1 |
See MIPS Run |
Dominic Sweetman |
2 |
Multimedia over IP and Wireless Networks |
Mihaela van der Schaar, Philip A Chou |
3 |
X3D |
Don Brutzman, Leonard Daly |
4 |
Fault-Tolerant Systems |
Israel Koren, C. Mani Krishna |
5 |
Effective Prototyping for Software Makers |
Jonathan Arnowitz, Michael Arent, Nevin Berger |
6 |
Network Routing |
Deepankar Medhi, Karthikeyan Ramasamy |
7 |
Physical Database Design |
Sam S. Lightstone, Toby J. Teorey, Tom Nadeau |
8 |
Geometric Algebra for Computer Science |
Leo Dorst, Daniel Fontijne, Stephen Mann |
9 |
High-Performance Embedded Computing |
Wayne Wolf |
10 |
Letting Go of the Words |
Janice (Ginny) Redish |
11 |
FastSOA |
Frank Cohen |
12 |
Customizable Embedded Processors |
Paolo Ienne, Rainer Leupers |
13 |
Java Data Mining: Strategy, Standard, and Practice |
Mark F. Hornick, Erik Marcadé, Sunil Venkayala |
14 |
Probabilistic Methods for Financial and Marketing Informatics |
Richard E Neapolitan, Xia Jiang |
15 |
IPv6 Advanced Protocols Implementation |
Qing Li, Jinmei Tatuya, Keiichi Shima |
16 |
Network Analysis, Architecture, and Design |
James D. McCabe |
17 |
IT Manager's Handbook |
Bill Holtsnider, Brian D. Jaffe |
18 |
Digital Design and Computer Architecture |
David Harris, Sarah Harris |
19 |
Deploying IP and MPLS QoS for Multiservice Networks |
John William Evans, Clarence Filsfils |
20 |
Real-Life MDA |
Michael Guttman, John Parodi |
21 |
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children |
Charles T. Betz |
22 |
Visualization in Medicine |
Bernhard Preim, Dirk Bartz |
23 |
Point-Based Graphics |
Markus Gross, Hanspeter Pfister |
24 |
User-Centered Design Stories |
Carol Righi, Janice James |
25 |
Web Dragons |
Ian H. Witten, Marco Gori, Teresa Numerico |
26 |
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks |
Gerald R. Ash |
27 |
Strategic Security Management |
Karim Vellani |
28 |
The Profit Impact of Business Intelligence |
Steve Williams, Nancy Williams |
29 |
Practical Model-Based Testing |
Mark Utting, Bruno Legeard |
30 |
Groovy Programming |
Kenneth Barclay, John Savage |
31 |
ESL Design and Verification |
Grant Martin, Brian Bailey, Andrew Piziali |
32 |
Data Preparation for Data Mining Using SAS |
Mamdouh Refaat |
33 |
Wireless Communications & Networking |
Vijay Garg |
34 |
UML 2 Certification Guide |
Tim Weilkiens, Bernd Oestereich |
35 |
Text Entry Systems |
I. Scott MacKenzie, Kumiko Tanaka-Ishii |
36 |
Joe Celko's SQL Puzzles and Answers |
Joe Celko |
37 |
Ethernet Networking for the Small Office and Professional Home Office |
Jan L. Harrington |
38 |
Sketching User Experiences: Getting the Design Right and the Right Design |
Bill Buxton |
39 |
Business Process Change |
Paul Harmon |
40 |
IPv6 Core Protocols Implementation |
Qing Li, Tatuya Jinmei, Keiichi Shima |
41 |
The History of Information Security |
Karl Maria Michael de Leeuw |
42 |
Parallel Computational Fluid Dynamics 2005: Theory and Applications |
A. Deane, Gunther Brenner, A. Ecer, David Emerson, James McDonough, J. Periaux, N. Satofuka, Damien Tromeur-Dervout |
43 |
Parallel Computational Fluid Dynamics 2006 |
Jang-Hyuk Kwon, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox |
44 |
Wireless Networking Technology |
Steve Rackley |
45 |
CCTV Surveillance |
Herman Kruegle |
46 |
Data Mining and Predictive Analysis |
Colleen McCue |
47 |
Security Operations Management, 2nd ed. |
Robert McCrie |
48 |
Integrated Security Systems Design |
Thomas L. Norman, CPP, PSP, CSC |
49 |
Systems Thinking |
Gharajedaghi, Jamshid |
50 |
The Art of War for Security Managers |
Scott Watson |
51 |
Electronic Security Systems |
Robert Pearson |
52 |
Secure Roaming in 802.11 Networks |
Raymond Greenlaw, Paul Goransson |
53 |
Security Convergence |
Dave Tyson |
54 |
Microsoft® Exchange Server 2003 Scalability with SP1 and SP2 |
Pierre Bijaoui |
55 |
Developing Practical Wireless Applications |
Dean A. Gratton |
56 |
Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook |
Ken England, Gavin JT Powell |
57 |
Oracle 10g Developing Media Rich Applications |
Lynne Dunckley, Larry Guros |
58 |
Microsoft Windows Security Fundamentals |
Jan De Clercq, Guido Grillenmeier |
59 |
Oracle Performance Tuning for 10gR2 |
Gavin JT Powell |
60 |
Microsoft Outlook 2007 Programming |
Sue Mosher |
61 |
Microsoft Exchange 2007: Tony Redmond's Guide to Successful Implementation |
Tony Redmond |
62 |
Computational Intelligence |
Russell C. Eberhart, Yuhui Shi |
63 |
System Level Design with Rosetta |
Perry Alexander |
64 |
Google Talking |
Joshua Brashars, Johnny Long |
65 |
Syngress Force Emerging Threat Analysis |
Robert Graham |
66 |
Scripting VMware Power Tools: Automating Virtual Infrastructure Administration |
Al Muller |
67 |
Developer's Guide to Web Application Security |
Michael Cross |
68 |
Wireshark & Ethereal Network Protocol Analyzer Toolkit |
Angela Orebaugh, Gilbert Ramirez, Jay Beale |
69 |
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research |
James Foster, David Maynor |
70 |
Stealing the Network |
Johnny Long, Timothy Mullen, Ryan Russell |
71 |
Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders |
Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson |
72 |
Snort Intrusion Detection and Prevention Toolkit |
Brian Caswell, Jay Beale, Andrew Baker |
73 |
Designing and Building Enterprise DMZs |
Hal Flynn |
74 |
Network Security Assessment |
Steve Manzuik, Ken Pfeil, Andrew Gold |
75 |
Cryptography for Developers |
Tom St Denis |
76 |
How to Cheat at Windows System Administration Using Command Line Scripts |
Pawan K Bhardwaj |
77 |
Virtualization with Microsoft Virtual Server 2005 |
Andy Jones, Rogier Dittner, David Rule, Ken Majors, Matthijs ten Seldam, Twan Grotenhuis, Geoffrey Green |
78 |
Hack the Stack |
Michael Gregg |
79 |
WarDriving and Wireless Penetration Testing |
Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker |
80 |
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security |
T. Bradley |
81 |
FISMA Certification and Accreditation Handbook |
L. Taylor |
82 |
Configuring Juniper Networks NetScreen & SSG Firewalls |
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin |
83 |
Secure Your Network for Free |
Eric Seagren |
84 |
CD and DVD Forensics |
Paul Crowley |
85 |
Enemy at the Water Cooler |
Brian T Contos |
86 |
Cyber Crime Investigations |
Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel |
87 |
RFID+ Study Guide and Practice Exams |
Paul Sanghera |
88 |
Botnets |
Craig Schiller, Jim Binkley |
89 |
How to Cheat at Configuring Exchange Server 2007 |
Henrik Walther |
90 |
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators |
Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood |
91 |
Microsoft Vista for IT Security Professionals |
Tony Piltzecker |
92 |
Asterisk Hacking |
Joshua Brashars |
93 |
Building Robots with LEGO Mindstorms NXT |
Mario Ferrari, Guilio Ferrari, David Astolfo |
94 |
Security+ Study Guide |
Ido Dubrawsky, Jeremy Faircloth |
95 |
Cross Site Scripting Attacks |
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager |
96 |
How to Cheat at IIS 7 Server Administration |
Chris Adams, Brian Frederick |
97 |
Windows Forensic Analysis DVD Toolkit |
Harlan Carvey |
98 |
Alternate Data Storage Forensics |
Amber Schroader, Tyler Cohen |
99 |
PCI Compliance |
Tony Bradley, Anton Chuvakin, Anatoly Elberg, Brian J. Koerner |
100 |
Linksys WRT54G Ultimate Hacking |
Paul Asadoorian, Larry Pesce |
101 |
Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress |
David E. Williams |
102 |
Zen and the Art of Information Security |
Ira Winkler |
103 |
How to Cheat at VoIP Security |
Thomas Porter, Michael Gough |
104 |
How to Cheat at Configuring Open Source Security Tools |
Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty |
105 |
Business Continuity and Disaster Recovery for IT Professionals |
Susan Snedaker |
106 |
Perl Scripting for Windows Security |
Harlan Carvey |
107 |
How to Cheat at Microsoft Vista Administration |
Jan Kanclirz |
108 |
How to Cheat at Configuring VmWare ESX Server |
David Rule |
109 |
Open Source Fuzzing Tools |
Noam Rathaus, Gadi Evron |
110 |
How to Cheat at Securing SQL Server 2005 |
Mark Horninger |
111 |
The Official CHFI Study Guide (Exam 312-49) |
Dave Kleiman |
112 |
Practical Oracle Security |
Josh Shaul, Aaron Ingram |
113 |
Dr. Tom Shinder's ISA Server 2006 Migration Guide |
Thomas W Shinder |
114 |
Juniper(r) Networks Secure Access SSL VPN Configuration Guide |
Rob Cameron, Neil R. Wyler |
115 |
The Designer's Guide to VHDL |
Peter J. Ashenden |
116 |
Digital Modeling of Material Appearance |
Julie Dorsey, Holly Rushmeier, François Sillion |
117 |
Architecture Design for Soft Errors |
Shubu Mukherjee |
118 |
Reconfigurable Computing |
Scott Hauck, André DeHon |
119 |
Verification Techniques for System-Level Design |
Masahiro Fujita, Indradeep Ghosh, Mukul Prasad |
120 |
GUI Bloopers 2.0 |
Jeff Johnson |
121 |
Keeping Found Things Found: The Study and Practice of Personal Information Management |
William Jones |
122 |
Visual Thinking |
Colin Ware |
123 |
Annotated C# Standard |
Jon Jagger, Nigel Perry, Peter Sestoft |
124 |
Image Fusion |
Tania Stathaki |
125 |
Wireless Sensor and Actuator Networks |
Roberto Verdone, Davide Dardari, Gianluca Mazzini, Andrea Conti |
126 |
Microscope Image Processing |
Qiang Wu, Fatima Merchant, Kenneth Castleman |
127 |
Digital Watermarking and Steganography |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker |
128 |
Semantic Web for the Working Ontologist |
Dean Allemang, James Hendler |
129 |
Measuring the User Experience |
Thomas Tullis, William Albert |
130 |
Information Assurance |
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi |
131 |
Information Modeling and Relational Databases |
Terry Halpin, Tony Morgan |
132 |
Microsoft SharePoint 2007 Technologies |
Kevin Laahs, Emer McKenna, Veli-Matti Vanamo |
133 |
Business Metadata: Capturing Enterprise Knowledge |
William H. Inmon, Bonnie O'Neil, Lowell Fryman |
134 |
On-Chip Communication Architectures |
Sudeep Pasricha, Nikil Dutt |
135 |
Moderating Usability Tests: Principles and Practices for Interacting |
Joseph S. Dumas, Beth A. Loring |
136 |
System-on-Chip Test Architectures |
Laung-Terng Wang, Charles E. Stroud, Nur A. Touba |
137 |
HCI Beyond the GUI |
Philip Kortum |
138 |
Unleashing Web 2.0 |
Gottfried Vossen, Stephan Hagemann |
139 |
Evaluating Children's Interactive Products |
Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi |
140 |
Embedded DSP Processor Design |
Dake Liu |
141 |
Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL |
Joe Celko |
142 |
Aspect-Oriented Programming with the e Verification Language |
David Robinson |
143 |
VHDL-2008 |
Peter J. Ashenden, Jim Lewis |
144 |
Wireless Networking |
Anurag Kumar, D. Manjunath, Joy Kuri |
145 |
TCP/IP Sockets in Java |
Kenneth L. Calvert, Michael J. Donahoo |
146 |
Systems Engineering with SysML/UML |
Tim Weilkiens |
147 |
Processor Description Languages |
Prabhat Mishra, Nikil Dutt |
148 |
Internet Multimedia Communications Using SIP |
Rogelio Martinez Perea |
149 |
DW 2.0: The Architecture for the Next Generation of Data Warehousing |
William H. Inmon, Derek Strauss, Genia Neushloss |
150 |
Bluetooth Application Programming with the Java APIs Essentials Edition |
Timothy J. Thompson, C Bala Kumar, Paul Kline |
151 |
Executing Data Quality Projects |
Danette McGilvray |
152 |
Practical Guide to SysML |
Sanford Friedenthal, Rick Steiner, Alan Moore |
153 |
MPLS: Next Steps |
Bruce S. Davie, Adrian Farrel |
154 |
Network Security: Know It All |
James Joshi |
155 |
Digital Signal Processing System Design |
Nasser Kehtarnavaz |
156 |
Memory Systems |
Bruce Jacob, Spencer Ng, David Wang |
157 |
Handbook of Knowledge Representation |
Frank van Harmelen, Vladimir Lifschitz, Bruce Porter |
158 |
Information Flow and Knowledge Sharing |
Flavio Soares Correa da Silva, Jaume Agusti-Cullell, Frank van Harmelen |
159 |
Introduction to CDMA Wireless Communications |
Mosa Ali Abu-Rgheff |
160 |
Designing Storage for Exchange 2007 SP1 |
Pierre Bijaoui, Juergen Hasslauer |
161 |
Microsoft Exchange Server 2007 with SP1 |
Tony Redmond |
162 |
Joe Grand's Best of Hardware, Wireless, and Game Console Hacking |
Joe Grand, Frank Thornton, Albert Yarusso, Lee Barken, Tom Owad, Ryan Russell, Bobby Kinstle, Marcus R Brown, Job de Haas, Deborah Kaplan |
163 |
Kismet Hacking |
Frank Thornton |
164 |
Physical and Logical Security Convergence: Powered By Enterprise Security Management |
William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole |
165 |
AVIEN Malware Defense Guide for the Enterprise |
David Harley |
166 |
Google Hacking for Penetration Testers |
Johnny Long |
167 |
SonicWALL Secure Wireless Network Integrated Solutions Guide |
Khai Tran, Joe Levy, Lauren Pederson |
168 |
How to Cheat at Securing Linux |
James Stanger |
169 |
Nessus Network Auditing |
Russ Rogers |
170 |
Web Application Vulnerabilities |
Steven Palmer |
171 |
How to Cheat at Administering Office Communications Server 2007 |
Anthony Piltzecker |
172 |
No Tech Hacking |
Johnny Long, Kevin D. Mitnick |
173 |
Sarbanes-Oxley IT Compliance Using Open Source Tools |
Christian B Lahti, Roderick Peterson |
174 |
The Best Damn Server Virtualization Book Period |
Rogier Dittner, David Rule |
175 |
The Best Damn Firewall Book Period |
Thomas W Shinder |
176 |
The Best Damn Exchange, SQL and IIS Book Period |
Henrik Walther, Mark Horninger, Chris Adams |
177 |
TechnoSecurity's Guide to E-Discovery and Digital Forensics |
Jack Wiles |
178 |
InfoSecurity 2008 Threat Analysis |
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg |
179 |
The Best Damn IT Security Management Book Period |
Susan Snedaker, Robert McCrie, Karim Vellani |
180 |
The Best Damn Cybercrime and Digital Forensics Book Period |
Jack Wiles, Anthony Reyes |
181 |
How to Cheat at Deploying and Securing RFID |
Frank Thornton, Paul Sanghera |
182 |
How to Cheat at Securing Your Network |
Ido Dubrawsky |
183 |
Reverse Engineering Code with IDA Pro |
Chris Paget, Walter Pearce, Damon Cortesi |
184 |
Managing Catastrophic Loss of Sensitive Data |
Constantine Photopoulos |
185 |
OSSEC Host-Based Intrusion Detection Guide |
Rory Bray, Daniel Cid, Andrew Hay |
186 |
Nmap in the Enterprise |
Angela Orebaugh, Becky Pinkard |
187 |
Microsoft Forefront Security Administration Guide |
Jesse Varsalone |
188 |
Check Point NGX R65 Security Administration |
Ralph Bonnell |
189 |
OS X Exploits and Defense |
David Harley |
190 |
Secrets Stolen, Fortunes Lost |
Christopher Burgess, Richard Power |
191 |
The IT Digital Legal Companion |
Gene K. Landy, Amy J. Mastrobattista |
192 |
Netcat Power Tools |
Giovanni Giacobbi |
193 |
The IT Regulatory and Standards Compliance Handbook: |
Craig S. Wright |
194 |
Nagios 3 Enterprise Network Monitoring |
Max Schubert, Derrick Bennett, Andreas Ericsson |
195 |
Malware Forensics |
Cameron H. Malin, Eoghan Casey, James M. Aquilina |
196 |
The Best Damn Windows Server 2008 Book Period |
Anthony Piltzecker, Susan Snedaker |
197 |
Integrating ISA Server 2006 with Microsoft Exchange 2007 |
Fergus Strachan |
198 |
Scene of the Cybercrime |
Debra Littlejohn Shinder, Michael Cross |
199 |
Programming Lego Mindstorms NXT |
Owen Bishop |
200 |
Securing Windows Server 2008 |
Aaron Tiensivu |
201 |
Securing Citrix Presentation Server in the Enterprise |
Tariq Azad |
202 |
Techno Security's Guide to Securing SCADA |
Jack Wiles |
203 |
Effective Prototyping with Excel |
Jonathan Arnowitz, Michael Arent, Nevin Berger, Fred Sampson |
204 |
Probabilistic Methods for Bioinformatics |
Richard E Neapolitan, Xia Jiang |
205 |
Building Intelligent Interactive Tutors |
Beverly Park Woolf |
206 |
Technical, Commercial and Regulatory Challenges of QoS |
XiPeng Xiao |
207 |
Business Modeling |
David M. Bridgeland, Ron Zahavi |
208 |
Partial-Update Adaptive Signal Processing |
Kutluyil Dogancay |
209 |
P2P Networking and Applications |
John Buford, Heather Yu, Eng Keong Lua |
210 |
Master Data Management |
David Loshin |
211 |
Web Application Design Patterns |
Pawan Vora |
212 |
Three-dimensional Integrated Circuit Design |
Vasilis F. Pavlidis, Eby G. Friedman |
213 |
Computer and Information Security Handbook |
John R. Vacca |
214 |
Broadband Cable Access Networks |
David Large, James Farmer |
215 |
Networked Graphics |
Steed, Anthony |
216 |
Low-Power Design of Nanometer FPGAs |
Mohab Anis, Hassan Hassan |
217 |
Building the Agile Enterprise |
Cummins, Fred |
218 |
Deploying QoS for Cisco IP and Next Generation Networks |
Vinod Joseph, Tony Jeffress, Brett Chapman |
219 |
Disappearing Cryptography |
Peter Wayner |
220 |
Why Programs Fail |
Andreas Zeller |
221 |
TCP/IP Sockets in C |
Michael J. Donahoo, Kenneth L. Calvert |
222 |
The Illustrated Network |
Walter Goralski |
223 |
Database Archiving |
Jack E. Olson |
224 |
Joe Celko's Data, Measurements and Standards in SQL |
Celko, Joe |
225 |
Relational Database Design and Implementation |
Harrington, Jan |
226 |
Handbook of Global User Research |
Schumacher, Robert |
227 |
How to Build a Digital Library |
Witten, Ian |
228 |
SOA and Web Services Interface Design |
Bean, James |
229 |
Mobile Technology for Children |
Druin, Allison |
230 |
Geometric Algebra for Computer Science (Revised Edition) |
Dorst, Leo |
231 |
Developing Virtual Reality Applications |
Craig, Alan |
232 |
Principles of Computer System Design |
Saltzer, Jerome |
233 |
Semiconductors and the Information Revolution |
Orton, John |
234 |
RF and Digital Signal Processing for Software-Defined Radio |
Tony J. Rouphael |
235 |
Embedded Linux Development Using Eclipse |
Doug Abbott |
236 |
Principles of Transaction Processing |
Philip A. Bernstein, Eric Newcomer |
237 |
Forms that Work |
Caroline Jarrett, Gerry Gaffney |
238 |
Next Generation SSH2 Implementation |
Justin Peltier |
239 |
SAP Security Configuration and Deployment |
Joey Hirao |
240 |
GFI Network Security and PCI Compliance Power Tools |
Brien Posey |
241 |
Nokia Firewall, VPN, and IPSO Configuration Guide |
Andrew Hay, Keli Hay, Peter Giannoulis |
242 |
E-discovery: Creating and Managing an Enterprisewide Program |
Karen A. Schuler |
243 |
Mobile Malware Attacks and Defense |
Ken Dunham |
244 |
Virtualization for Security |
John Hoopes |
245 |
Cisco Router and Switch Forensics |
Liu, Dale |
246 |
SQL Injection Attacks and Defense |
Clarke, Justin |
247 |
Professional Penetration Testing |
Wilhelm, Thomas |
248 |
Eleventh Hour Security+ |
Dubrawsky, Ido |
249 |
Eleventh Hour Network+ |
Alpern, Naomi |
250 |
Bebop to the Boolean Boogie |
Clive Maxfield |
251 |
The Practitioner's Guide to Data Quality Improvement |
Loshin, David |
252 |
Optical Networks |
Ramaswami, Rajiv |
253 |
Handbook of Digital Forensics and Investigation |
Casey, Eoghan |
254 |
Electronic Design Automation |
Wang, Laung-Terng |
255 |
Beyond the Usability Lab |
Albert, William |
256 |
Smart Things: Ubiquitous Computing User Experience Design |
Kuniavsky, Mike |
257 |
Information Systems Transformation |
Ulrich, William |
258 |
Design to Thrive |
Howard, Tharon |
259 |
Designing with the Mind in Mind |
Johnson, Jeff |
260 |
Managing Time in Relational Databases |
Johnston, Tom |
261 |
Physically Based Rendering |
Pharr, Matt |
262 |
Usability Testing Essentials |
Barnum, Carol |
263 |
Light and Skin Interactions |
Baranoski, Gladimir |
264 |
User Experience Re-Mastered |
Wilson, Chauncey |
265 |
Interconnecting Smart Objects with IP |
Vasseur, Jean-Philippe |
266 |
Making Enterprise Information Management (EIM) Work for Business |
Ladley, John |
267 |
SQL Clearly Explained |
Harrington, Jan |
268 |
Thoughts on Interaction Design |
Kolko, Jon |
269 |
ON THE DEVELOPMENT OF CHINA ’S INFORMATION TECHNOLOGY INDUSTRY |
Jiang, Zemin |
270 |
System Assurance |
Mansourov, Nikolai |
271 |
The Essential Persona Lifecycle: Your Guide to Building and Using Personas |
Adlin, Tamara |
272 |
Understanding Motion Capture for Computer Animation |
Menache, Alberto |
273 |
Agile Development and Business Goals |
Holtsnider, Bill |
274 |
No Code Required |
Cypher, Allen |
275 |
Entity Resolution and Information Quality |
Talburt, John |
276 |
Joe Celko's SQL for Smarties |
Celko, Joe |
277 |
Analyzing Social Media Networks with Microsoft NodeXL |
Hansen, Derek |
278 |
Cyber Attacks |
Amoroso, Edward |
279 |
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit |
Liu, Dale |
280 |
Microsoft Virtualization |
Olzak, Thomas |
281 |
A Guide to Kernel Exploitation |
Perla, Enrico |
282 |
Eleventh Hour Linux+ |
Speake, Graham |
283 |
PCI Compliance |
Chuvakin, Anton |
284 |
Digital Forensics for Network, Internet, and Cloud Computing |
Garrison, Clint |
285 |
Seven Deadliest Wireless Technologies Attacks |
Haines, Brad |
286 |
Seven Deadliest Web Application Attacks |
Shema, Mike |
287 |
Seven Deadliest Social Network Attacks |
Timm, Carl |
288 |
Seven Deadliest Unified Communications Attacks |
York, Dan |
289 |
Seven Deadliest Network Attacks |
Prowell, Stacy |
290 |
Seven Deadliest Microsoft Attacks |
Kraus, Rob |
291 |
Seven Deadliest USB Attacks |
Anderson, Brian |
292 |
Virtualization and Forensics |
Barrett, Diane |
293 |
Microsoft Windows 7 Administrator's Reference |
Orchilles, Jorge |
294 |
CISSP Study Guide |
Conrad, Eric |
295 |
Eleventh Hour CISSP |
Conrad, Eric |
296 |
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition |
Street, Jayson |
297 |
Securing the Smart Grid |
Flick, Tony |
298 |
Managed Code Rootkits |
Metula, Erez |
299 |
Microsoft Windows Server 2008 R2 Administrator's Reference |
Hannifin, Dustin |
300 |
Citrix XenDesktop Implementation.. |
James, Gareth R. |
301 |
Ninja Hacking |
Wilhelm, Thomas |
302 |
Security for Microsoft Windows System Administrators |
Rountree, Derrick |
303 |
Digital Video Surveillance and Security |
Caputo, Anthony |
304 |
Metrics and Methods for Security Risk Management |
Young, Carl |
305 |
Heuristic Search |
Edelkamp, Stefan |
306 |
Architecture of Network Systems |
Serpanos, Dimitrios |
307 |
Data Mining: Practical Machine Learning Tools and Techniques |
Witten, Ian |
308 |
Developing High Quality Data Models |
West, Matthew |
309 |
Global UX |
Sherman, Paul |
310 |
Thoughts on Interaction Design |
Kolko, Jon |
311 |
Data Mining |
Han, Jiawei |
312 |
Effective Security Management |
Sennewald, Charles |
313 |
Database Modeling and Design |
Teorey, Toby |
314 |
Electronic Access Control |
Little, Karen |
315 |
Pervasive Information Architecture |
Resmini, Andrea |
316 |
Brave NUI World |
Wigdor, Dennis |
317 |
Private Cloud Computing |
Smoot, Stephen |
318 |
Deploying Next Generation Multicast-enabled Applications |
Joseph, Vinod |
319 |
GPU Computing Gems Emerald Edition |
|
320 |
API Design for C++ |
Reddy, Martin |
321 |
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children |
Betz, Charles |
322 |
Data Architecture |
Tupper, Charles |
323 |
A Practical Guide to SysML |
Friedenthal, Sanford |
324 |
3C Vision |
Levialdi |
325 |
Design Research through Practice |
Koskinen, Ilpo |
326 |
Systems Thinking |
Gharajedaghi, Jamshid |
327 |
GPU Computing Gems Jade Edition |
|
328 |
Semantic Web for the Working Ontologist |
Allemang, Dean |
329 |
Private Security and the Law |
Nemeth, Charles |
330 |
OCEB Certification Guide |
Weilkiens, Tim |
331 |
Heterogeneous Computing with OpenCL |
Gaster, Benedict |
332 |
CUDA Application Design and Development |
Farber, Rob |
333 |
Thor's Microsoft Security Bible |
Mullen, Timothy |
334 |
Securing the Cloud |
Winkler, J.R. ("Vic") |
335 |
Web Application Obfuscation |
Heiderich, Mario |
336 |
Security Risk Management |
Wheeler, Evan |
337 |
Securing SQL Server |
Cherry, Denny |
338 |
Digital Forensics for Legal Professionals |
Daniel, Larry |
339 |
Industrial Network Security |
Knapp, Eric |
340 |
Migrating to the Cloud |
Laszewski, Tom |
341 |
The Basics of Information Security |
Andress, Jason |
342 |
The Basics of Hacking and Penetration Testing |
Engebretson, Patrick |
343 |
iPhone and iOS Forensics |
Hoog, Andrew |
344 |
Low Tech Hacking |
Wiles, Jack |
345 |
Moving To The Cloud |
Dinkar, Sitaram |
346 |
Coding for Penetration Testers |
Andress, Jason |
347 |
Information Visualization |
Ware, Colin |
348 |
Sketching User Experiences: The Workbook |
Greenberg, Saul |
349 |
Risk Analysis and the Security Survey |
Broder, James F. |
350 |
Tcl/Tk |
Flynt, Clif |
351 |
Observing the User Experience |
Kuniavsky, Mike |
352 |
Quantifying the User Experience |
Sauro, Jeff |
353 |
Writing Effective Business Rules |
Witt, Graham |
354 |
It's Our Research |
Sharon, Tomer |
355 |
User Experience Management |
Lund, Arnie |
356 |
Business Intelligence |
Loshin, David |
357 |
Letting Go of the Words |
Redish, Janice (Ginny) |
358 |
Grounded Innovation |
Holmquist, Lars Erik |
359 |
Design for Emotion |
van Gorp, Trevor |
360 |
Joe Celko's Trees and Hierarchies in SQL for Smarties |
Celko, Joe |
361 |
Data Insights |
Whitney, Hunter |
362 |
User Experience in the Age of Sustainability |
Kramer, Kem-Laurin |
363 |
Intersection |
Guenther, Milan |
364 |
Usability in Government Systems |
Buie, Elizabeth |
365 |
Content Strategy at Work |
Bloomstein, Margot |
366 |
Digital Video and HD |
Poynton, Charles |
367 |
Data Virtualization for Business Intelligence Systems |
van der Lans, Rick |
368 |
Agile Data Warehousing Project Management |
Hughes, Ralph |
369 |
Designing the Search Experience |
Russell-Rose, Tony |
370 |
Temporal QOS Management in Scientific Cloud Workflow Systems |
Liu, Xiao |
371 |
Security Consulting |
Sennewald, Charles |
372 |
Synchronous Precharge Logic |
Smoszna, Marek |
373 |
The Basics of Cyber Warfare |
Winterfeld, Steve |
374 |
Federated Identity Primer |
Rountree, Derrick |
375 |
Introduction to Data Compression |
Sayood, Khalid |
376 |
Homeland Security |
Bullock, Jane |
377 |
Using Open Source Platforms for Business Intelligence |
Wise, Lyndsay |
378 |
Handbook on Securing Cyber-Physical Critical Infrastructure |
Das, Sajal |
379 |
Data Governance |
Ladley, John |
380 |
Computer Animation |
Parent, Rick |
381 |
Effective Physical Security |
Fennelly, Lawrence |
382 |
CUDA Programming |
Cook, Shane |
383 |
Collaborative Enterprise Architecture |
Bente, Stefan |
384 |
IT Manager's Handbook |
Holtsnider, Bill |
385 |
Agile User Experience Design |
Brown, Diana |
386 |
Structured Parallel Programming |
McCool, Michael |
387 |
Cargo Theft, Loss Prevention, and Supply Chain Security |
Burges, Dan |
388 |
Principles of Data Integration |
Halevy, Alon |
389 |
Malware Forensic Field Guide for Windows Systems |
Malin, Cameron |
390 |
Client-Side Attacks and Defense |
Oriyano, Sean-Philip |
391 |
Logging and Log Management |
Chuvakin, Anton |
392 |
FISMA and the Risk Management Framework |
Gantz, Stephen |
393 |
Wireless Reconnaissance in Penetration Testing |
Neely, Matthew |
394 |
Augmented Reality |
Kipper, Greg |
395 |
Information Security Risk Assessment Toolkit |
Talabis, Mark |
396 |
Federal Cloud Computing |
Metheny, Matthew |
397 |
Blackhatonomics |
Gragido, Will |
398 |
Data Hiding |
Raggo, Michael |
399 |
UTM Security with Fortinet |
Tam, Kenneth |
400 |
Securing SQL Server |
Cherry, Denny |
401 |
PCI Compliance |
Chuvakin, Anton |
402 |
Advanced Persistent Threat |
Cole, Eric |
403 |
The Hacker's Guide to OS X |
Ghassemlouei, Alijohn |
404 |
Hacking Web Apps |
Shema, Mike |
405 |
Violent Python |
O'Connor, TJ |
406 |
CISSP Study Guide |
Conrad, Eric |
407 |
Network Intrusion Analysis |
Fichera, Joe |
408 |
SQL Injection Attacks and Defense |
Clarke, Justin |
409 |
Keys to the Kingdom |
Ollam, Deviant |
410 |
Practical Lock Picking |
Ollam, Deviant |
411 |
Beyond CISSP |
Wheeler, Evan |
412 |
Customer Interviewing |
Alvarez, Cindy |
413 |
Cyber Security and IT Infrastructure Protection |
Vacca, John |
414 |
Going Parallel with C++ |
Hummel, Joe |
415 |
Insights in Computer Science 1 |
Doe, John |
416 |
Insights in Computer Science 2 |
Doe, John |
417 |
Managing Information Security |
Vacca, John |
418 |
Network and System Security |
Vacca, John |
419 |
Programming with CUDA and OpenACC |
Farber, Rob |
420 |
UI Inspection Methods |
TBD |
421 |
Computer and Information Security Handbook |
Vacca, John |
422 |
Learning Processing |
Shiffman, Daniel |
423 |
Writing for Interaction |
Newman Lior, Linda |
424 |
Data Modeling Essentials |
Simsion, Graeme |
425 |
UI is Communication |
McKay, Everett |
426 |
Measuring Data Quality for Ongoing Improvement |
Sebastian-Coleman, Laura |
427 |
Managing Data in Motion |
Reeve, April |
428 |
Social Data Analytics |
Rogers, Shawn |
429 |
Network Convergence |
Joseph, Vinod |
430 |
Web Services, Service-Oriented Architectures, and Cloud Computing |
Barry, Douglas K. |
431 |
Visual Usability |
Levinson, Deborah |
432 |
Application Administrators Handbook |
Bourne, Kelly |
433 |
Implementing Analytics |
Sheikh, Nauman |
434 |
Principles of Big Data |
Berman, Jules |
435 |
Combinatorial Topology and Distributed Computing |
Herlihy, Maurice |
436 |
Practical Web Analytics for User Experience |
Beasley, Michael |
437 |
Cloud Computing |
Marinescu, Dan |
438 |
Moderating One-on-One User Research |
Tedesco, Donna |
439 |
DIGITAL OUTCASTS |
Smith, Kel |
440 |
Hacking the Scene |
Cohen, Tyler |
441 |
Enterprise Data Services |
Sarkar, Pushpak |
442 |
Analyzing the Social Web |
Golbeck, Jennifer |
443 |
Total Information Risk Management |
Borek, Alexander |
444 |
Human-Computer Interaction |
MacKenzie, I. Scott |
445 |
FISMA Compliance Handbook |
Taylor, Laura |
446 |
A Practical Guide to Business Analytics |
Fitzgerald, Jaime |
447 |
Data Warehousing in the Age of Big Data |
Krishnan, Krish |
448 |
Heterogeneous Computing with OpenCL |
Gaster, Benedict |
449 |
The Basics of Cloud Computing |
Rountree, Derrick |
450 |
Brainstorming and Beyond |
Wilson, Chauncey |
451 |
Joe Celko’s Complete Guide to NoSQL |
Celko, Joe |
452 |
The Digital Crown |
Leibtag, Ahava |
453 |
High Performance Deformable Image Registration Algorithms for Manycore Processors |
Shackleford, James |
454 |
Penetration Testing with Backtrack 5 |
Broad, James |
455 |
Computation and Storage in the Cloud |
Yuan, Dong |
456 |
Software Engineering |
Schmidt, Richard |
457 |
Agile Software Architect |
Babar, Muhammad Ali |
458 |
Enterprise Application Administration |
Faircloth, Jeremy |
459 |
Introduction to Cyber-Warfare |
Shakarian, Paulo |
460 |
Investigating Internet Crimes |
Shipley, Todd |
461 |
Accelerating Matlab with GPU |
Suh, Jung |
462 |
Mobile User Experience Archetypes |
Mendoza, Adrian |
463 |
Assessing Vendors |
More, Josh |
464 |
User Interface Inspection Methods |
Wilson, Chauncey |
465 |
Credible Checklists and Quality Questionnaires |
Wilson, Chauncey |
466 |
Interview Techniques for UX Practitioners |
Wilson, Chauncey |
467 |
Practical Anonymity |
Loshin, Pete |
468 |
The Wireshark Field Guide |
Shimonski, Robert |
469 |
Intel Xeon Phi Coprocessor High Performance Programming |
Jeffers, Jim |
470 |
Thor's OS Xodus |
Mullen, Timothy "Thor" |
471 |
Business Continuity and Disaster Recovery Planning for IT Professionals |
Snedaker, Susan |
472 |
Analytical Approaches for Customer Centricity |
Loshin, David |
473 |
Using Information to Develop a Culture of Customer Centricity |
Loshin, David |
474 |
Mastering Cloud Computing |
Buyya, Rajkumar |
475 |
The Case for the Top Data Job |
Aiken, Peter |
476 |
Emerging Trends in ICT Security |
Akhgar, Babak |
477 |
Mastering Private Cloud with Windows Server 2012 |
Chou, Yung |
478 |
Simple Steps to Data Encryption: |
Loshin, Pete |
479 |
Measuring the User Experience |
Tullis, Thomas |
480 |
Visualization in Medicine |
Preim, Bernhard |
481 |
Understanding Augmented Reality |
Craig, Alan B. |
482 |
Malware Forensics Field Guide for Linux Systems |
Malin, Cameron |
483 |
When Botnets Attack |
Zachry, Josh |
484 |
Digital Forensics Processing and Procedures |
Watson, David |
485 |
Windows 2012 Server Network Security |
Rountree, Derrick |
486 |
IT Audit |
Tuuri, Dan |
487 |
Hacking .NET |
Simon, Robert |
488 |
Windows Server 2012 Security from End to Edge and Beyond |
Shinder, Thomas W |
489 |
Social Media Security |
Etue, David |
490 |
Professional Penetration Testing |
Wilhelm, Thomas |
491 |
Risk Management Framework |
Broad, James |
492 |
Computer Incident Response and Forensics Team Management |
Johnson, Leighton |
493 |
Applied Cyber Security and the Smart Grid |
Knapp, Eric |
494 |
Time Frequency Analysis |
Boualem Boashash |
495 |
Network Simulation Experiments Manual |
Emad Aboelela |
496 |
XML in Data Management: Understanding and Applying Them Together |
Peter Aiken, M. David Allen |
497 |
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types |
Tim Monroe |
498 |
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types |
Tim Monroe |
499 |
GMPLS: Architecture and Applications |
Adrian Farrel, Igor Bryskin |
500 |
Face Processing: Advanced Modeling and Methods |
Wenyi Zhao, Rama Chellappa |
501 |
Proceedings 2004 VLDB Conference: The 30th International Conference on Very Large Databases (VLDB) |
VLDB |
502 |
Network Processor Design: Issues and Practices, Volume 3 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
503 |
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices |
George Varghese |
504 |
Complete Maya Programming Volume II: An In-depth Guide to 3D Fundamentals, Geometry, and Modeling |
David Gould |
505 |
An Introduction to Programming with IDL |
Kenneth Bowman |
506 |
Smart Phone and Next Generation Mobile Computing |
Pei Zheng, Lionel Ni |
507 |
MEL Scripting for Maya Animators |
Mark R. Wilkins, Chris Kazmier |
508 |
Joe Celko's SQL Programming Style |
Joe Celko |
509 |
Data Model Patterns: A Metadata Map |
David C. Hay |
510 |
Moving Objects Databases |
Ralf Hartmut Güting, Markus Schneider |
511 |
Cost-Justifying Usability: An Update for the Internet Age |
Randolph G. Bias, Deborah J. Mayhew |
512 |
Practical Time-Frequency Analysis |
Rene Carmona, WenLiang Hwang, Bruno Torresani |
513 |
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization |
Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper |
514 |
C# 2.0: Practical Guide for Programmers |
Michel de Champlain, Brian G. Patrick |
515 |
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration |
Earl Cox |
516 |
Network Processor Design: Issues and Practices, Volume 2 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
517 |
Multiscale Wavelet Methods for Partial Differential Equations |
Wolfgang Dahmen, Andrew Kurdila, Peter Oswald |
518 |
Machine Vision: Theory, Algorithms, Practicalities |
E. R. Davies |
519 |
SQL: Practical Guide for Developers |
Michael J. Donahoo, Gregory D. Speegle |
520 |
Mac OSX Developer Guide |
Jesse Feiler |
521 |
Time-Frequency/Time-Scale Analysis |
Patrick Flandrin |
522 |
Visual Effects in A Digital World: A Comprehensive Glossary of over 7000 Visual Effects Terms |
Karen Goulekas |
523 |
Network Security: A Practical Approach |
Jan L. Harrington |
524 |
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design |
Karen Holtzblatt, Jessamyn Burns Wendell, Shelley Wood |
525 |
Joe Celko's SQL for Smarties: Advanced SQL Programming |
Joe Celko |
526 |
Commonsense Reasoning |
Erik T. Mueller |
527 |
Spine Technology Handbook |
Steven M. Kurtz, Avram Edidin |
528 |
Globus® Toolkit 4: Programming Java Services |
Borja Sotomayor, Lisa Childers |
529 |
Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G |
Luis M. Correia |
530 |
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control |
Giorgio Franceschetti, Sabatino Stornelli |
531 |
Programming with Quartz: 2D and PDF Graphics in Mac OS X |
David Gelphman, Bunny Laden |
532 |
Joe Celko's Analytics and OLAP in SQL |
Joe Celko |
533 |
Networks on Chips: Technology and Tools |
Giovanni De Micheli, Luca Benini, Luca Benini |
534 |
VLSI Test Principles and Architectures: Design for Testability |
Laung-Terng Wang, Cheng-Wen Wu, Xiaoqing Wen |
535 |
Designing SOCs with Configured Cores: Unleashing the Tensilica Xtensa and Diamond Cores |
Steve Leibson |
536 |
Multiprocessor Systems-on-Chips |
Ahmed Jerraya, Wayne Wolf |
537 |
Communication Networking: An Analytical Approach |
Anurag Kumar, D. Manjunath, Joy Kuri |
538 |
VHDL: Coding and Logic Synthesis with SYNOPSYS |
Weng Fook Lee |
539 |
Fuzzy Theory Systems |
Cornelius Leondes |
540 |
Knowledge-Based Systems |
Cornelius Leondes |
541 |
Expert Systems |
Cornelius Leondes |
542 |
Database and Data Communication Network Systems |
Cornelius Leondes |
543 |
Enterprise Knowledge Management: The Data Quality Approach |
David Loshin |
544 |
TCP/IP Sockets in C#: Practical Guide for Programmers |
David Makofske, Michael J. Donahoo, Kenneth L. Calvert |
545 |
ASIC and FPGA Verification: A Guide to Component Modeling |
Richard Munden |
546 |
Physically Based Rendering: From Theory to Implementation |
Matt Pharr, Greg Humphreys |
547 |
Routing, Flow, and Capacity Design in Communication and Computer Networks |
Michal Pióro, Deepankar Medhi |
548 |
The Persona Lifecycle: Keeping People in Mind Throughout Product Design |
John Pruitt, Tamara Adlin |
549 |
High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting |
Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec |
550 |
Nonlinear Computer Modeling of Chemical and Biochemical Data |
James Rusling / Thomas Kumosinski |
551 |
Introduction to Data Compression |
Sayood |
552 |
JSTL: Practical Guide for JSP Programmers |
Sue Spielman |
553 |
Multirate and Wavelet Signal Processing |
Bruce Suter |
554 |
Database Modeling and Design: Logical Design |
Toby J. Teorey, Sam S. Lightstone, Tom Nadeau |
555 |
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS |
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester |
556 |
Proceedings 2003 VLDB Conference: 29th International Conference on Very Large Databases (VLDB) |
VLDB |
557 |
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers |
David Wall |
558 |
Grid Computing |
Pawel Plaszczak, Richard Wellner, Jr. |
559 |
Java Cryptography Extensions: Practical Guide for Programmers |
Jason Weiss |
560 |
QuickTime for .NET and COM Developers |
John Cromie |
561 |
Signal and Image Representation in Combined Spaces |
Yehoshua Zeevi, Ronald Coifman |
562 |
Chaos and Fractals |
C.A. Pickover |
563 |
Neuromimetic Semantics |
Harry Howard |
564 |
SDL '99: The Next Millennium |
R. Dssouli/G.V. Bochmann/Y. Lahav |
565 |
Kohonen Maps |
Oja, E. / Kaski, S. |
566 |
Charging Communication Networks |
D.J. Songhurst |
567 |
A Computational Framework for Segmentation and Grouping |
Medioni, G. / Lee, Mi-Suen / Tang, Chi-Keung |
568 |
CAFE: An Industrial-Strength Algebraic Formal Method |
Futatsugi, K. / Nakagawa, A.T. / Tamai, T. |
569 |
Parallel Computational Fluid Dynamics 2001: Practice and Theory |
P. Wilders, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
570 |
Parallel Computational Fluid Dynamics 2000: Trends and Applications |
C.B. Jenssen, T. Kvamdal, H.I. Andersson, B. Pettersen, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
571 |
Parallel Computational Fluid Dynamics 2002: New Frontiers and Multi-Disciplinary Applications |
K. Matsuno, A. Ecer, P Fox, J. Periaux, N. Satofuka |
572 |
Handbook of Automated Reasoning |
Alan Robinson / Andrei Voronkov |
573 |
Handbook of Computer Aided Geometric Design |
G. Farin / J. Hoschek / M.-S. Kim |
574 |
Intelligent Systems for Information Processing |
B. Bouchon-Meunier / L. Foulloy / R.R. Yager |
575 |
Handbook of Temporal Reasoning in Artificial Intelligence |
Michael Fisher, Dov M. Gabbav, Lluis Vila |
576 |
Parallel Computational Fluid Dynamics 2003: Advanced Numerical Methods, Software and Applications |
Boris Chetverushkin, A. Ecer, Jacques Periaux, N. Satofuka |
577 |
Parallel Computing: Software Technology, Algorithms, Architectures & Applications |
Gerhard Joubert, Wolfgang Nagel, Frans Peters, Wolfgang Walter |
578 |
Fuzzy Logic and the Semantic Web |
Elie Sanchez |
579 |
Grid Computing: The New Frontier of High Performance Computing |
Lucio Grandinetti |
580 |
Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications |
Gabriel Winter, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox |
581 |
Reaction-Diffusion Computers |
Andrew Adamatzky/Benjamin De Lacy Costello/Tetsuya Asai |
582 |
Modern Information Processing |
Bernadette Bouchon-Meunier / Giulianella Coletti / Ronald Yager |
583 |
Handbook of Constraint Programming |
Francesca Rossi, Peter van Beek, Toby Walsh |
584 |
The Economics of Open Source Software Development |
Jürgen Bitzer / Philipp Schröder |
585 |
Recent Research Towards Advanced Man-Machine Interface Through Spoken Language |
H. Fujisaki |
586 |
Principles of Logic and Logic Programming |
G. Metakides, A. Nerode |
587 |
Symbiosis of Human and Artifact |
Yuichiro Anzai, Katsuhiko Ogawa, Hirohiko Mori |
588 |
Handbook of Human-Computer Interaction |
Helander, M.G. / Landauer, T.K. / Prabhu, P.V. |
589 |
Parallel Computational Fluid Dynamics 1993: New Trends and Advances |
Akin Ecer, J. Hauser, P. Leca, J. Periaux |
590 |
Algorithms and Parallel VLSI Architectures III |
M. Moonen / F. Catthoor |
591 |
SVD and Signal Processing III |
Marc Moonen, Bart De Moor |
592 |
High Performance Computing: Technology, Methods and Applications |
Dongarra, J.J. |
593 |
Problem Solving: Methods, Programming and Future Concepts |
O.V. German, D.V. Ofitserov |
594 |
Intelligent Robots and Systems |
Volker Graefe |
595 |
Time-Varying Image Processing and Moving Object Recognition, 4 |
V. Cappellini |
596 |
Parallel Computational Fluid Dynamics 1995: Implementations and Results Using Parallel Computers |
A. Ecer, J. Periaux, N. Satofuka, S. Taylor |
597 |
Parallel Computational Fluid Dynamics 1996: Algorithms and Results Using Advanced Computers |
P. Schiano, A. Ecer, J. Periaux, N. Satofuka |
598 |
Intelligent Environments |
Droege, P. |
599 |
Statistical Optimization for Geometric Computation: Theory and Practice |
K. Kanatani |
600 |
Parallel Processing for Artificial Intelligence 3 |
J. Geller, H. Kitano, C.B. Suttner |
601 |
Proceedings IWISP '96 |
B.G. Mertzios, P. Liatsis |
602 |
SDL '97: Time for Testing |
A. Cavalli/A. Sarma |
603 |
Handbook of Process Algebra |
J.A. Bergstra / A. Ponse / S.A. Smolka |
604 |
Parallel Computational Fluid Dynamics 1997: Recent Developments and Advances Using Parallel Computers |
D. Emerson, A. Ecer, P. Fox, J. Periaux, N. Satofuka |
605 |
Parallel Computational Fluid Dynamics 1998: Development and Applications of Parallel Technology |
C.A. Lin, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
606 |
Parallel Computational Fluid Dynamics 1999: Towards Teraflops, Optimization and Novel Formulations |
D. Keyes, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
607 |
Parallel Computing: Fundamentals, Applications and New Directions |
D'Hollander, E.H. |
608 |
Topological Algorithms for Digital Image Processing |
T. Yung Kong, Azriel Rosenfeld |
609 |
Sewers: Replacement and New Construction |
Geoffrey F Read |
610 |
Newnes Data Communications Pocket Book |
Steve Winder, Mike Tooley |
611 |
Newnes Radio and RF Engineering Pocket Book |
Steve Winder, Joseph Carr |
612 |
Applying UML: Advanced Applications |
Rob Pooley, Pauline Wilcox |
613 |
Newnes PC Troubleshooting Pocket Book |
Howard Anderson, Mike Tooley |
614 |
Software Design Methodology: From Principles to Architectural Styles |
Hong Zhu |
615 |
Introduction to Web Matrix: ASP.NET Development for Beginners |
Colin Hardy, Simon Stobart |
616 |
Object-Oriented Design with UML and Java |
Kenneth Barclay, John Savage |
617 |
A Student Guide to Object-Oriented Development |
Carol Britton, Jill Doake |
618 |
Student's Essential Guide to .NET |
Tony Grimer |
619 |
Value Creation from E-Business Models |
Wendy Currie |
620 |
Fundamental Data Compression |
Ida Mengyi Pu |
621 |
Strategies for Growth in SMEs: The Role of Information and Information Sytems |
Margi Levy, Philip Powell |
622 |
Understanding Mobile Human-Computer Interaction |
Steve Love |
623 |
Real-Time Systems Development |
Rob Williams |
624 |
Advanced Systems Design with Java, UML and MDA |
Kevin Lano |
625 |
Ultra Wideband Systems: Technologies and Applications |
Roberto Aiello, Ph.D., Anuj Batra, Ph.D. |
626 |
Digital Signal Processing System-Level Design Using LabVIEW |
Nasser Kehtarnavaz, Namjin Kim |
627 |
High-Technology Crime Investigator’s Handbook |
Gerald L. Kovacich, Andy Jones |
628 |
Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking |
Doron Drusinsky |
629 |
Embedded Software: The Works |
Colin Walls |
630 |
Voice Over IPv6: Architectures for Next Generation VoIP Networks |
Daniel Minoli |
631 |
OpenVMS Alpha Internals and Data Structures: Memory Management |
Ruth Goldenberg |
632 |
High Performance Data Network Design: Design Techniques and Tools |
Tony Kenyon |
633 |
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management |
Barry de Ville |
634 |
OpenVMS System Management Guide |
Lawrence Baldwin, Steve Hoffman, David Miller |
635 |
Networking Explained |
Michael Gallo, William M. Hancock, PhD, CISSP, CI |
636 |
Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle |
Charles Breakfield, Roxanne Burkey |
637 |
TruCluster Server Handbook |
Scott Fafrak, Jim Lola, Dennis O'Brien, Gregory Yates, Brad Nichols |
638 |
Computer Systems Performance Evaluation and Prediction |
Paul Fortier, Howard Michel |
639 |
CRM: Redefining Customer Relationship Management |
Jeffrey Peel |
640 |
OpenVMS with Apache, WASD, and OSU: The Nonstop Webserver |
Alan Winston |
641 |
Understanding WMI Scripting: Exploiting Microsoft's Windows Management Instrumentation in Mission-Critical Computing Infrastructures |
Alain Lissoir |
642 |
Linux and OpenVMS Interoperability: Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems |
John Robert Wisniewski |
643 |
Data Networks: Routing, Security, and Performance Optimization |
Tony Kenyon |
644 |
Linux and the Unix Philosophy |
Mike Gancarz |
645 |
Tru64 UNIX Troubleshooting: Diagnosing and Correcting System Problems |
Martin Moore, Steven Hancock |
646 |
UNIX for OpenVMS Users |
Philip Bourne, Richard Holstein, Joseph McMullen |
647 |
Call Center Operation: Design, Operation, and Maintenance |
Duane Sharp |
648 |
Getting Started with OpenVMS: A Guide for New Users |
Michael D Duffy |
649 |
Corporate Portals Empowered with XML and Web Services |
Anura Guruge |
650 |
Getting Started with OpenVMS System Management |
David Miller |
651 |
Web Services: Theory and Practice |
Anura Guruge |
652 |
Windows Server 2003 Security Infrastructures: Core Security Features |
Jan De Clercq |
653 |
Microsoft Outlook Programming: Jumpstart for Administrators, Developers, and Power Users |
Sue Mosher |
654 |
RAPID Value Management for the Business Cost of Ownership: Readiness, Architecture, Process, Integration, Deployment |
Andrew Wigodsky |
655 |
Socially Responsible IT Management |
Michael Erbschloe |
656 |
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers |
Jerry Cochran |
657 |
Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices |
William Wheeler |
658 |
Firewalls: Jumpstart for Network and Systems Administrators |
John R. Vacca, Scott Ellis |
659 |
Internet Security: A Jumpstart for Systems Administrators and IT Managers |
Tim Speed, Juanita Ellis |
660 |
Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems |
Alain Lissoir |
661 |
Microsoft SharePoint Technologies: Planning, Design and Implementation |
Kevin Laahs, Emer McKenna, Veli-Matti Vanamo |
662 |
Monitoring and Managing Microsoft Exchange Server 2003 |
Mike Daugherty |
663 |
Cybersecurity Operations Handbook |
John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CI |
664 |
Debugging by Thinking: A Multidisciplinary Approach |
Robert Charles Metzger |
665 |
Resilient Storage Networks: Designing Flexible Scalable Data Infrastructures |
Greg Schulz |
666 |
Implementing Homeland Security for Enterprise IT |
Michael Erbschloe |
667 |
Managing Software Deliverables: A Software Development Management Methodology |
John Rittinghouse, PhD, CISM |
668 |
HP NonStop Server Security: A Practical Handbook |
XYPRO Technology Corp |
669 |
Network programming in .NET: C# & Visual Basic .NET |
Fiach Reid |
670 |
Microsoft® Exchange Server 2003 Deployment and Migration |
Kieran McCorry |
671 |
Wireless Operational Security |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
672 |
IPv6 Network Programming |
Jun-ichiro itojun Hagino |
673 |
Open Source Software: Implementation and Management |
Paul Kavanagh |
674 |
Oracle 10g RAC Grid, Services & Clustering |
Murali Vallath |
675 |
Oracle 10g Data Warehousing |
Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith |
676 |
Oracle SQL: Jumpstart with Examples |
Gavin JT Powell, Carol McCullough-Dieter |
677 |
Physical Security for IT |
Michael Erbschloe |
678 |
Deploying LINUX on the Desktop |
Edward Haletky |
679 |
Oracle Database Programming using Java and Web Services |
Kuassi Mensah |
680 |
Tony Redmond's Microsoft Exchange Server 2003: with SP1 |
Tony Redmond |
681 |
Voice over Internet Protocol (VoIP) Security |
James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM |
682 |
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions |
René J. Chevance |
683 |
Implementing Database Security and Auditing |
Ron Ben Natan |
684 |
Oracle Data Warehouse Tuning for 10g |
Gavin JT Powell |
685 |
Managing Microsoft's Remote Installation Services |
Soren Rasmussen, Michael Iversen |
686 |
IM Instant Messaging Security |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
687 |
Business Continuity and Disaster Recovery for InfoSec Managers |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
688 |
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL |
XYPRO Technology Corp |
689 |
Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 |
Kieran McCorry |
690 |
Understanding Virtual Reality: Interface, Application, and Design |
William R. Sherman, Alan Craig |
691 |
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling |
Ron Goldman |
692 |
Subdivision Methods for Geometric Design: A Constructive Approac |
Joe Warren, Henrik Weimer |
693 |
SQL: 1999 - Understanding Relational Language Components |
Jim Melton, Alan R. Simon |
694 |
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery |
Gerhard Weikum, Gottfried Vossen |
695 |
Telecommunications Law in the Internet Age |
Sharon K. Black |
696 |
Computer Animation: Algorithms and Techniques |
Richard Parent |
697 |
Spatial Databases: With Application to GIS |
Philippe Rigaux, Michel Scholl, Agnès Voisard |
698 |
Geometric Tools for Computer Graphics |
Philip Schneider, David H. Eberly |
699 |
Swarm Intelligence |
Russell C. Eberhart, Yuhui Shi, James Kennedy |
700 |
Internet QoS: Architectures and Mechanisms for Quality of Service |
Zheng Wang |
701 |
Skew-Tolerant Circuit Design |
David Harris |
702 |
Illustrating Evolutionary Computation with Mathematica |
Christian Jacob |
703 |
Object-Oriented Reengineering Patterns |
Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz |
704 |
Component Database Systems |
Klaus R. Dittrich, Andreas Geppert |
705 |
Persuasive Technology: Using Computers to Change What We Think and Do |
B.J. Fogg |
706 |
Distributed Systems Architecture: A Middleware Approach |
Arno Puder, Kay Römer, Frank Pilhofer |
707 |
Readings in Multimedia Computing and Networking |
Kevin Jeffay, Hong Jiang Zhang |
708 |
Business Modeling and Data Mining |
Dorian Pyle |
709 |
Optical Networks: A Practical Perspective |
Rajiv Ramaswami, Kumar Sivarajan |
710 |
Usability for the Web: Designing Web Sites that Work |
Tom Brinck, Darren Gergle, Scott D. Wood |
711 |
Advanced Graphics Programming Using OpenGL |
Tom McReynolds, David Blythe |
712 |
An Introduction to NURBS: With Historical Perspective |
David F. Rogers |
713 |
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design |
Terry Halpin |
714 |
Creative Evolutionary Systems |
David W. Corne, Peter J. Bentley |
715 |
The Designer's Guide to VHDL |
Peter J. Ashenden |
716 |
Advanced SQL:1999: Understanding Object-Relational and Other Advanced Features |
Jim Melton |
717 |
Data Warehousing: Using the Wal-Mart Model |
Paul Westerman |
718 |
TCP/IP Sockets in Java: Practical Guide for Programmers |
Kenneth L. Calvert, Michael J. Donahoo |
719 |
Object-Oriented Construction Handbook: Developing Application-Oriented Software with the Tools & Materials Approach |
Heinz Züllighoven |
720 |
Your Wish is My Command: Programming By Example |
Henry Lieberman |
721 |
Practical IDL Programming |
Liam E. Gumley |
722 |
Higher-Order Perl: Transforming Programs with Programs |
Mark Jason Dominus |
723 |
Readings in Hardware/Software Co-Design |
Giovanni De Micheli, Rolf Ernst, Wayne Wolf |
724 |
Querying XML: XQuery, XPath, and SQL/XML in context |
Jim Melton, Stephen Buxton |
725 |
Usability Engineering: Scenario-Based Development of Human-Computer Interaction |
Mary Beth Rosson, John M. Carroll |
726 |
Data Warehousing And Business Intelligence For e-Commerce |
Alan R. Simon, Steven L. Shaffer |
727 |
Digital Watermarking |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller |
728 |
Foundations of Genetic Algorithms 2001 (FOGA 6) |
William Spears, Worthy N. Martin, Worth Martin |
729 |
JDBC: Practical Guide for Java Programmers |
Gregory D. Speegle |
730 |
Curves and Surfaces for CAGD: A Practical Guide |
Gerald Farin |
731 |
System Architecture with XML |
Berthold Daum, Udo Merten |
732 |
Interactive QuickTime: Authoring Wired Media |
Matthew R. Peterson |
733 |
The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling |
Peter J. Ashenden, Gregory D. Peterson, Darrell A. Teegarden |
734 |
MPLS Network Management: MIBs, Tools, and Techniques |
Thomas D. Nadeau |
735 |
Web Application Design Handbook: Best Practices for Web-Based Software |
Susan Fowler, Victor Stanwick |
736 |
Database Tuning: Principles, Experiments, and Troubleshooting Techniques |
Dennis Shasha, Philippe Bonnet |
737 |
Mining the Web: Discovering Knowledge from Hypertext Data |
Soumen Chakrabarti |
738 |
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML |
R. J. Wieringa |
739 |
Applying Knowledge Management: Techniques for Building Corporate Memories |
Ian Watson |
740 |
Embedded Computing: A VLIW Approach to Architecture, Compilers and Tools |
Joseph A. Fisher, Paolo Faraboschi, Cliff Young |
741 |
Voice Interaction Design:Crafting the New Conversational Speech Systems |
Randy Allen Harris |
742 |
Disappearing Cryptography: Information Hiding: Steganography & Watermarking |
Peter Wayner |
743 |
Developing IP-Based Services: Solutions for Service Providers and Vendors |
Monique Morrow, Kateel Vijayananda |
744 |
TCP/IP Clearly Explained |
Pete Loshin |
745 |
Blondie24: Playing at the Edge of AI |
David B. Fogel |
746 |
Non-Photorealistic Computer Graphics: Modeling, Rendering, and Animation |
Thomas Strothotte, Stefan Schlechtweg |
747 |
How to Build a Digital Library |
Ian H. Witten, David Bainbridge |
748 |
Digital Video and HDTV: Algorithms and Interfaces |
Charles Poynton |
749 |
Evolutionary Computation in Bioinformatics |
Gary B. Fogel, David W. Corne |
750 |
Digital Arithmetic |
Miloš D. Ercegovac, Tomás Lang |
751 |
Tcl/Tk: A Developer's Guide |
Clif Flynt |
752 |
HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science |
John M. Carroll |
753 |
IPv6: Theory, Protocol, and Practice |
Pete Loshin |
754 |
Modeling Business Objects with XML Schema |
Berthold Daum |
755 |
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit |
Peter Braun, Wilhelm R. Rossak |
756 |
Information Visualization: Perception for Design |
Colin Ware |
757 |
Relational Database Design Clearly Explained |
Jan L. Harrington |
758 |
From COBOL to OOP |
Markus Knasmüller |
759 |
TCP/IP Sockets in C: Practical Guide for Programmers |
Michael J. Donahoo, Kenneth L. Calvert |
760 |
Modern Cable Television Technology |
Walter Ciciora, James Farmer, David Large, Michael Adams |
761 |
Bioinformatics: Managing Scientific Data |
Zoé Lacroix, Terence Critchlow |
762 |
Maintaining and Evolving Successful Commercial Web Sites: Managing Change, Content, Customer Relationships, and Site Measurement |
Ashley Friedlein |
763 |
Interaction Design for Complex Problem Solving: Developing Useful and Usable Software |
Barbara Mirel |
764 |
Content Networking: Architecture, Protocols, and Practice |
Markus Hofmann, Leland R. Beaumont |
765 |
Complete Maya Programming: An Extensive Guide to MEL and C++ API |
David Gould |
766 |
JSP: Practical Guide for Programmers |
Robert Brunner |
767 |
Level of Detail for 3D Graphics |
David Luebke, Martin Reddy, Jonathan D. Cohen, Amitabh Varshney, Benjamin Watson, Robert Huebner |
768 |
Web Bloopers: 60 Common Web Design Mistakes, and How to Avoid Them |
Jeff Johnson |
769 |
Designing Data-Intensive Web Applications |
Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera |
770 |
Multicast Sockets: Practical Guide for Programmers |
David Makofske, Kevin Almeroth |
771 |
Texturing and Modeling: A Procedural Approach |
David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, Steven Worley |
772 |
Interconnection Networks |
Jose Duato, Sudhakar Yalamanchili, Lionel Ni |
773 |
Real-Time Shader Programming |
Ron Fosner |
774 |
Temporal Data & the Relational Model |
C.J. Date, Hugh Darwen, Nikos Lorentzos |
775 |
Automated Planning: Theory & Practice |
Malik Ghallab, Dana Nau, Paolo Traverso |
776 |
Policy-Based Network Management: Solutions for the Next Generation |
John Strassner |
777 |
Jim Blinn's Corner: Notation, Notation, Notation |
Jim Blinn |
778 |
Digital Geometry: Geometric Methods for Digital Picture Analysis |
Reinhard Klette, Azriel Rosenfeld |
779 |
The Struts Framework: Practical Guide for Java Programmers |
Sue Spielman |
780 |
Why Programs Fail: A Guide to Systematic Debugging |
Andreas Zeller |
781 |
Unit Testing in Java: How Tests Drive the Code |
Johannes Link |
782 |
VLDB '02: Proceedings of the 28th International Conference on Very Large Databases |
VLDB |
783 |
Paper Prototyping: The Fast and Easy Way to Design and Refine User Interfaces |
Carolyn Snyder |
784 |
Stochastic Local Search: Foundations & Applications |
Holger H. Hoos, Thomas Stützle |
785 |
ARM System Developer's Guide: Designing and Optimizing System Software |
Andrew Sloss, Dominic Symes, Chris Wright |
786 |
Network Processor Design: Issues and Practices, Volume 1 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
787 |
SQL Clearly Explained |
Jan L. Harrington |
788 |
Innovation Happens Elsewhere: Open Source as Business Strategy |
Ron Goldman, Richard P. Gabriel |
789 |
Constraint Processing |
Rina Dechter |
790 |
Data Quality: The Accuracy Dimension |
Jack E. Olson |
791 |
Engineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions |
James Bean |
792 |
Java Web Services Architecture |
James McGovern, Sameer Tyagi, Michael Stevens, Sunil Mathew |
793 |
Web Services and Service-Oriented Architectures |
Douglas K. Barry |
794 |
XML for Data Architects: Designing for Reuse and Integration |
James Bean |
795 |
Java: Practical Guide for Programmers |
Michael Sikora |
796 |
Virtual Machines: Versatile Platforms for Systems and Processes |
Jim Smith, Ravi Nair |
797 |
The Internet and Its Protocols: A Comparative Approach |
Adrian Farrel |
798 |
Wireless Sensor Networks: An Information Processing Approach |
Feng Zhao, Leonidas Guibas |
799 |
The Craft of Information Visualization: Readings and Reflections |
Benjamin B. Bederson, Ben Shneiderman |
800 |
Business Intelligence |
David Loshin |
801 |
Semantics in Business Systems |
Dave McComb |
802 |
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering |
Malcolm Chisholm |
803 |
Database Modeling with Microsoft® Visio for Enterprise Architects |
Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean |
804 |
Joe Celko's Trees and Hierarchies in SQL for Smarties |
Joe Celko |
805 |
Observing the User Experience: A Practitioner's Guide to User Research |
Mike Kuniavsky |
806 |
Understanding Digital Libraries |
Michael Lesk |
807 |
Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation |
Axel Jantsch |
808 |
Location-Based Services |
Jochen Schiller, Agnès Voisard |
809 |
Knowledge Representation and Reasoning |
Ronald Brachman, Hector Levesque |
810 |
The Grid 2: Blueprint for a New Computing Infrastructure |
Ian Foster, Carl Kesselman |
811 |
Bluetooth Application Programming with the Java APIs |
C Bala Kumar, Paul Kline, Tim Thompson |
812 |
Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques |
Catherine Courage, Kathy Baxter |
813 |
The Mobile Connection: The Cell Phone's Impact on Society |
Rich Ling |
814 |
Cisco PIX Firewalls |
Umer Khan |
815 |
Sockets, Shellcode, Porting, & Coding |
James Foster |
816 |
Stealing the Network |
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch |
817 |
InfoSec Career Hacking |
Chris Hurley, Johnny Long, Aaron Bayles, Ed Brindley |
818 |
Securing IM and P2P Applications for the Enterprise |
Marcus Sachs, Paul Piccard |
819 |
Host Integrity Monitoring Using Osiris and Samhain |
Brian Wotring |
820 |
Virtualization with VMware ESX Server |
Al Muller, Seburn Wilson |
821 |
Nessus, Snort, & Ethereal Power Tools |
Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus |
822 |
Penetration Tester's Open Source Toolkit |
Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore |
823 |
How to Cheat at Managing Windows Server Update Services |
B. Barber |
824 |
Phishing Exposed |
Lance James |
825 |
Configuring Check Point NGX VPN-1/Firewall-1 |
Barry Stiefel, Simon Desmeules |
826 |
Skype Me! |
Markus Daehne |
827 |
Network Security Evaluation |
Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham |
828 |
Sarbanes-Oxley Compliance Using COBIT and Open Source Tools |
Christian Lahti, Roderick Peterson |
829 |
How to Cheat at IT Project Management |
Susan Snedaker |
830 |
OS X for Hackers at Heart |
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers |
831 |
Perfect Password |
Mark Burnett |
832 |
Security Log Management |
Jacob Babbin |
833 |
RFID Security |
Frank Thornton, Chris Lanthem |
834 |
Insider Threat |
Eric Cole, Sandra Ring |
835 |
How to Cheat at Configuring ISA Server 2004 |
Thomas Shinder, Debra Littlejohn Shinder |
836 |
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure |
B. Barber, Melissa Craft, Michael Cross, Hal Kurz |
837 |
Practical VoIP Security |
Thomas Porter |
838 |
Video Conferencing over IP |
Michael Gough |
839 |
Combating Spyware in the Enterprise |
Paul Piccard |
840 |
Syngress IT Security Project Management Handbook |
Susan Snedaker |
841 |
Building a VoIP Network with Nortel’s Multimedia Communication Server 5100 |
Larry Chaffin |
842 |
Winternals |
Dave Kleiman, Laura Hunter |
843 |
How to Cheat at Securing a Wireless Network |
Chris Hurley, Lee Barken |
844 |
Firewall Policies and VPN Configurations |
Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, jennifer Davis |
845 |
How to Cheat at Managing Information Security |
Mark Osborne |
846 |
BigNum Math |
Tom St Denis |
847 |
How to Cheat at Designing Security for a Windows Server 2003 Network |
Chris Ruston, Chris Peiris |
848 |
Configuring SonicWALL Firewalls |
Chris Lathem |
849 |
How to Cheat at Managing Microsoft Operations Manager 2005 |
Tony Piltzecker |
850 |
Writing Security Tools and Exploits |
James Foster |
851 |
The Enterprise Architecture IT Project: The Urbanisation Paradigm |
Christophe Longépé |
852 |
IP Addressing & Subnetting INC IPV6: Including IPv6 |
J D Wegner, Robert Rockell, Syngress Media |
853 |
DBAs Guide to Databases Under Linux |
David Egan, Paul Zikopoulos, Chris Rogers |
854 |
Managing Windows 2000 Network Services |
Dr. Thomas W. Shinder, Debra Littlejohn Shinder, Thomas W. Shinder, Syngress |
855 |
Windows 2000 Configuration Wizards |
Syngress Media, Brian M. Collins, Paul Shields |
856 |
Windows 2000 Server System Administration Handbook |
Paul Shields, Ralph W Crump, Martin Weiss |
857 |
Troubleshooting Windows 2000 TCP/IP |
Syngress Media Inc, Debra Littlejohn Shinder, Thomas W Shinder, Syngress |
858 |
Building Cisco Remote Access Networks |
Wayne Lawson |
859 |
Configuring Cisco AVVID |
Syngress Publishing, Erik Rozell, Sandy C. Kronenberg, Wayne Lawson |
860 |
Mission Critical Windows 2000 Server Administration |
Robin Walshaw, Syngress Publishing |
861 |
Configuring Citrix MetaFrame for Windows 2000 Terminal Services |
Melissa Craft, Allen V. Keele, et. al |
862 |
Designing SQL Server 2000 Databases |
Travis Laird, Robert Patton, and Jennifer Ogle |
863 |
E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks |
Syngress Media Inc, Brian Bagnall, Syngress Publishing, James Stanger |
864 |
Configuring Exchange Server 2000 |
James Stagner |
865 |
ASP Configuration Handbook |
John Gunson, Dale Booth, Sean Thurston |
866 |
Hack Proofing Your E-Commerce Site - The only way to stop a hacker is to think like one |
Ryan Russell |
867 |
Configuring ISA Server 2000 |
Thomas W. Shinder, Inc. Syngress Media |
868 |
Hack Proofing Your Web Applications - The Only Way to stop a hacker is to think like one |
Ryan Russell, Inc. Syngress Media, Syngress Media |
869 |
Palm OS Web Application Developer's Guide - Including PQA and Web Clipping |
Ben Coombe, R. Eric Lyons, David C. Matthews, Rory Lysaght |
870 |
Hack Proofing Linux |
James Stanger, Patrick T. Lane |
871 |
BizTalk Server 2000 Developer's Guide |
Scott Roberts, Milton Todd, Chris Farmer, Robert Shimonski |
872 |
Bluetooth Application Developer's Guide |
Jennifer Bray, Brian Senese, Gordon McNutt, Bill Munday |
873 |
Hack Proofing Sun Solaris 8 |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F Williams Lynch |
874 |
Designing A Wireless Network |
Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely |
875 |
Webmaster's Guide to the Wireless Internet |
Ryan Fife, Wei Meng Lee, Dan A. Olsen |
876 |
XML .NET Developer's Guide |
Henk-Evert Sonder, Jonothon Ortiz, Adam Sills |
877 |
VB.net Developer's Guide |
Cameron Wakefield, Henk-Evert Sonder, Wei Meng Lee |
878 |
C#.Net Developer's Guide |
Saurabh Nandu, dotthatcom.com, Greg Hack, Adrian Turtschi |
879 |
ASP .NET Web Developer's Guide |
Jonothon Ortiz, Mesbah Ahmed, Chris Garrett, Jeremy Faircloth, Wei Meng Lee, Adam Sills, Chris Payne |
880 |
Configuring Windows 2000 without Active Directory |
Carol Bailey, Tom Shinder, Dr Thomas W Shinder, Thomas Shinder MD |
881 |
.NET Mobile Web Developers Guide |
Steve Milroy, Ken Cox, DotThatCom.com, Amit Kalani |
882 |
Building A Cisco Wireless LAN |
Ron Fuller, Tim Blankenship |
883 |
Hackproofing Your Wireless Network |
Tony Bautts, Erif Ouellet, Eric Ouellet, Neal O'Farrell |
884 |
Windows 2000 Active Directory 2E |
Melissa Craft |
885 |
Ruby Developers Guide |
Michael Neumann, Robert Feldt, Lyle Johnson |
886 |
Building Robots With Lego Mindstorms |
Mario Ferrari, Giulio Ferrari, Ralph Hempel |
887 |
Hack Proofing Your Network |
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh |
888 |
Hack Proofing ColdFusion |
Steve Casco, Rob Rusher, Greg Meyer, Sarge |
889 |
Configuring and Troubleshooting Windows XP Professional |
Martin Grasdal, Brian Barber, Chad Todd, Norris L. Johnson Jr. |
890 |
Developing .Net Web Services With Xml |
David Jorgensen |
891 |
Cisco AVVID and IP Telephony Design & Implementation |
Robert Padjen, Larry Keefer, Sean Thurston, Jeff Bankston |
892 |
Configuring IPv6 For Cisco IOS |
Edgar, Jr. Parenti, Eric Knipp, Brian Browne |
893 |
Developing Web Services with Java APIs for XML (JAX Pack) |
Robert Hablutzel |
894 |
Hacking a Terror Network: The Silent Threat of Covert Channels |
Russ Rogers, Matthew Devost |
895 |
Security Sage's Guide to Hardening the Network Infrastructure |
Steven Andres, Brian Kenyon, Erik Pack Birkholz |
896 |
Wardriving: Drive, Detect, Defend: A Guide to Wireless Security |
Chris Hurley |
897 |
Snort 2.1 Intrusion Detection |
Brian Caswell, Jay Beale |
898 |
Stealing the Network: How to Own a Continent |
Ryan Russell, Joe Grand, Tom Craig |
899 |
Nessus Network Auditing: Jay Beale Open Source Security Series |
Jay Beale, Haroon Meer, Charl van der Walt, Renaud Deraison |
900 |
Zero-Day Exploit:: Countdown to Darkness |
Rob Shein, Marcus Sachs |
901 |
Cyber Adversary Characterization: Auditing the Hacker Mind |
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz |
902 |
The Best Damn Windows Server 2003 Book Period |
Debra Littlejohn Shinder, Thomas Shinder |
903 |
Dr. Tom Shinder's Configuring ISA Server 2004 |
Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal |
904 |
Aggressive Network Self-Defense |
Neil Wyler |
905 |
Richard Thieme's Islands in the Clickstream |
Richard Thieme |
906 |
CYA Securing Exchange Server 2003 |
Mark Fugatt, Henrik Walther, Pattrick Santry |
907 |
CYA Securing IIS 6.0 |
Chris Peiris, Bernard Cheah, Ken Schaefer |
908 |
Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari, & Sega |
Joe Grand, Albert Yarusso |
909 |
Google Hacking for Penetration Testers |
Johnny Long |
910 |
Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! |
Lee Barken |
911 |
Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover |
David Allen |
912 |
Apple I Replica Creation: Back to the Garage |
Tom Owad |
913 |
Cyber Spying |
Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole |
914 |
Network+ Study Guide & Practice Exams |
Robert Shimonski, Laura Hunter, Norris Johnson |
915 |
Hack Proofing Windows 2000 Server |
Chad Todd, Norris L., Jr. Johnson |
916 |
Hack Proofing XML |
Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis Jr Franklin |
917 |
Hack Proofing Your Identity |
Teri Bidwell |
918 |
Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1 |
Melissa Craft |
919 |
C# For Java Programmers |
Harold Cabrera, Jeremy Faircloth, Stephen Goldberg |
920 |
Managing Cisco Network Security |
Sean Thurston |
921 |
Sniffer Pro Network Optimization and Troubleshooting Handbook |
Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko |
922 |
Cisco Security Specialists Guide to PIX Firewall |
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver |
923 |
Configuring Cisco Voice Over IP |
Jason Sinclair, Paul Fong, Scott M. Harris, Martin Walshaw |
924 |
Scene of the Cybercrime |
Debra Littlejohn Shinder, Ed Tittel |
925 |
Dr Tom Shinder's ISA Server and Beyond |
Thomas W. Shinder, Martin Grasdal, Debra Littlejohn Shinder |
926 |
Special Ops |
Erik Pace Birkholz, Stuart McClure |
927 |
Nokia Network Security Solutions Handbook |
Doug Maxwell |
928 |
Snort Intrusion Detection 2.0 |
Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth |
929 |
SSCP Study Guide and DVD Training System |
Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth |
930 |
Configuring Symantec AntiVirus Enterprise Edition |
Laura E Hunter, Athar A Khan, James Stanger, Jay Cee Taylor |
931 |
MCSE/MCSA (Exam 70-214) Study Guide |
Will Schmied, Thomas W. Shinder |
932 |
Stealing The Network: How to Own the Box |
Ryan Russell, Ido Dubrawsky, FX, Joe Grand |
933 |
Building DMZs For Enterprise Networks |
Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder |
934 |
The Best Damn Firewall Book Period |
Cherie Amon, Thomas W. Shinder, Anne Carasik-Henmi |
935 |
The Best Damn Cisco Internetworking Book Period |
Charles Riley |
936 |
MCSA/MCSE (Exam 70-291) Study Guide |
Dr Thomas W. Shinder, Thomas W. Shinder, Debra Littlejohn Shinder |
937 |
MCSE (Exam 70-293) Study Guide |
Dr Thomas W Shinder, Thomas W Shinder, Debra Littlejohn Shinder, Martin Grasdal |
938 |
MCSE (Exam 70-294) Study Guide |
Michael Cross, Todd Walls, Jeffery A Martin, Martin Grasdal |
939 |
CheckPoint NG VPN 1/Firewall 1 |
Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble |
940 |
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks |
Rick Gallaher |
941 |
Configuring NetScreen Firewalls |
Cameron, Rob |
942 |
Intrusion Prevention and Active Response: Deploying Network and Host IPS |
Michael Rash, Angela Orebaugh, Graham Clark |
943 |
Deploying Citrix MetaFrame Presentation Server 3.0 |
Melissa Craft, Connie S. Wilson, Chris Broomes |
944 |
Microsoft Log Parser Toolkit |
Gabriele Giuseppini, Mark Burnett |
945 |
MCSE (Exam 70-297) Study Guide |
Neil Ruston, Laura E. Hunter |
946 |
MCSE (Exam 70-298) Study Guide |
Neil Ruston |
947 |
MCSA/MCSE (Exam 70-292) Study Guide |
Will Schmied, Robert J. Shimonski |
948 |
MCSE (Exam 70-296) Study Guide |
Anthony Piltzecker, Laura E Hunter, Melissa Craft, Brian Barber |
949 |
MCSA/MCSE (Exam 70-290) Study Guide |
Thomas W. Shinder, Debra Littlejohn Shinder, Syngress Publishing, Chris Peiris |
950 |
Hacking the Code |
Mark Burnett |
951 |
Buffer Overflow Attacks |
James C. Foster, Vitaly Osipov, Nish Bhalla |
952 |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems |
Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky |
953 |
Programmer's Ultimate Security DeskRef |
James Foster |
954 |
How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King |
Susan Snedaker |
955 |
Black Hat Physical Device Security: Exploiting Hardware and Software |
Drew Miller |
956 |
Ethereal Packet Sniffing |
Angela D Orebaugh, Greg Morris, Ed Warnicke, Gilbert Ramirez |
957 |
Hardware Hacking |
Joe Grand, Kevin Mitnick, Ryan Russell |
958 |
Inside the SPAM Cartel |
Spammer-X, Jeffrey Posluns |
959 |
Check Point Next Generation with Application Intelligence Security Administration |
Chris Tobkin, Daniel Kligerman |
960 |
Managing and Securing a Cisco SWAN |
David Wall, Jeremy Faircloth, Joel Barrett, Jan Kanclirz Jr |
961 |
Security Assessment |
Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra |
962 |
Software Piracy Exposed |
Paul Craig, Mark Burnet |
963 |
Mathematical Programming: Theory and Methods |
S. M. Sinha |