# For Java Programmers

Harold Cabrera, Jeremy Faircloth, Stephen Goldberg

Managing Cisco Network Security

Sean Thurston

Sniffer Pro Network Optimization and Troubleshooting Handbook

Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko

Cisco Security Specialists Guide to PIX Firewall

Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver

Configuring Cisco Voice Over IP

Jason Sinclair, Paul Fong, Scott M. Harris, Martin Walshaw

Scene of the Cybercrime

Debra Littlejohn Shinder, Ed Tittel

Dr Tom Shinder's ISA Server and Beyond

Thomas W. Shinder, Martin Grasdal, Debra Littlejohn Shinder

Special Ops

Erik Pace Birkholz, Stuart McClure

Nokia Network Security Solutions Handbook

Doug Maxwell

Snort Intrusion Detection 2.0

Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth

SSCP Study Guide and DVD Training System

Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth

Configuring Symantec AntiVirus Enterprise Edition

Laura E Hunter, Athar A Khan, James Stanger, Jay Cee Taylor

MCSE/MCSA (Exam 70-214) Study Guide

Will Schmied, Thomas W. Shinder

Stealing The Network: How to Own the Box

Ryan Russell, Ido Dubrawsky, FX, Joe Grand

Building DMZs For Enterprise Networks

Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder

The Best Damn Firewall Book Period

Cherie Amon, Thomas W. Shinder, Anne Carasik-Henmi

The Best Damn Cisco Internetworking Book Period

Charles Riley

MCSA/MCSE (Exam 70-291) Study Guide

Dr Thomas W. Shinder, Thomas W. Shinder, Debra Littlejohn Shinder

MCSE (Exam 70-293) Study Guide

Dr Thomas W Shinder, Thomas W Shinder, Debra Littlejohn Shinder, Martin Grasdal

MCSE (Exam 70-294) Study Guide

Michael Cross, Todd Walls, Jeffery A Martin, Martin Grasdal

CheckPoint NG VPN 1/Firewall 1

Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble

Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

Rick Gallaher

Configuring NetScreen Firewalls

Cameron, Rob

Intrusion Prevention and Active Response: Deploying Network and Host IPS

Michael Rash, Angela Orebaugh, Graham Clark

Deploying Citrix MetaFrame Presentation Server 3.0

Melissa Craft, Connie S. Wilson, Chris Broomes

Microsoft Log Parser Toolkit

Gabriele Giuseppini, Mark Burnett

MCSE (Exam 70-297) Study Guide

Neil Ruston, Laura E. Hunter

MCSE (Exam 70-298) Study Guide

Neil Ruston

MCSA/MCSE (Exam 70-292) Study Guide

Will Schmied, Robert J. Shimonski

MCSE (Exam 70-296) Study Guide

Anthony Piltzecker, Laura E Hunter, Melissa Craft, Brian Barber

MCSA/MCSE (Exam 70-290) Study Guide

Thomas W. Shinder, Debra Littlejohn Shinder, Syngress Publishing, Chris Peiris

Hacking the Code

Mark Burnett

Buffer Overflow Attacks

James C. Foster, Vitaly Osipov, Nish Bhalla

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky

Programmer's Ultimate Security DeskRef

James Foster

How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King

Susan Snedaker

Black Hat Physical Device Security: Exploiting Hardware and Software

Drew Miller

Ethereal Packet Sniffing

Angela D Orebaugh, Greg Morris, Ed Warnicke, Gilbert Ramirez

Hardware Hacking

Joe Grand, Kevin Mitnick, Ryan Russell

Inside the SPAM Cartel

Spammer-X, Jeffrey Posluns

Check Point Next Generation with Application Intelligence Security Administration

Chris Tobkin, Daniel Kligerman

Managing and Securing a Cisco SWAN

David Wall, Jeremy Faircloth, Joel Barrett, Jan Kanclirz Jr

Security Assessment

Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra

Software Piracy Exposed

Paul Craig, Mark Burnet

Mathematical Programming: Theory and Methods

S. M. Sinha

Wiley E-Books

Codecharts: Roadmaps and Blueprints for Object-Oriented Programs


Algorithms and Parallel Computing


Model-based Visual Tracking: the OpenTL Framework


Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition


Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems


Compiler Construction Using Java, JavaCC, and Yacc

Dos Reis

Enterprise Software Architecture and Design: Entities, Services, and Resources


Advanced Internet Protocols, Services, and Applications


Cyber Security Policy Guidebook


Practical Database Programming with Visual Basic.N ET, Second Edition


Convert! Designing Web Sites to Increase Traffic and Conversion


Java For Dummies(R), 5th Edition


The Death of the Internet


Energy-Efficient Distributed Computing Systems


Information Overload: An International Challengefor Professional Engineers and Technical Communicators


Reliability and Availability of Cloud Computing


Model-Driven and Software Product Line Engineering


Digital Color Imaging


Assembly Language Programming: ARM Cortex-M3


Digital Holography


Digital Color: Acquisition, Perception, Coding and Rendering


Program Specialization Engineering


Computer Architecture


Memory Allocation Problems in Embedded Systems / Optimization Methods


Advanced Transport Protocols


Computer Science and Ambient Intelligence


Graph Partitioning


Qualitative Spatial and Temporal Reasoning


Cluster and Computing Networks


Static Analysis of Software: The Abstract Interpretation


Practical Database Programming with Java


Computer, Network, Software, and Hardware Engineering with Applications


Design of Multithreaded Software: The Entity-Life Modeling Approach


The Dark Side of Software Engineering: Evil on Computing Projects


Cloud Computing Principles and Paradigms


Energy Security - An Interdiscinplinary Approach


Computer System Design: System-on-Chip


Systems and Software Engineering with Applications


Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing


Oracle Database Performance and Scalability: a quantitative approach


Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue


Case Study Research in Software Engineering: Guidelines and Examples


Computational Number Theory and Modern Cryptography


Adobe Acrobat X PDF Bible


Drupal 7 Bible




SolidWorks 2011 Parts Bible


Game Invaders: The Theory and Understanding of Computer Games


Music Navigation with Symbols and Layers: Toward Content Browsing with IEEE 1599 XML Encoding


Interoperability for Enterprise Software and Applications: Proceedings of the Workshops and the Doctorial Symposium of the I-ESA International Confer


Fundamentals of Software Testing


Models and Analysis for Distributed Systems


Agile Contracts: Creating and Managing Successful Projects with Scrum


Distibuted Systems: Design and Algorithms


Taylor & Francis E-Books

Introduction to Contextual Processing: Theory and Applications

Vert, Gregory

Polygon Mesh Processing

Botsch, Mario

GPU Pro: Advanced Rendering Techniques

Engel, Wolfgang

Game Physics Pearls

van den Bergen, Gino

On the Way to Fun: An Emotion Based Approach to Successful Game Design

Dillon, Roberto

Virtual Reality: Concepts and Technologies

Fuchs, Philippe

Visual Perception from a Computer Graphics Perspective

Thompson, William

GPU Pro 2

Engel, Wolfgang

Real-Time Shadows

Eisemann, Elmar

Game Development Tools

Ansari, Marwan

Graphics Shaders: Theory and Practice, Second Edition

Bailey, Mike

Basics of Game Design

Moore, Michael

Practical Data Mining

Hancock, Jr., Monte F.

Game Engine Gems 2

Lengyel, Eric

The Golden Age of Video Games: The Birth of a Multibillion Dollar Industry

Dillon, Roberto

The Magic of Computer Graphics

Kurachi, Noriko

Data Structure and Software Engineering: Challenges and Improvements

Antonakos, James L.

Computational Modelling of Objects Represented in Images III: Fundamentals, Methods and Applications

Di Giamberardino, Paolo

Large-Scale Simulation: Models, Algorithms, and Applications

Chen, Dan

Intelligent Technologies for Web Applications

Srinivas Sajja, Priti

Production Volume Rendering: Design and Implementation

Wrenninge, Magnus

Service-Oriented Distributed Knowledge Discovery

Talia, Domenico

High Performance Visualization: Enabling Extreme-Scale Scientific Insight

Bethel, E. Wes

Shadow Algorithms Data Miner

Woo, Andrew

GPU PRO 3: Advanced Rendering Techniques

Engel, Wolfgang

Game Development for iOS with Unity3D

Murray, Jeff W.

OpenGL Insights

Cozzi, Patrick

Internet-Scale Pattern Recognition: New Techniques for Voluminous Data Sets and Data Clouds

Muhamad Amin, Anang

Developing Essbase Applications: Advanced Techniques for Finance and IT Professionals

Lackpour, Cameron

Embedded Systems and Wireless Technology: Theory and Practical Applications

Santos, Raul A.

Microsurgery: Advances, Simulations and Applications

Fukuda, Toshio

Genome Annotation

Soh, Jung

Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)

Mena, Jesus

Technological Advances in Interactive Collaborative Learning

Alexandrov, Nia

Programming GPS and OpenStreetMap Applications with Java: The RealObject Application Framework

Beiglböck, Kristof

Performance Tuning of Scientific Applications

Bailey, David H.

Scientific Computing with Multicore and Accelerators

Kurzak, Jakub

Pattern Theory: The Stochastic Analysis of Real-World Signals

Mumford, David

Combinatory Logic: Pure, Applied and Typed

Bimbó, Katalin

Handbook of Product Graphs, Second Edition

Hammack, Richard

Feedback Control in Systems Biology

Cosentino, Carlo

Mathematical and Algorithmic Foundations of the Internet

Luccio, Fabrizio

Particle Swarm Optimisation: Classical and Quantum Perspectives

Sun, Jun

Algebraic Number Theory, Second Edition

Mollin, Richard A.

Mathematics Education for a New Era: Video Games as a Medium for Learning

Devlin, Keith

Undocumented Secrets of MATLAB-Java Programming

Altman, Yair M.

3D Math Primer for Graphics and Game Development, 2nd Edition

Dunn, Fletcher

Iterative Splitting Methods for Differential Equations

Geiser, Juergen

Combinatorial Scientific Computing

Naumann, Uwe

Combinatorics of Permutations, Second Edition

Bona, Miklos

Desktop Grid Computing

Cerin, Christophe

Combinatorics of Set Partitions

Mansour, Toufik

Applications of Combinatorial Matrix Theory to Laplacian Matrices of Graphs

Molitierno, Jason J.

Limits of Computation: An Introduction to the Undecidable and the Intractable

Reiter, Edna E.

Cloud Computing: Data-Intensive Computing and Scheduling

Magoules, Frederic

XML in Scientific Computing

Pozrikidis, Constantine

Game Design Theory: A New Philosophy for Understanding Games

Burgun, Keith

Smoothing Splines: Methods and Applications

Wang, Yuedong

Statistical Inference: The Minimum Distance Approach

Basu, Ayanendranath

R Graphics, Second Edition

Murrell, Paul

Spectral Feature Selection for Data Mining

Zhao, Zheng Alan

Data Clustering in C++: An Object-Oriented Approach

Gan, Guojun

Statistical Learning and Data Science

Summa, Mireille Gettler

Manifold Learning Theory and Applications

Ma, Yunqian

Foundations of Predictive Analytics

Wu, James

Patterns of Data Modeling

Blaha, Michael

Mathematical Aspects of Logic Programming Semantics

Hitzler, Pascal

Mining Software Specifications: Methodologies and Applications

Lo, David

Fundamentals of Multicore Software Development

Pankratius, Victor

Automated Physical Database Design and Tuning

Bruno, Nicolas

Cost-Sensitive Machine Learning

Krishnapuram, Balaji

Honeypots: A New Paradigm to Information Security

Joshi, R. C.

Wireless Security

Osterhage, Wolfgang

Microarray Image Analysis: An Algorithmic Approach

Fraser, Karl

Methods in Medical Informatics: Fundamentals of Healthcare Programming in Perl, Python, and Ruby

Berman, Jules J.

Handbook of Chemoinformatics Algorithms

Faulon, Jean-Loup

Support Vector Machines and Their Application in Chemistry and Biotechnology

Liang, Yizeng

Discrete-Event Modeling and Simulation: Theory and Applications

Wainer, Gabriel A.

Analysis and Synthesis of Fuzzy Control Systems: A Model-Based Approach

Feng, Gang

Rough Fuzzy Image Analysis: Foundations and Methodologies

Pal, Sankar K.

Computational Intelligence Paradigms: Theory & Applications using MATLAB

Sumathi, S.

Reinforcement Learning and Dynamic Programming Using Function Approximators

Busoniu, Lucian

Design of Low-Power Coarse-Grained Reconfigurable Architectures

Kim, Yoonjin

Nonvolatile Memory Design: Magnetic, Resistive, and Phase Change

Li, Hai

Semiconductors: Integrated Circuit Design for Manufacturability

Balasinski, Artur

Real-Time Embedded Systems: Optimization, Synthesis, and Networking

Qiu, Meikang

Model-Based Testing for Embedded Systems

Zander, Justyna

Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks

Stanco, Filippo

Autonomic Networking-on-Chip: Bio-Inspired Specification, Development, and Verification

Cong-Vinh, Phan

The Image Processing Handbook, Sixth Edition

Russ, John C.

Time-Triggered Communication

Obermaisser, Roman

Real-Time Embedded Systems: Open-Source Operating Systems Perspective

Bertolotti, Ivan Cibrario

Image Processing and Analysis with Graphs: Theory and Practice

Lezoray, Olivier

Measuring Shape

Neal, F. Brent

Distributed Sensor Networks, Second Edition: Image and Sensor Signal Processing

Iyengar, S. Sitharama

Distributed Sensor Networks, Second Edition: Sensor Networking and Applications

Iyengar, S. Sitharama

Perceptual Digital Imaging: Methods and Applications

Lukac, Rastislav

Image Restoration: Fundamentals and Advances

Gunturk, Bahadir Kursat

Embedded Systems Circuits and Programming

Sanchez, Julio

Dynamic RAM: Technology Advancements

Siddiqi, Muzaffer A.

Image Super-Resolution and Applications

El-Samie, Fathi E. Abd

Creation of a Conscious Robot: Mirror Image Cognition and Self-Awareness

Takeno, Junichi

Experimental Design: From User Studies to Psychophysics

Cunningham, Douglas

Utility-Based Learning from Data

Friedman, Craig

Paradoxes in Scientific Inference

Chang, Mark

Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions

Deng, Naiyang

Clustering in Bioinformatics and Drug Discovery

MacCuish, John David

Cancer Systems Biology

Wang, Edwin

Introduction to Proteins: Structure, Function, and Motion

Kessel, Amit

Thermostable Proteins: Structural Stability and Design

Sen, Srikanta

Computational Methods in Plasma Physics

Jardin, Stephen

Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition

Ratner, Bruce

Understanding Information Retrieval Systems: Management, Types, and Standards

Bates, Marcia J.

Introduction to the Numerical Modeling of Groundwater and Geothermal Systems: Fundamentals of Mass, Energy and Solute Transport in Poroelastic Rocks

Bundschuh, Jochen

Epilepsy: The Intersection of Neurosciences, Biology, Mathematics, Engineering, and Physics

Osorio, Ivan

Open Systems Dependability: Dependability Engineering for Ever-Changing Systems

Tokoro, Mario

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

Mena, Jesus

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications

Bremner, Murray R.

RC4 Stream Cipher and Its Variants

Paul, Goutam

Algebraic and Stochastic Coding Theory

Kythe, Dave K.

New Directions of Modern Cryptography

Cao, Zhenfu

Bioinformatics: High Performance Parallel Computer Architectures

Schmidt, Bertil

Introduction to Bio-Ontologies

Robinson, Peter N.

Data Mining in Biomedical Imaging, Signaling, and Systems

Dua, Sumeet

High Performance Computing: Programming and Applications

Levesque, John

Introduction to High Performance Computing for Scientists and Engineers

Hager, Georg

Knowledge Science: Modeling the Knowledge Creation Process

Nakamori, Yoshiteru

Handbook of Finite State Based Models and Applications

Wang, Jiacun

Relational Data Clustering: Models, Algorithms, and Applications

Long, Bo

Handbook of Natural Language Processing, Second Edition

Indurkhya, Nitin

Temporal Data Mining

Mitsa, Theophano

Handbook of Educational Data Mining

Romero, Cristobal

Statistical Data Mining Using SAS Applications, Second Edition

Fernandez, George

Bayesian Artificial Intelligence, Second Edition

Korb, Kevin B.

Knowledge Discovery from Data Streams

Gama, Joao

Data Mining with R: Learning with Case Studies

Torgo, Luis

Music Data Mining

Li, Tao

Ensemble Methods: Foundations and Algorithms

Zhou, Zhi-Hua

Clustering: A Data Recovery Approach, Second Edition

Mirkin, Boris

Contrast Data Mining: Concepts, Algorithms, and Applications

Dong, Guozhu

Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques

Fung, Benjamin C.M.

Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques

Bonchi, Francesco

Security and Policy Driven Computing

Liu, Lei

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges

Kwok, Yu-Kwong Ricky

Data Mining and Machine Learning in Cybersecurity

Dua, Sumeet

Music Emotion Recognition

Yang, Yi-Hsuan

Data Mining Tools for Malware Detection

Masud, Mehedy

TV Content Analysis: Techniques and Applications

Kompatsiaris, Yiannis

Computer Security Literacy: Staying Safe in a Digital World

Jacobson, Douglas

Methods and Algorithms in Navigation: Marine Navigation and Safety of Sea Transportation

Weintrit, Adam

Signal and Image Processing for Remote Sensing, Second Edition

Chen, C.H.

Human-Robot Interaction in Social Robotics

Kanda, Takayuki

Image and Video Processing in the Compressed Domain

Mukhopadhyay, Jayanta

Handbook on Soft Computing for Video Surveillance

Pal, Sankar K.

Circular and Linear Regression: Fitting Circles and Lines by Least Squares

Chernov, Nikolai

Computer Vision: From Surfaces to 3D Objects

Tyler, Christopher W.

Security for Wireless Sensor Networks using Identity-Based Cryptography

Patil, Harsh Kupwade

Multimedia Security: Watermarking, Steganography, and Forensics

Shih, Frank Y.

Delaunay Mesh Generation

Cheng, Siu-Wing

Science for the Curious Photographer: An Introduction to the Science of Photography

Johnson, Jr., Charles

Advanced High Dynamic Range Imaging: Theory and Practice

Banterle, Francesco

Multi-Core Embedded Systems

Kornaros, Georgios

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

Mills, David L.

Computational Photography: Methods and Applications

Lukac, Rastislav

Super-Resolution Imaging

Milanfar, Peyman

Bio-Inspired Computing and Networking

Xiao, Yang

Communication Architectures for Systems-on-Chip

Ayala, José L.

The Practical OPNET User Guide for Computer Network Simulation

Sethi, Adarshpal S.

Multimedia Image and Video Processing, Second Edition

Guan, Ling

Conceptual Modeling for Discrete-Event Simulation

Robinson, Stewart

Data Mining for Bioinformatics

Dua, Sumeet

Spatial Decision Support Systems: Principles and Practices

Sugumaran, Ramanathan

Real Life Applications of Soft Computing

Shukla, Anupam

Designing Network On-Chip Architectures in the Nanoscale Era

Flich, Jose

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach

Balasa, Florin

Robot Development Using Microsoft Robotics Developer Studio

Kang, Shih-Chung

LabVIEW: A Developer's Guide to Real World Integration

Fairweather, Ian

Machine Learning and Knowledge Discovery for Engineering Systems Health Management

Srivastava, Ashok N.

Logo Recognition: Theory and Practice

Chen, Jingying

Advances in Machine Learning and Data Mining for Astronomy

Way, Michael J.

Visualizing Data Patterns with Micromaps

Carr, Daniel B.

Noiseless Steganography: The Key to Covert Communications

Desoky, Abdelrahman

Location-Based Information Systems: Developing Real-Time Tracking Applications

Labrador, Miguel A.

Enabling Context-Aware Web Services: Methods, Architectures, and Technologies

Sheng, Quan Z.

Handbook of Financial Cryptography and Security

Rosenberg, Burton

Visual Cryptography and Secret Image Sharing

Cimato, Stelvio

Multiple-Base Number System: Theory and Applications

Dimitrov, Vassil

Cloud Computing: Methodology, Systems, and Applications

Wang, Lizhe

Handbook of Mobile Systems Applications and Services

Kumar, Anup

Cambrideg E-Books

IEEE & MIT E-Books

Algorithmic and Artificial Intelligence Methods for Protein Bioinformatics:

Li, M.

Aluminum Dreams: The Making of Light Modernity

Sheller, M.

Circularly Polarized Antennas:

Zhu, F.

Designing High Availability Systems: DFSS and Classical Reliability Techniques with Practical Real Life Examples

Taylor, Z.

Disaster Robotics:

Murphy, R.

Filamentary Ion Flow: Theory and Experiments

Amoruso, V.

Flight Vehicle Aerodynamics:

Drela, M.

Handbook of Digital Games:

Agius, H.

Introduction to Numerical Electrostatics Using MATLAB:

Dworsky, L.

Large Scale Network-Centric Distributed Systems:

Zomaya, A.

Logic in Games:

van Benthem, J.

Media Technologies: Essays on Communication, Materiality, and Society

Foot, K.

Memes in Digital Culture:

Shifman, L.

Microgrids: Architectures and Control

Hatziargyriou, N.

Networking Peripheries: Technological Futures and the Myth of Digital Universalism

Chan, A.

Operator-Based Nonlinear Control Systems Design and Applications:

Deng, M.

Power Magnetic Devices: A Multi-Objective Design Approach

Sudhoff, S.

Practical Power System Operation:

Vaahedi, E.

Risk Assessment of Power Systems: Models, Methods, and Applications

Li, W.

Security Management of Next Generation Telecommunications Networks and Services:

Jacobs, S.

Service Quality of Cloud-Based Applications:

Adams, R.

Software War Stories: Case Studies in Software Management

Reifer, D.

Synthetic Aesthetics: Investigating Synthetic Biology's Designs on Nature

Endy, D.

Techniques for Surviving Mobile Data Explosion:

Verma, P.

The Geometry of Meaning: Semantics Based on Conceptual Spaces

Gardenfors, P.

Ultra-Capacitors in Power Conversion Systems: Analysis, Modeling and Design in Theory and Practice

Grbovic, P.

Who's Asking?: Native Science, Western Science, and Science Education

Bang, M.

"Raw Data" Is an Oxymoron:

Gitelman, L.

A Case for Climate Engineering:

Keith, D.

Acoustic Array Systems: Theory, Implementation, and Application

Benesty, J.

Advanced Quantum Communications: An Engineering Approach

Gyongyosi, L.

Algorithms Unlocked:

Cormen, T.

Ambient Commons: Attention in the Age of Embodied Information

McCullough, M.

An Aesthesia of Networks: Conjunctive Experience in Art and Technology

Munster, A.

Analysis of Electric Machinery and Drive Systems:

Pekarek, S.

Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012

Slayton, R.

Beyond Choices: The Design of Ethical Gameplay

Sicart, M.

Business and Scientific Workflows: A Web Service-Oriented Approach

Zhou, M.

CMOS Sigma-Delta Converters: Practical Design Guide

del R?o, R.

CMOS Voltage References: An Analytical and Practical Perspective

Tam, W.

Certified Programming with Dependent Types: A Pragmatic Introduction to the Coq Proof Assistant

Chlipala, A.

Collaborative Media: Production, Consumption, and Design Interventions

Reimer, B.

Complex-Valued Neural Networks: Advances and Applications

Hirose, A.

Computability: Turing, Gödel, Church, and Beyond

Shagrir, O.

Contagious Architecture: Computation, Aesthetics, and Space

Parisi, L.

Cosmopolitan Commons: Sharing Resources and Risks across Borders

Kranakis, E.


Brabham, D.

Digital Crossroads: Telecommunications Law and Policy in the Internet Age

Weiser, P.

Digital Methods:

Rogers, R.

Digital Microwave Communication: Engineering Point-to-Point Microwave Systems

Kizer, G.

Direct Eigen Control for Induction Machines and Synchronous Motors:

Alacoque, J.

Effective Interpersonal and Team Communication Skills for Engineers:

Whitcomb, L.

Electrical Energy Conversion and Transport: An Interactive Computer-Based Approach

Holbert, K.

Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers:

Lipiansky, E.

Electromagnetic Simulation Using the FDTD Method:

Sullivan, D.

Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures

Dande, A.

Extruded Cables for High-Voltage Direct-Current Transmission: Advances in Research and Development

Marzinotto, M.

Fast-Tracking Your Career: Soft Skills for Engineering and IT Professionals

Chou, W.

Finite State Machines in Hardware: Theory and Design (with VHDL and SystemVerilog)

Pedroni, V.

From X-rays to DNA: How Engineering Drives Biology

Langer, R.

Functional Differential Geometry:

Wisdom, J.

Future Trends in Microelectronics: Frontiers and Innovations

Zaslavsky, A.

Girls Coming to Tech!: A History of American Engineering Education for Women

Bix, A.

Global Networks: Engineering, Operations and Design

Cambron, G.

Good Science: The Ethical Choreography of Stem Cell Research

Thompson, C.

Handbook of Electrical Power System Dynamics: Modeling, Stability, and Control

Shahidehpour, M.

Homeplug AV and IEEE 1901: A Handbook for PLC Designers and Users

Katar, S.

Human Robotics: Neuromechanics and Motor Control

Milner, T.

Humanity Enhanced: Genetic Choice and the Challenge for Liberal Democracies

Blackford, R.

IPv6 Deployment and Management:

Rooney, T.

Illumination Engineering: Design with Nonimaging Optics

Koshel, R.

Imbalanced Learning: Foundations, Algorithms, and Applications

Ma, Y.

Implosion: Lessons from National Security, High Reliability Spacecraft, Electronics, and the Forces Which Changed Them

Temple, L.

Introduction to Neural Engineering for Motor Rehabilitation:

Jensen, W.

Leading Open Innovation:

Reichwald, R.

Micro and Nanotechnologies in Engineering Stem Cells and Tissues:

Khademhosseini, A.

Mobile Ad Hoc Networking: The Cutting Edge Directions

Stojmenovic, I.

Modern Machine Learning Techniques and Their Applications in Cartoon Animation Research:

Tao, D.

Moving without a Body: Digital Philosophy and Choreographic Thoughts

Portanova, S.

Music Navigation with Symbols and Layers: Toward Content Browsing with IEEE 1599 XML Encoding

Haus, G.

Negotiating Cultural Encounters: Narrating Intercultural Engineering and Technical Communication

Savage, G.

Numerical Analysis with Applications in Mechanics and Engineering:

Pandrea, N.

Patently Contestable: Electrical Technologies and Inventor Identities on Trial in Britain

Gooday, G.

Paul Lauterbur and the Invention of MRI:

Dawson, M.

Periodic Structures: Mode-Matching Approach and Applications in Electromagnetic Engineering

Hwang, R.

Phantasmal Media: An Approach to Imagination, Computation, and Expression

Harrell, D.

Playing with Sound: A Theory of Interacting with Sound and Music in Video Games

Collins, K.

Poiesis and Enchantment in Topological Matter:

Plotnitsky, A.

Polarimetric Scattering and SAR Information Retrieval:

Xu, F.

Public Key Cryptography: Applications and Attacks

Batten, L.

Pulsewidth Modulated DC-to-DC Power Conversion: Circuits, Dynamics, and Control Designs

Choi, B.

Regulating Code: Good Governance and Better Regulation in the Information Age

Marsden, C.

Reinforcement Learning and Approximate Dynamic Programming for Feedback Control:

Liu, D.

Research Misconduct Policy in Biomedicine: Beyond the Bad-Apple Approach

Redman, B.

Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks

McMakin, A.

Robot Futures:

Nourbakhsh, I.

Robotics: Science and Systems VIII

Srinivasa, S.

SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors

Omura, Y.

Selective Visual Attention: Computational Models and Applications

Lin, W.

Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid

Bush, S.

Sonic Interaction Design:

Serafin, S.

Spam: A Shadow History of the Internet

Brunton, F.

The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business

van Hemert, J.

The Outer Limits of Reason: What Science, Mathematics, and Logic Cannot Tell Us

Yanofsky, N.

The Well-Played Game: A Player's Philosophy

De Koven, B.

Uncertainty in Games:

Costikyan, G.

Wireless Networking: Understanding Internetworking Challenges

Kasch, W.

10 PRINT CHR$(205.5+RND(1)); : GOTO 10:

Vawter, N.

802.1aq Shortest Path Bridging Design and Evolution: The Architect's Perspective

Bragg, N.

A Guide to the Wireless Engineering Body of Knowledge (WEBOK):

Jajszczyk, A.

ARC Flash Hazard Analysis and Mitigation:

Das, J.

An Introduction to Audio Content Analysis: Applications in Signal Processing and Music Informatics

Lerch, A.

Baseband Receiver Design for Wireless MIMO-OFDM Communications:

Lai, I.

Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems

Eustace, D.

Body Area Communications: Channel Modeling, Communication Systems, and EMC

Wang, Q.

Boosting: Foundations and Algorithms

Freund, Y.

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

Blanchette, J.

Car Crashes without Cars: Lessons about Simulation Technology and Organizational Change from Automotive Design

Leonardi, P.

Codename Revolution: The Nintendo Wii Platform

Thiruvathukal, G.

Coding Places: Software Practice in a South American City

Takhteyev, Y.

Cognitive Search: Evolution, Algorithms, and the Brain

Todd, P.

Compiler Construction Using Java, JavaCC, and Yacc:

Dos Reis, A.

Computer, Network, Software, and Hardware Engineering with Applications:

Schneidewind, N.

Computing: A Concise History

Ceruzzi, P.

Control of Power Inverters in Renewable Energy and Smart Grid Integration:

Hornik, T.

Cyberpolitics in International Relations:

Choucri, N.

Design Structure Matrix Methods and Applications:

Browning, T.

Design for Reliability:

Gullo, L.

Developments in Data Storage: Materials Perspective

Chong, T.

Digital Filters: Principles and Applications with MATLAB

Taylor, F.

Discovering the Human Connectome:

Sporns, O.

Disturbance Analysis for Power Systems:

Ibrahim, M.

Effective Cycling:

Forester, J.

Electrical Modeling and Design for 3D System Integration: 3D Integrated Circuits and Packaging, Signal Integrity, Power Integrity and EMC

Li, E.

Electromechanical Motion Devices:

Pekarek, S.

Engineering a Safer World: Systems Thinking Applied to Safety

Leveson, N.

Essentials of Computational Electromagnetics:

Song, W.

Formal Methods for Industrial Critical Systems: A Survey of Applications

Margaria, T.

Frequency Acquisition Techniques for Phase Locked Loops:

Talbot, D.

Frequency Stability: Introduction and Applications

Kroupa, V.

Frequency-Domain Analysis and Design of Distributed Control Systems:

Tian, Y.

Game Invaders: The Theory and Understanding of Computer Games

Massey, P.

Gas Insulated Transmission Lines (GIL):

Koch, H.

Generalizations of Cyclostationary Signal Processing: Spectral Analysis and Applications

Napolitano, A.

Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ebert, C.

Handbook of Position Location: Theory, Practice and Advances

Buehrer, R.

Harnessing Green IT: Principles and Practices

Gangadharan, G.

Human Information Interaction: An Ecological Approach to Information Behavior

Fidel, R.

Hybrid Control and Motion Planning of Dynamical Legged Locomotion:

Gruver, W.

Information Overload: An International Challenge for Professional Engineers and Technical Communicators

Fazal, Z.

Internet Success: A Study of Open-Source Software Commons

English, R.

Introduction to Laser Technology:

Ewing, J.

Introduction to Wireless Localization: With iPhone SDK Examples

Baciu, G.

Machine Learning in Image Steganalysis:

Schaathun, H.

Machine Learning in Non-Stationary Environments: Introduction to Covariate Shift Adaptation

Kawanabe, M.

Mastering System Identification in 100 Exercises:

Pintelon, R.

Metabolism of the Anthroposphere: Analysis, Evaluation, Design

Brunner, P.

Mining the Biomedical Literature:

Craven, M.

Modern Lens Antennas for Communications Engineering:

Huang, K.

Nanometer Frequency Synthesis Beyond the Phase-Locked Loop:

Xiu, L.

Net Smart: How to Thrive Online

Weeks, A.

Networked: The New Social Operating System

Wellman, B.

Non-Gaussian Statistical Communication Theory:

Middleton, D.

Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB

Gharaibeh, K.

On Computing: The Fourth Great Scientific Domain

Rosenbloom, P.

Open Access:

Suber, P.

Practical Database Programming with Visual Basic.NET:

Bai, Y.

Predictive Control of Power Converters and Electrical Drives:

Cortes, P.

Quantum Mechanics for Electrical Engineers:

Sullivan, D.

Real-Time Systems Design and Analysis: Tools for the Practitioner

Ovaska, S.

Recoding Gender: Women's Changing Participation in Computing

Abbate, J.

Reinforcement and Systemic Machine Learning for Decision Making:

Kulkarni, P.

Reliability and Availability of Cloud Computing:

Adams, R.

Remote Sensing and Actuation Using Unmanned Vehicles:

Chen, Y.

Resource Allocation in Uplink OFDMA Wireless Systems: Optimal Solutions and Practical Implementations

Dawy, Z.

Robot Ethics: The Ethical and Social Implications of Robotics

Bekey, G.

Robotics: Science and Systems VII

Abbeel, P.

Satellite Communications Payload and System:

Braun, T.

Semantic Web and Model-Driven Engineering:

Parreiras, F.

Service-Learning in the Computer and Information Sciences: Practical Applications in Engineering Education

Nejmeh, B.

Signals and Boundaries: Building Blocks for Complex Adaptive Systems

Holland, J.

Smart Grid: Fundamentals of Design and Analysis

Momoh, J.

Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue

Grinshpan, L.

Speaking Code: Coding as Aesthetic and Political Expression

Berardi, F.

Streamlining Digital Signal Processing: A Tricks of the Trade Guidebook

Lyons, R.

System Identification: A Frequency Domain Approach

Schoukens, J.

Taken for Grantedness: The Embedding of Mobile Communication into Society

Ling, R.

Telecommunications System Reliability Engineering, Theory, and Practice:

Ayers, M.

The ComSoc Guide to Passive Optical Networks: Enhancing the Last Mile Access

Luo, Y.

The Design Way: Intentional Change in an Unpredictable World

Stolterman, E.

The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright

Postigo, H.

The Future Was Here: The Commodore Amiga

Maher, J.

The Machine Question: Critical Perspectives on AI, Robots, and Ethics

Gunkel, D.

The More We Know: NBC News, Educational Innovation, and Learning from Failure

Haas, J.

The Soar Cognitive Architecture:

Laird, J.

The Technology of Nonviolence: Social Media and Violence Prevention

Lederach, J.

The Voice in the Machine: Building Computers That Understand Speech

Rabiner, L.

Tomorrow's Energy: Hydrogen, Fuel Cells, and the Prospects for a Cleaner Planet

Dorgan, B.

Transmission Lines in Digital Systems for EMC Practitioners:

Paul, C.

Ultrasonic Inspection Technology Development and Search Unit Design: Examples of Pratical Applications

Brook, M.

Virtual Knowledge: Experimenting in the Humanities and the Social Sciences

Wyatt, S.

Working on Mars: Voyages of Scientific Discovery with the Mars Exploration Rovers

Clancey, W.

Advanced Biomedical Image Analysis:

Haidekker, M.

Advanced Frequency Synthesis by Phase Lock:

Egan, W.

Advanced Methods of Biomedical Signal Processing:

Marchesi, C.

An Introduction to Network Modeling and Simulation for the Practicing Engineer:

Ward, J.

An Introduction to Wavelet Modulated Inverters:

Rahman, M.

Antenna Design for Mobile Devices:

Zhang, Z.

Applications of High Temperature Superconductors to Electric Power Equipment:

Kalsi, S.

Applied Intelligent Control of Induction Motor Drives:

Shi, K.

CMOS Biomicrosystems: Where Electronics Meet Biology

Iniewski, K.

Channel Equalization for Wireless Communications: From Concepts to Detailed Mathematics

Bottomley, G.

Chaos in Electric Drive Systems: Analysis, Control and Application

Wang, Z.

Climate Change and Global Energy Security: Technology and Policy Options

Sovacool, B.

Code/Space: Software and Everyday Life

Dodge, M.

Control of Electric Machine Drive Systems:

Sul, S.

Data Mining: Concepts, Models, Methods, and Algorithms

Kantardzic, M.

Design for Embedded Image Processing on FPGAs:

Bailey, D.

Design of Multithreaded Software: The Entity-Life Modeling Approach

Sand&#233n, B.

Digital Dead End: Fighting for Social Justice in the Information Age

Eubanks, V.

Direct Methods for Stability Analysis of Electric Power Systems: Theoretical Foundation, BCU Methodologies, and Applications

Chiang, H.

Discontinuities in the Electromagnetic Field:

Idemen, M.

Divining a Digital Future: Mess and Mythology in Ubiquitous Computing

Bell, G.

Doubly Fed Induction Machine: Modeling and Control for Wind Energy Generation Applications:

Iwanski, G.

Electric Distribution Systems:

Malik, O.

Electricity Power Generation: The Changing Dimensions

Tagare, D.

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Jacobs, S.

Engineering Quantum Mechanics:

Park, S.

Engineering Systems: Meeting Human Needs in a Complex Technological World

Vest, C.

Epistemology of the Cell: A Systems Perspective on Biological Knowledge

Bittner, M.

Flexibility in Engineering Design:

Scholtes, S.

Free Space Optical Networks for Ultra-Broad Band Services:

Kartalopoulos, S.

Fundamentals of Sensor Network Programming: Applications and Technology

Okoye, C.

Grid Converters for Photovoltaic and Wind Power Systems:

Rodr?guez, P.

High Voltage Protection for Telecommunications:

Blume, S.

High Voltage and Electrical Insulation Engineering:

Mosch, W.

IP Address Management Principles and Practice:

Rooney, T.

Integration of Distributed Generation in the Power System:

Hassan, F.

Introduction to Autonomous Mobile Robots:

Scaramuzza, D.

Introduction to Modeling and Simulation of Technical and Physical Systems with Modelica:

Fritzson, P.

Laser Diodes and Their Applications to Communications and Information Processing:

Numai, T.

Lead-Free Solder Process Development:

Handwerker, C.

MIMO-OFDM for LTE, WiFi and WiMAX: Coherent versus Non-coherent and Cooperative Turbo Transceivers

Jiang, M.

Maintaining Mission Critical Systems in a 24/7 Environment:

Curtis, P.

Medical Image Analysis:

Dhawan, A.

Millimeter Wave Communication Systems:

Wang, Z.

Mobile Robots: Navigation, Control and Remote Sensing

Cook, G.

Motion Control Systems:

Ohnishi, K.

Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends

Staszewski, R.

Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

Maybury, M.

NESC Handbook: A Discussion of the National Electrical Safety Code

Clapp, A.

Near-Capacity Variable-Length Coding: Regular and EXIT-Chart-Aided Irregular Designs

Yang, L.

Optical CDMA Networks: Principles, Analysis and Applications

Karbassian, M.

Power Conversion and Control of Wind Energy Systems:

Kouro, S.

Practical Database Programming with Java:

Bai, Y.

Practical Image and Video Processing Using MATLAB:

Marques, O.

Practical Lighting Design with LEDs:

Lenk, C.

Principles of Microelectromechanical Systems:

Lee, K.

Probabilistic Transmission System Planning:

Li, W.

Single Event Effects in Aerospace:

Petersen, E.

Social Modeling for Requirements Engineering:

Fickas, S.

Standards: Recipes for Reality

Busch, L.

Still Image and Video Compression with MATLAB:

Thyagarajan, K.

The Atlas of New Librarianship:

Lankes, R.

The Dark Side of Software Engineering: Evil on Computing Projects

Glass, R.

The End of Energy: The Unmaking of America's Environment, Security, and Independence

Graetz, M.

The Theory of Scintillation with Applications in Remote Sensing:

Rino, C.

Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels

Ng, S.

Understanding Geometric Algebra for Electromagnetic Theory:

Arthur, J.

Unlocking Energy Innovation: How America Can Build a Low-Cost, Low-Carbon Energy System

Hart, D.

Wireless Communications:

Molisch, A.

3DTV Content Capture, Encoding and Transmission: Building the Transport Infrastructure for Commercial Services

Minoli, D.

A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming

Edwards, P.

Adaptive Signal Processing: Next Generation Solutions

Haykin, S.

America Identified: Biometric Technology and Society

Nelson, L.

Antenna Arrays: A Computational Approach

Haupt, R.

Basics of Biomedical Ultrasound for Engineers:

Azhari, H.

Biometrics: Theory, Methods, and Applications

Micheli-Tzanakou, E.

Circuit Simulation:

Najm, F.

ComSoc Pocket Guide to Managing Telecommunications Projects:

Desmond, C.

Design for Reliability: Information and Computer-Based Systems

Bauer, E.

Distributed Database Management Systems: A Practical Approach

Haug, F.

EM Detection of Concealed Targets:

Daniels, D.

Economic Market Design and Planning for Electric Power Systems:

Mili, L.

Engineering Invention: Frank J. Sprague and the U.S. Electrical Industry

Sprague, J.

Evolving Intelligent Systems: Methodology and Applications

Kasabov, N.

Future Trends in Microelectronics: From Nanophotonics to Sensors to Energy

Zaslavsky, A.

Fuzzy Control and Identification:

Lilly, J.

Gender Codes: Why Women Are Leaving Computing

Misa, T.

Good Faith Collaboration: The Culture of Wikipedia

Lessig, L.

Grounds for Grounding: A Circuit to System Handbook

Lock, K.

Handbook of Smart Antennas for RFID Systems:

Karmakar, N.

Health Informatics: A Patient-Centered Approach to Diabetes

Aspray, W.

Human Information Retrieval:

Warner, J.

Image Processing and Pattern Recognition: Fundamentals and Techniques

Shih, F.

Inductance: Loop and Partial

Paul, C.

Instruction and Technology: Designs for Everyday Learning

Mehlenbacher, B.

Internet Architecture and Innovation:

van Schewick, B.

Introduction to IP Address Management:

Rooney, T.

Introduction to Machine Learning:

Alpaydin, E.

Korea's Online Gaming Empire:

Jin, D.

Learning to Communicate in Science and Engineering: Case Studies from MIT

Paradis, J.

MIMO-OFDM Wireless Communications with MATLAB<sup>&#174;</sup>:

Kang, C.

Makers of the Microchip: A Documentary History of Fairchild Semiconductor

Last, J.

Maxwell&#39;s Equations:

Huray, P.

Mobile 3D Graphics SoC: From Algorithm to Chip

Nam, B.

Mobile Intelligence:

Yang, L.

Networks and States: The Global Politics of Internet Governance

Mueller, M.

Neural-Based Orthogonal Data Fitting: The EXIN Neural Networks

Cirrincione, M.

Next Generation Telecommunications Networks, Services, and Management:

Sahin, V.

Operation and Control of Electric Energy Processing Systems:

Mili, L.

Perceptual Computing: Aiding People in Making Subjective Judgments

Wu, D.

Power Definitions and the Physical Mechanism of Power Flow:

Emanuel, A.

Practical Database Programming With Visual C#.NET:

Bai, Y.

Radio Frequency Circuit Design:

Davis, W.

Reinventing the Automobile: Personal Urban Mobility for the 21st Century

Burns, L.

Renewable Energy and Climate Change:

Quaschning , V.

Restructured Electric Power Systems: Analysis of Electricity Markets with Equilibrium Models

Zhang, X.

Robotic Micro-Assembly:

R?gnier, S.

Semantic Computing:

Zadeh, L.

Software Metrics and Software Metrology:

Abran, A.

Surfaces and Interfaces of Electronic Materials:

Brillson, L.

Technical Writing for Teams: The STREAM Tools Handbook

Williams, S.

Texture: Human Expression in the Age of Communications Overload

Harper, R.

The Comingled Code: Open Source and Economic Development

Schankerman, M.

The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise

Ensmenger, N.

The Configuration Space Method for Kinematic Design of Mechanisms:

Joskowicz, L.

The Foundations of Signal Integrity:

Huray, P.

The Privacy Advocates: Resisting the Spread of Surveillance

Bennett, C.

Theory and Computation of Electromagnetic Fields:

Jin, J.

Time and Frequency Domain Solutions of EM Problems Using Integral Equations and a Hybrid Methodology:

De, A.

Time-Varying Waveform Distortions in Power Systems:

Ribeiro, P.

Transmission Lines in Digital and Analog Electronic Systems: Signal Integrity and Crosstalk

Paul, C.

Understanding Electric Power Systems: An Overview of the Technology, the Marketplace, and Government Regulation

Casazza, J.

Voltage-Sourced Converters in Power Systems: Modeling, Control, and Applications

Iravani, R.

WiMAX Technology and Network Evolution:

Lai, M.

Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication

Stojmenovic, I.

Wirelessness: Radical Empiricism in Network Cultures

Mackenzie, A.

A Guide to the Wireless Engineering Body of Knowledge (WEBOK):

Advanced Signal Integrity for High-Speed Digital Designs:

Heck, H.

Advances in Multiuser Detection:

Honig, M.

Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks:

Boukerche, A.

Analysis and Design of Autonomous Microwave Circuits:

Suarez, A.

At Your Service: Service-Oriented Computing from an EU Perspective

Zwegers, A.

Building IBM: Shaping an Industry and Its Technology

Pugh, E.

Chess Metaphors: Artificial Intelligence and the Human Mind

Klosky, D.


Wunsch, D.

Compact MOSFET Models for VLSI Design:

Bhattacharyya, A.

Dataset Shift in Machine Learning:

Lawrence, N.

Electro Static Discharge: Understand, Simulate, and Fix ESD Problems

Mardiguian, M.

Expressive Processing: Digital Fictions, Computer Games, and Software Studies

Wardrip-Fruin, N.

Finite Element Analysis of Antennas and Arrays:

Riley, D.

Ground-Based Wireless Positioning:

Guo, Y.

Handbook on Array Processing and Sensor Networks:

Liu, K.

How Societies Embrace Information Technology: Lessons for Management and the Rest of Us

Cortada, J.

Insulators for Icing and Polluted Environments:

Chisholm, W.

Introduction to FACTS Controllers: Theory, Modeling, and Applications

Sen, M.

Introduction to Magnetic Materials:

Graham, C.

Learning Machine Translation:

Foster, G.

MIMO Radar Signal Processing:

Stoica, P.

Managing and Leading Software Projects:

Fairley, R.

Mobile Communication Systems and Security:

Rhee, M.

Modeling and Control of Fuel Cells: Distributed Generation Applications

Wang, C.

Near-Capacity Multi-Functional MIMO Systems: Sphere-Packing, Iterative Detection and Cooperation

Wu, N.

Optimization of Power System Operation:

Zhu, J.

Parallel Solution of Integral Equation-Based EM Problems in the Frequency Domain:

Sarkar, T.

Participatory IT Design: Designing for Business and Workplace Realities

Simonsen, J.

Power Distribution System Reliability: Practical Methods and Applications

Koval, D.

Practical System Reliability:

Kimber, D.

Process Identification and PID Control:

Lee, I.

Racing the Beam: The Atari Video Computer System

Montfort, N.

Real-Time Stability Assessment in Modern Power System Control Centers:

Savulescu, S.

Reliability Wearout Mechanisms in Advanced CMOS Technologies:

Rauch, S.

Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks

McMakin, A.

Robotics: Science and Systems IV

Ramos, F.

Space-Time Layered Information Processing for Wireless Communications:

Haykin, S.

Systems and Software Engineering with Applications:

Schneidewind, N.

The Art of Agent-Oriented Modeling:

Taveter, K.

The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN

Helvoort, H.

The Ethics of Computer Games:

Sicart, M.

Too Soon To Tell: Essays for the End of The Computer Revolution

Grier, D.

Transforming Global Information and Communication Markets: The Political Economy of Innovation

Abelson, D.

Transient-Induced Latchup in CMOS Integrated Circuits:

Hsu, S.

Transportation in a Climate-Constrained World:

Waitz, I.

Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes

Losh, E.

Wired for Innovation: How Information Technology Is Reshaping the Economy

Saunders, A.

Wireless Sensor Networks: A Networking Perspective

Jamalipour, A.

Working-Class Network Society: Communication Technology and the Information Have-Less in Urban China

Cartier, C.

3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation

Ni, S.

Access Denied: The Practice and Policy of Global Internet Filtering

Stein, J.

Adaptive Filters:

Sayed, A.

Adaptive Inverse Control, Reissue Edition: A Signal Processing Approach

Walach, E.

Advanced Design Techniques and Realizations of Microwave and RF Filters:

Beneat, J.

Algorithms and Protocols for Wireless Sensor Networks:

Boukerche, A.

Analysis of Multiconductor Transmission Lines:

Paul, C.

Applied Industrial Energy and Environmental Management:

Gvozdenac, D.

Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches

Shen, Q.

Connections: Patterns of Discovery

Smith, C.

Control and Freedom: Power and Paranoia in the Age of Fiber Optics

Chun, W.

Dependability Benchmarking for Computer Systems:

Spainhower, L.

Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK:

Reay, D.

Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services

McGrath, T.

Electromagnetic Shielding:

Lovat, G.

Energy in Nature and Society: General Energetics of Complex Systems

Smil, V.

Game Sound: An Introduction to the History, Theory, and Practice of Video Game Music and Sound Design

Collins, K.

Governing Global Electronic Networks: International Perspectives on Policy and Power

Wilson, E.

Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems

Stojmenovic, I.

Handbook of Large Turbo-Generator Operation and Maintenance:

Kerszenbaum, I.

High-Speed VLSI Interconnections:

Goel, A.

How to Build a Person: A Prolegomenon

Pollock, J.

IP Multicast with Applications to IPTV and Mobile DVB-H:

Minoli, D.

Introduction to Electrical Power Systems:

El-Hawary, M.

Kalman Filtering: Theory and Practice Using MATLAB

Andrews, A.

Learning in Embedded Systems:

Kaelbling, L.

Liberating Voices: A Pattern Language for Communication Revolution

Schuler, D.

Mobile WiMAX:

de Marca, J.

Modeling and Design Techniques for RF Power Amplifiers:

Laskar, J.

Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems

El-Sharkawi, M.

Networked Publics:

Varnelis, K.

Niche Envy: Marketing Discrimination in the Digital Age

Turow, J.

Nonvolatile Memory Technologies with Emphasis on Flash: A Comprehensive Guide to Understanding and Using Flash Memory Devices

Gill, M.

Passive Solar Buildings:

Balcomb, J.

Phase-Lock Basics:

Egan, W.

Policy-Driven Mobile Ad hoc Network Management:

Kant, L.

Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards

Walz, J.

Quantum Computing Without Magic: Devices

Meglicki, Z.

RF Measurements for Cellular Phones and Wireless Data Systems:

Frobenius, R.

Reflectarray Antennas:

Encinar, J.

Riding the Waves: A Life in Sound, Science, and Industry

Beranek, L.

Robotics: Science and Systems III

Stachniss, C.

Scientific Collaboration on the Internet:

Wulf, W.

Service-Oriented Computing:

Papazoglou, M.

Software Maintenance Management: Evaluation and Continuous Improvement

Abran, A.

Software Process Dynamics:

Madachy, R.

Stuck in the Shallow End: Education, Race, and Computing

Nao, K.

TCP/IP Architecture, Design and Implementation in Linux:

Venkatesulu, M.

The Elements of Computing Systems: Building a Modern Computer from First Principles

Schocken, S.

The Inner History of Devices:

Turkle, S.

The Internet and American Business:

Ceruzzi, P.

The Mechanical Mind in History:

Wheeler, M.

The Stripline Circulators: Theory and Practice

Helszajn, J.

Tutorial on Hardware and Software Reliability, Maintainability and Availability:

Schneidewind, N.

UMTS Network Planning, Optimization, and Inter-Operation with GSM:

Rahnema, M.

Ultra-Wideband Communications Systems: Multiband OFDM Approach

Liu, K.

Understanding Lasers: An Entry-Level Guide

Hecht, J.

VLSI Circuit Design Methodology Demystified: A Conceptual Taxonomy

Xiu, L.

Video Compression and Communications: From Basics to H.261, H.263, H.264, MPEG4 for DVB and HSDPA-Style Adaptive Turbo-Transceivers

Streit, J.

Video Game Spaces: Image, Play, and Structure in 3D Worlds

Nitsche, M.

Wireless Broadband: Conflict and Convergence

Sharma, C.

Wireless LAN Radios: System Definition to Transistor Design

Behzad, A.

Wireless Local Area Networks Quality of Service: An Engineering Perspective

Aboul-Magd, O.

Women and Information Technology: Research on Underrepresentation

Aspray, W.

Advanced FPGA Design: Architecture, Implementation, and Optimization

Kilts, S.

Advanced Integrated Communication Microsystems:

Tantzeris, M.

Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference

Hofmann, T.

Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective

van den Heuvel, W.

An Introduction to Communication Network Analysis:

Kesidis, G.

Applied Cryptanalysis: Breaking Ciphers in the Real World

Low, R.

Automated Defect Prevention: Best Practices in Software Management

Kolawa, A.

Autonomous Bidding Agents: Strategies and Lessons from the Trading Agent Competition

Stone, P.

Bayesian Bounds for Parameter Estimation and Nonlinear Filtering/Tracking:

Bell, K.

Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments

Czerwinski, M.

Communications Engineering: Essentials for Computer Scientists and Electrical Engineers

Lin, J.

Computational Intelligence in Bioinformatics:

Pan, Y.

Cornucopia Limited: Design and Dissent on the Internet

Coyne, R.

Designing with Blends: Conceptual Foundations of Human-Computer Interaction and Software Engineering

Benyon, D.

Electric Power Planning for Regulated and Deregulated Markets:

Mazer, A.

Electric Power System Basics for the Nonelectrical Professional:

Blume, S.

Electromagnetic Fields:

Bladel, J.

Elements of Tidal-Electric Engineering:

Clark, R.

Embedded Signal Processing with the Micro Signal Architecture:

Kuo, S.

Embodied Music Cognition and Mediation Technology:

Leman, M.

Fiber Optic Essentials:

Ghatak, A.

Fundamentals of the Physical Theory of Diffraction:

Ufimtsev, P.

Future Trends in Microelectronics: Up the Nano Creek

Zaslavsky, A.

Fuzzy Systems Engineering: Toward Human-Centric Computing

Gomide, F.

Genetic Algorithms in Electromagnetics:

Werner, D.

Genomics and Proteomics Engineering in Medicine and Biology:

Akay, M.

Grounding and Shielding: Circuits and Interference

Morrison, R.

HCI Remixed: Reflections on Works That Have Influenced the HCI Community

McDonald, D.

Handbook of Neural Engineering:

Akay, M.

High Performance Switches and Routers:

Liu, B.

IEEE Computer Society Real-World Software Engineering Problems: A Self-Study Guide for Today&#39;s Software Professional

Seidman, S.

Instantaneous Power Theory and Applications to Power Conditioning:

Aredes, M.

Introduction to Evolvable Hardware: A Practical Guide for Designing Self-Adaptive Systems

Tyrrell, A.

Introduction to Statistical Relational Learning:

Taskar, B.

Knowledge Structures for Communications in Human-Computer Systems: General Automata-Based

Koenig, E.

Large-Scale Kernel Machines:

Weston, J.

Lead-Free Electronics: iNEMI Projects Lead to Successful Manufacturing

Gedney, R.

Learning from Data: Concepts, Theory, and Methods

Mulier, F.

Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4

Barrett, R.

Maintaining Mission Critical Systems in a 24/7 Environment:

Curtis, P.

Mobile Communication and Society: A Global Perspective

Sey, A.

Music and Probability:

Temperley, D.

Network Security: Current Status and Future Directions

Serpanos, D.

New Directions in Statistical Signal Processing: From Systems to Brains

Mcwhirter, J.

Perspectives on Free and Open Source Software:

huff, K.

Practical Support for ISO 9001 Software Project Documentation: Using IEEE Software Engineering Standards

Walz, J.

Predicting Structured Data:

Vishwanathan, S.

Press On: Principles of Interaction Programming

Thimbleby, H.

Privacy on the Line: The Politics of Wiretapping and Encryption

Landau, S.

Radio System Design for Telecommunication:

Freeman, R.

Remote Sensing with Polarimetric Radar:

Mott, H.

Scholarship in the Digital Age: Information, Infrastructure, and the Internet

Borgman, C.

Software Engineering: Barry W. Boehm&#39;s Lifetime Contributions to Software Development, Management, and Research

Selby, R.

Software Management:

Boehm, B.

Software Testing: Testing Across the Entire Software Development Life Cycle

McLeod, R.

Streamlining Digital Signal Processing: A Tricks of the Trade Guidebook

Lyons, R.

Technology as Experience:

Wright, P.

Tectonic Faults: Agents of Change on a Dynamic Earth

Hovius, N.

The Best of the Best: Fifty Years of Communications and Networking Research

Mark, J.

The Minimum Description Length Principle:

Grünwald, P.

The Robotics Primer:

Mataric, M.

The Web&#39;s Awake: An Introduction to the Field of Web Science and the Concept of Web Life

Tetlow, P.

Thoughtful Interaction Design: A Design Perspective on Information Technology

Stolterman, E.

Toward Brain-Computer Interfacing:

Müller, K.

Understanding Knowledge as a Commons: From Theory to Practice

Ostrom, E.

Using OpenMP: Portable Shared Memory Parallel Programming

van der Pas, R.

Voice and Audio Compression for Wireless Communications:

Woodard, J.

Web Application Design and Implementation: Apache 2, PHP5, MySQL, JavaScript, and Linux/UNIX

Gabarro, S.

Wireless Internet and Mobile Computing: Interoperability and Performance

Lau, V.

Acting with Technology: Activity Theory and Interaction Design

Nardi, B.

Advanced Electronic Packaging: With Emphasis on Multichip Modules

Brown, W.

Advanced Electronic Packaging:

Brown, W.

Advancing Knowledge and The Knowledge Economy:

Foray, D.

Aesthetic Computing:

Fishwick, P.

CODE: Collaborative Ownership and the Digital Economy

Ghosh, R.

Change of State: Information, Policy, and Power

Braman, S.

Computational Auditory Scene Analysis: Principles, Algorithms, and Applications

Brown, G.

Conformal Array Antenna Theory and Design:

Persson, P.

Contamination and ESD Control in High Technology Manufacturing:

Newberg, C.

Crystal Clear: The Struggle for Reliable Communications Technology in World War II

Thompson, R.

Data Mining Methods and Models:

Larose, D.

Electric Bicycles: A Guide to Design and Use

Oman, H.

Electric Power Systems: A Conceptual Introduction

Meier, A.

Electromagnetic Metamaterials: Transmission Line Theory and Microwave Applications

Itoh, T.

Emergent Information Technologies and Enabling Policies for Counter-Terrorism:

Yen, J.

Engineering Your Retirement: Retirement Planning for Technology Professionals

Golio, M.

Ethernet in the First Mile: Access for Everyone

Frazier, H.

Evolutionary Computation: A Unified Approach

De Jong, K.

Evolutionary Computation: Toward a New Philosophy of Machine Intelligence

Fogel, D.

FTTX Concepts and Applications:

Keiser, G.

Fundamentals of Semiconductor Manufacturing and Process Control:

Spanos, C.

Group Cognition: Computer Support for Building Collaborative Knowledge

Stahl, G.

High-Power Converters and AC Drives:

Wu, B.

History of Wireless:

Sengupta, D.

Human Rights in the Global Information Society:

Jørgensen, R.

Information Politics on the Web:

Rogers, R.

Information Security: A Strategic Approach

LeVeque, V.

Integration of Alternative Sources of Energy:

Sim&#245es, M.

Journey to Data Quality:

Lee, Y.

Jumpstart CMM<sup>?</sup>/CMMI<sup>?</sup>?Software Process Improvements: Using?IEEE Software Engineering Standards

Land, S.

Magnetic Actuators and Sensors:

Brauer, J.

Managing Power Electronics: VLSI and DSP-Driven Computer Systems

Rossetti, N.

Managing Projects in Telecommunication Services:

Sherif, M.

Math Refresher for Scientists and Engineers:

Fanchi, J.

Metamaterials: Physics and Engineering Explorations

Ziolkowski, R.

Model-Based Signal Processing:

Candy, J.

Modern Industrial Automation Software Design:

Tan, K.

Multigrid Finite Element Methods for Electromagnetic Field Modeling:

Cangellaris, A.

NESC Handbook: A Discussion of the National Electrical Safety Code

Clapp, A.

Nearest-Neighbor Methods in Learning and Vision: Theory and Practice

Indyk, P.

OFDM and MC-CDMA: A Primer

Keller, T.

Online Stochastic Combinatorial Optimization:

Van Hentenryck, P.

Performance-Based Earned Value:

Young, R.

Personal, Portable, Pedestrian: Mobile Phones in Japanese Life

Okabe, D.

Practical Support for CMMI-SW Software Project Documentation Using IEEE Software Engineering Standards:

Walz, J.

Putt&#39;s Law and the Successful Technocrat: How to Win in the Information Age

Putt, A.

RF/Microwave Interaction with Biological Tissues:

Kotsuka, Y.

RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability

Chu, P.

Semi-Supervised Learning:

Schölkopf, B.

Semiconductor Material and Device Characterization:

Schroder, D.

Sensor Network Operations:

Griffin, C.

Signal Processing of Power Quality Disturbances:

Gu, I.

Software Engineering for Internet Applications:

Grumet, A.

Software Measurement and Estimation: A Practical Approach

Brennan, M.

System Modeling in Cellular Biology: From Concepts to Nuts and Bolts

Periwal, V.

The Cognitive Dynamics of Computer Science: Cost-Effective Large Scale Software Development

Tarbell, M.

The Pentium Chronicles: The People, Passion, and Politics Behind Intel&#39;s Landmark Chips

Colwell, R.

The Road Map to Software Engineering: A Standards-Based Guide

Moore, J.

Uncertainty and Information: Foundations of Generalized Information Theory

Klir, G.

Web Campaigning:

Schneider, S.

WirelessMAN<sup>&#174;</sup>: Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks

van Waes, N.

Computationally Intelligent Hybrid Systems: The Fusion of Soft Computing and Hard Computing

Ovaska, S.

Digital Communication over Fading Channels:

Alouini, M.

Digital Transmission Engineering:

Anderson, J.

Electrical Energy Conversion and Transport: An Interactive Computer-Based Approach

Holbert, K.

Energy at the Crossroads: Global Perspectives and Uncertainties

Smil, V.

Engineering Education: Research and Development in Curriculum and Instruction

Heywood, J.

Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design:

Astola, J.

Fundamentals of Telecommunications:

Freeman, R.

Gaussian Processes for Machine Learning:

Williams, C.

IEEE 802.11 Handbook: A Designer&#39;s Companion

Petrick, A.

Imitation of Life: How Biology Is Inspiring Computing

Forbes, N.

Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future Directions

Ooi, W.

Modern Antenna Design:

Milligan, T.

Modern Microwave and Millimeter-Wave Power Electronics:

Nusinovich, G.

Negative-Refraction Metamaterials: Fundamental Principles and Applications

Balmain, K.

Next Generation of Data-Mining Applications:

Zurada, J.

Open Process Frameworks: Patterns for the Adaptive e-Enterprise

Marca, D.

Practical Design of Power Supplies:

Lenk, R.

Principles of Robot Motion: Theory, Algorithms, and Implementations

Thrun, S.

Rating of Electric Power Cables in Unfavorable Thermal Environment:

Anders, G.

Risk Assessment Of Power Systems: Models, Methods, and Applications

Li, W.

Software Ecosystem: Understanding an Indispensable Technology and Industry

Szyperski, C.

Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement

Tian, J.

Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential

Berners-Lee, T.

Tele-Visionaries: The People Behind the Invention of Television

Webb, R.

The Reasoned Schemer:

Kiselyov, O.

The Second Self: Computers and the Human Spirit

Turkle, S.

Trustworthy Systems Through Quantitative Software Engineering:

Yuhas, C.

Tunable Laser Diodes and Related Optical Sources:

Blumenthal, D.

Turing (A Novel about Computation):

Papadimitriou, C.

Understanding Delta-Sigma Data Converters:

Temes, G.

Understanding Information Transmission:

Johnnesson, R.

Wireless Dictionary:

Gilb, J.

Acoustic Echo and Noise Control: A Practical Approach

Schmidt, G.

Activity-Centered Design: An Ecological Approach to Designing Smart Tools and Usable Systems

Hembrooke, H.

Algorithmic Program Debugging:

Shapiro, E.

Ant Colony Optimization:

Stützle, T.

Artificial Life IX: Proceedings of the Ninth International Conference on the Simulation and Synthesis of Living Systems

Ikegami, T.

Bicycling Science:

Wilson, D.

C# Precisely:

Hansen, H.

CMOS Electronics: How It Works, How It Fails

Hawkins, C.

Circuit Design with VHDL:

Pedroni, V.

Communication Patterns of Engineers:

King, D.

Concepts, Techniques, and Models of Computer Programming:

Haridi, S.

Concurrent and Distributed Computing in Java:

Garg, V.

Design Through Verilog HDL:

Sundari, B.

Designing Sociable Robots:

Breazeal, C.

Differential Forms in Electromagnetics:

Lindell, I.

Earth System Analysis for Sustainability:

Held, H.

Electrical Insulation for Rotating Machines: Design, Evaluation, Aging, Testing, and Repair

Dhirani, H.

Electromyography: Physiology, Engineering, and Non-Invasive Applications

Parker, P.

Evolutionary Robotics: The Biology, Intelligence, and Technology of Self-Organizing Machines

Floreano, D.

Fatal Exit: The Automotive Black Box Debate

Kowalick, T.

Feedback Control of Computing Systems:

Diao, Y.

From animals to animats 8: Proceedings of the Eighth International Conference on the Simulation of Adaptive Behavior

Meyer, J.

Generating Language-Based Environments:

Reps, T.

Handbook of Learning and Approximate Dynamic Programming:

Powell, W.

Handbook to IEEE Standard 45: A Guide to Electrical Installations on Shipboard

Islam, M.

High Frequency Techniques: An Introduction to RF and Microwave Engineering

White, J.

Histories of the Electron: The Birth of Microphysics

Warwick, A.

Independent Component Analysis: A Tutorial Introduction

Stone, J.

Intellectual Property Law for Engineers and Scientists:

Rockman, H.

Introduction to WLLs: Application and Deployment for Fixed and Broadband Services

Pandya, R.

It Sounded Good When We Started: A Project Manager&#39;s Guide to Working with People on Projects

O&#39Bryan, R.

Kernel Methods in Computational Biology:

Vert, J.

Machine Musicianship:

Rowe, R.

Microwave Photonics: Devices and Applications

Iezekiel, S.

Mobile Ad Hoc Networking:

Stojmenovic, I.

Multicomputer Networks: Message-Based Parallel Processing

Fujimoto, R.

Next Generation SONET/SDH: Voice and Data

Kartalopoulos, S.

Nonlinear Dynamic Modeling of Physiological Systems:

Marmarelis, V.

Operation and Maintenance of Large Turbo-Generators:

Kerszenbaum, I.

Optical Bit Error Rate: An Estimation Methodology

Kartalopoulos, S.

Optical WDM Networks: Concepts and Design Principles

Mouftah, H.

Principles of Object-Oriented Modeling and Simulation with Modelica 2.1:

Fritzson, P.

Quadrature Amplitude Modulation: From Basics to Adaptive Trellis-Coded, Turbo-Equalised and Space-Time Coded OFDM, CDMA and MC-CDMA Systems

Webb, W.

Radar Signals:

Mozeson, E.

Real-Time Systems Design and Analysis:

Laplante, P.

Reasoning About Knowledge:

Vardi, M.

Renewable and Efficient Electric Power Systems:

Masters, G.

Silicon Germanium: Technology, Modeling, and Design

Harame, D.

Single and Multi-Carrier DS-CDMA: Multi-User Detection, Space-Time Spreading, Synchronisation, Networking?and Standards

Yen, K.

Social Capital and Information Technology:

Wulf, V.

Stuff You Don&#39;t Learn in Engineering School: Skills for Success in the Real World

Selinger, C.

Technology and Social Inclusion: Rethinking the Digital Divide

Warschauer, M.

Testing for EMC Compliance: Approaches and Techniques

Nakauchi, E.

The Software Project Manager&#39;s Handbook: Principles That Work at Work

Phillips, D.

The Turing Test: Verbal Behavior as the Hallmark of Intelligence

Shieber, S.

Theory of Code Division Multiple Access Communication:

Zigangirov, K.

Transforming Enterprise: The Economic and Social Implications of Information Technology

Wyckoff, A.

Trellis and Turbo Coding:

Perez, L.

Understanding Electric Power Systems: An Overview of the Technology and the Marketplace

Delea, F.

Virtual Music: Computer Synthesis of Musical Style

Cope, D.

Where the Action Is: The Foundations of Embodied Interaction

Dourish, P.

Wiley Electrical and Electronics Engineering Dictionary:

Kaplan, S.

Wireless Communication Standards: A Study of IEEE 802.11, 802.15, 802.16

Cooklev, T.

Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard

Gilb, J.

A Grammatical View of Logic Programming:

Maluszy¿ski, J.

A History of Online Information Services, 1963-1976:

Hahn, T.

A Robot Ping-Pong Player: Experiments in Real-Time Intelligent Control

Andersson, R.

A Social History of Engineering:

Armytage, W.

Adaptive Control Design and Analysis:

Tao, G.

Advanced Semiconductor Memories: Architectures, Designs, and Applications

Sharma, A.

Antenna Theory & Design:

Elliott, R.

Bandwagon Effects in High Technology Industries:

Varian, H.

Beyond Our Control?: Confronting the Limits of Our Legal System in the Age of Cyberspace

Biegel, S.

Communication Researchers and Policy-making:

Braman, S.

Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing

Wang, Y.

Complex Electromagnetic Problems and Numerical Simulation Approaches:

Sevgi, L.

Computational Intelligence: The Experts Speak

Robinson, C.

Computationalism: New Directions

Scheutz, M.

Computers and Design in Context:

Mathiassen, L.

Constraint-Based Grammar Formalisms: Parsing and Type Inference for Natural and Computer Languages

Shieber, S.

Cyber Rights: Defending Free speech in the Digital Age

Godwin, M.

Data Mining: Concepts, Models, Methods, and Algorithms

Kantardzic, M.

Database Design and Development: An Essential Guide for IT Professionals

Ponniah, P.

Digital Library Use: Social Practice in Design and Evaluation

Schatz, B.

Digital System Clocking: High-Performance and Low-Power Aspects

Nedovic, N.

Do the Right Thing: Studies in Limited Rationality

Wefald, E.

Electric Power Systems: Analysis and Control

Saccomanno, F.

Electricity Economics: Regulation and Deregulation

G&#243mez, T.

Essential Communication Strategies: For Scientists, Engineers, and Technology Professionals

Hirsch, H.

Finite Antenna Arrays and FSS:

Munk, B.

Foundations of Robotics: Analysis and Control

Yoshikawa, T.

From Gutenberg to the Global Information Infrastructure: Access to Information in the Networked World

Borgman, C.

IBM&#39;s 360 and Early 370 Systems:

Palmer, J.

Identification of Nonlinear Physiological Systems:

Kearney, R.

Implementation of Solar Thermal Technology:

West, R.

Information Technology and People: Designing for the Future

Oborne, D.

Insulated Gate Bipolar Transistor IGBT Theory and Design:

Khanna, V.

Integrated Passive Component Technology:

Schaper, L.

Intentions in Communication:

Pollack, M.

Introduction to Biomedical Imaging:

Webb, A.

Iterative Arrays of Logical Circuits:

Hennie, F.

Kinetics of High-Temperature Processes:

Kingery, W.

Lab on the Web: Running Real Electronics Experiments via the Internet

Shur, M.

Leonardo&#39;s Laptop: Human Needs and the New Computing Technologies

Shneiderman, B.

Linear Time-Invariant Systems:

Schetzen, M.

Low-Density Parity-Check Codes:

Gallagher, R.

Made-Up Minds: A Constructivist Approach to Artificial Intelligence

Drescher, G.

Magnetohydrodynamic Shock Waves:

Anderson, E.

Making Use: Scenario-Based Design of Human-Computer Interactions

Carroll, J.

Managing IP Networks: Challenges and Opportunities

Valcarenghi, L.

Meme Media and Meme Market Architectures: Knowledge Media for Editing, Distributing, and Managing Intellectual Resources

Tanaka, Y.

Metadyne Statics:

Pestarini, J.

Metamodeling: A Study of Approximations in Queueing Models

Agrawal, S.

Music and Connectionism:

Loy, G.

NETL: A System for Representing and Using Real-World Knowledge

Fahlman, S.

Neural Computing Architectures: The Design of Brain-Like Machines

Aleksander, I.

Neurobiology of Neural Networks:

Gardner, D.

Noise in Electron Devices:

Haus, H.

Notes on Analog-Digital Coversion Techniques:

Susskind, A.

OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting:

Keller, T.

Optimization Principles: Practical Applications to the Operation and Markets of the Electric Power Industry

Rau, N.

Performance Analysis of Data-Sharing Environments:

Dan, A.

Phase-Locking in High-Performance Systems: From Devices to Architectures

Razavi, B.

Power Generation and Environmental Change:

Squires, A.

Power System Control and Stability:

Fouad, A.

Power-System Reliability Calculations:

Wood, A.

Practical RF System Design:

Egan, W.

Programming with Objects: A Comparative Presentation of Object-Oriented Programming With C++ and Java

Kak, A.

Pulse Width Modulation for Power Converters: Principles and Practice

Lipo, T.

Random Processes: Filtering, Estimation, and Detection

Ludeman, L.

Readings in Machine Translation:

Wilks, Y.

Reasoning about Rational Agents:

Wooldridge, M.

Research Directions in Concurrent Object-Oriented Programming:

Yonezawa, A.

Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies

Wildman, S.

Scalable Input/Output: Achieving System Balance

Reed, D.

Shaping the Network Society: The New Role of Civil Society in Cyberspace

Day, P.

Signal Analysis: Time, Frequency, Scale, and Structure

Mills, D.

Smart Antennas:

Bonneau, R.

Software Development Failures:

Ewusi-Mensah, K.

Software-Enabled Control: Information Technology for Dynamical Systems

Balas, G.

Solar Resources:

Hulstrom, R.

Solving Problems in Environmental Engineering and Geosciences with Artificial Neural Networks:

Rogers, L.

State Variables and Communication Theory:

Baggeroer, A.

Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory

Homma, N.

Statistical Energy Analysis of Dynamical Systems: Theory and Applications

Lyon, R.

Stochastic Approximation and NonLinear Regression:

Gardner, L.

Structures Technology for Large Radio and Radar Telescope Systems:

Liebowitz, H.

The LOCUS Distributed System Architecture:

Popek, G.

The Practice of Prolog:

Sterling, L.

The Principles of Switching Circuits:

Edwards, F.

The Rapid Evaluation of Potential Fields in Particle Systems:

Greengard, L.

The Short Road to Great Presentations: How to Reach Any Audience Through Focused Preparation, Inspired Delivery, and Smart Use of Technology

Reimold, P.

The Theory of Turbulent Jets:

Schindel, L.

The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family

Kavanaugh, A.

The Worldwide History of Telecommunications:

Huurdeman, A.

Thermodynamics for Chemical Engineers:

Saville, G.

Trace Theory for Automatic Hierarchical Verification of Speed-Independent Circuits:

Dill, D.

Tracing Genres through Organizations: A Sociocultural Approach to Information Design

Spinuzzi, C.

Understanding Calculus:

Bear, H.

Urban Air Pollution Modeling:

Benarie, M.

Using Hard Problems to Create Pseudorandom Generators:

Nisan, N.

Visual Reconstruction:

Zisserman, A.

Wavelets in Electromagnetics and Device Modeling:

Pan, G.

2D Object Detection and Recognition: Models, Algorithms, and Networks

Amit, Y.

Adaptive Wireless Transceivers: Turbo-Coded, Turbo-Equalized and Space-Time Coded TDMA, CDMA, and OFDM Systems

Yee, M.

Analog VLSI: Circuits and Principles

Mead, C.

Analysis of Electric Machinery and Drive Systems:

Sudhoff, S.

Artifacts: An Archaeologist&#39;s Year in Silicon Valley

Finn, C.

Biomedical Signal Analysis: A Case-Study Approach

Rangayyan, R.

Communications Policy and Information Technology: Promises, Problems, Prospects

Greenstein, S.

Complete Guide to Semiconductor Devices:

Ng, K.

Computer-Aided Design of Analog Integrated Circuits and Systems:

Antao, B.

Current Topics in Computational Molecular Biology:

Zhang, M.

DWDM: Networks, Devices, and Technology

Kartalopoulos, S.

Distributed Work:

Kiesler, S.

Electromagnetic Anechoic Chambers: A Fundamental Design and Specification Guide

Hemming, L.

Foundations of Object-Oriented Languages: Types and Semantics

Bruce, K.

From animals to animats 7: Proceedings of the Seventh International Conference on Simulation of Adaptive Behavior

Hayes, G.

High Performance Mass Storage and Parallel I/O: Technologies and Applications

Jin, H.

Imitation in Animals and Artifacts:

Nehaniv, C.

Intelligent Image Processing:

Mann, S.

Market Operations in Electric Power Systems: Forecasting, Scheduling, and Risk Management

Li, Z.

Mixed-Signal Systems: A Guide to CMOS Circuit Design

Handkiewicz, A.

Power System Economics: Designing Markets for Electricity

Stoft, S.

Precoding and Signal Shaping for Digital Transmission:

Fischer, R.

Principles of Electric Machines with Power Electronic Applications:

El-Hawary, M.

Principles of Random Signal Analysis and Low Noise Design: The Power Spectral Density and its Applications

Howard, R.

Signal Integrity Effects in Custom IC and ASIC Designs:

Singh, R.

Social Consequences of Internet Use: Access, Involvement, and Interaction

Rice, R.

Sourcebook of ATM and IP Internetworking:

Ahmad, K.

System Theory and Practical Applications of Biomedical Signals:

Baura, G.

The First Computers: History and Architectures

Hashagen, U.

The MIT Guide to Science and Engineering Communication:

Zimmerman, M.

Third-Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation

Hanzo, L.

Thyristor-Based FACTS Controllers for Electrical Transmission Systems:

Varma, R.

Turbo Coding, Turbo Equalisation and Space-Time Coding for Transmission over Fading Channels:

Yeap, B.

Types and Programming Languages:

Pierce, B.

Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide

Nellist, J.

Voltage References: From Diodes to Precision High-Order Bandgap Circuits

Rincon-Mora, G.

Wireless Communications in the 21st Century:

Hattori, T.

A Field Guide to Dynamical Recurrent Networks:

Kremer, S.

Accelerated Stress Testing Handbook: Guide for Achieving Quality Products

Chan, H.

Accessing and Browsing Information and Communication:

Chang, S.

Adaptive Antennas for Wireless Communications:

Tsoulos, G.

Advanced Mean Field Methods: Theory and Practice

Saad, D.

Advances in the Evolutionary Synthesis of Intelligent Agents:

Balakrishnan, K.

Beowulf Cluster Computing with Linux:

Sterling, T.

Beowulf Cluster Computing with Windows:

Sterling, T.

Bioinformatics, second edition: The Machine Learning Approach

Brunak, S.

Communications Policy in Transition: The Internet and Beyond

Greenstein, S.

Control Theory: Twenty-Five Seminal Papers (1932-1981)

Basar, T.

Coplanar Waveguide Circuits, Components, and Systems:

Simons, R.

Crypto Anarchy, Cyberstates, and Pirate Utopias:

Ludlow, P.

Design and Analysis of Magnetoresistive Recording Heads:

Williams, E.

Design of High-Performance Microprocessor Circuits:

Fox, F.

Digital Libraries:

Arms, W.

Empirical Methods for Exploiting Parallel Texts:

Melamed, I.

Engineering Electromagnetic Compatibility: Principles, Measurements, Technologies, and Computer Models

Kodali, W.

Engineering Superconductivity:

Lee, P.

Ethics and Computing: Living Responsibly in a Computerized World

Bowyer, K.

Fault Detectability in DWDM: Toward Higher Signal Quality and System Reliability

Kartalopoulos, S.

Foundations for Microwave Engineering:

Collin, R.

Fundamentals of Digital Television Transmission:

Collins, G.

Graphical Models: Foundations of Neural Computation

Sejnowski, T.

Hargrave&#39;s Communications Dictionary:

Hargrave, F.

High-Power Microwave Sources and Technologies:

Schamiloglu, E.

How to Design Programs: An Introduction to Programming and Computing

Krishnamurthi, S.

Information Technologies in Medicine, Medical Simulation and Education:

Marsh, A.

Information Technologies in Medicine, Rehabilitation and Treatment:

Marsh, A.

Intelligent Signal Processing:

Kosko, B.

Internet Telephony:

Clark, D.

Introduction to Laser Technology:

Hecht, J.

Introduction to Microwave Circuits: Radio Frequency and Design Applications

Weber, R.

Learning Kernel Classifiers: Theory and Algorithms

Herbrich, R.

Learning and Soft Computing: Support Vector Machines, Neural Networks, and Fuzzy Logic Models

Kecman, V.

Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond

Smola, A.

Materials Matter: Toward a Sustainable Materials Policy

Commoner, B.

Mechanics of Robotic Manipulation:

Mason, M.

Mind and Mechanism:

McDermott, D.

Mosfet Models for Spice Simulation, Including BSIM3v3 and BSIM4:

Liu, W.

The Computer Age: A Twenty-Year View

Moses, J.

Project Icarus Systems Engineering:

Telecommunications Switching Principles:

Hills, M.

The Interpretation of Visual Motion:

Ullman, S.


Bozorth, R.

Magnetic Circuits and Transformers: A First Course for Power and Communication Engineers

Press, M.

Marine Hydrodynamics:

Newman, J.

Microwave Mobile Communications:

Jakes, W.

A First Course in Turbulence:

Lumley, J.

The Analysis of Feedback Systems:

Estimation and Control with Quantized Measurements:

Curry, R.

Information, Mechanism and Meaning:

MacKay, D.

Papers on Digital Signal Processing:

Press, M.

Computer Methods in the Analysis of Large-Scale Social Systems:

Beshers, J.

Electromagnetic Energy Transmission and Radiation:

Fano, R.

The Industrial Practice of Chemical Process Engineering:

Bodman, S.

Electron-Stream Interaction with Plasmas:

Briggs, R.

STRESS: A Problem-Oriented Computer Language for Structural Engineering

Reinschmidt, K.

LISP 1.5 Programmer&#39;s Manual:

McCarthy, J.

Electronic Processes in Solids:

Ascarelli, G.

Circuit Theory of Linear Noisy Networks:

Adler, R.

The Analysis and Synthesis of Linear Servomechanisms:

Hall, A.


Total Number of Visitors : 4625910

Tripura University © All Rights Reseverd

Last Update : 28/11/2023 02:03:03

Designed and Developed by Dataflow System