Accessibility Tools

E-Books Computer Science

SL. No. E-Book Titles Author
1 See MIPS Run Dominic Sweetman
2 Multimedia over IP and Wireless Networks Mihaela van der Schaar, Philip A Chou
3 X3D Don Brutzman, Leonard Daly
4 Fault-Tolerant Systems Israel Koren, C. Mani Krishna
5 Effective Prototyping for Software Makers Jonathan Arnowitz, Michael Arent, Nevin Berger
6 Network Routing Deepankar Medhi, Karthikeyan Ramasamy
7 Physical Database Design Sam S. Lightstone, Toby J. Teorey, Tom Nadeau
8 Geometric Algebra for Computer Science Leo Dorst, Daniel Fontijne, Stephen Mann
9 High-Performance Embedded Computing Wayne Wolf
10 Letting Go of the Words Janice (Ginny) Redish
11 FastSOA Frank Cohen
12 Customizable Embedded Processors Paolo Ienne, Rainer Leupers
13 Java Data Mining: Strategy, Standard, and Practice Mark F. Hornick, Erik Marcadé, Sunil Venkayala
14 Probabilistic Methods for Financial and Marketing Informatics Richard E Neapolitan, Xia Jiang
15 IPv6 Advanced Protocols Implementation Qing Li, Jinmei Tatuya, Keiichi Shima
16 Network Analysis, Architecture, and Design James D. McCabe
17 IT Manager's Handbook Bill Holtsnider, Brian D. Jaffe
18 Digital Design and Computer Architecture David Harris, Sarah Harris
19 Deploying IP and MPLS QoS for Multiservice Networks John William Evans, Clarence Filsfils
20 Real-Life MDA Michael Guttman, John Parodi
21 Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children Charles T. Betz
22 Visualization in Medicine Bernhard Preim, Dirk Bartz
23 Point-Based Graphics Markus Gross, Hanspeter Pfister
24 User-Centered Design Stories Carol Righi, Janice James
25 Web Dragons Ian H. Witten, Marco Gori, Teresa Numerico
26 Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks Gerald R. Ash
27 Strategic Security Management Karim Vellani
28 The Profit Impact of Business Intelligence Steve Williams, Nancy Williams
29 Practical Model-Based Testing Mark Utting, Bruno Legeard
30 Groovy Programming Kenneth Barclay, John Savage
31 ESL Design and Verification Grant Martin, Brian Bailey, Andrew Piziali
32 Data Preparation for Data Mining Using SAS Mamdouh Refaat
33 Wireless Communications & Networking Vijay Garg
34 UML 2 Certification Guide Tim Weilkiens, Bernd Oestereich
35 Text Entry Systems I. Scott MacKenzie, Kumiko Tanaka-Ishii
36 Joe Celko's SQL Puzzles and Answers Joe Celko
37 Ethernet Networking for the Small Office and Professional Home Office Jan L. Harrington
38 Sketching User Experiences: Getting the Design Right and the Right Design Bill Buxton
39 Business Process Change Paul Harmon
40 IPv6 Core Protocols Implementation Qing Li, Tatuya Jinmei, Keiichi Shima
41 The History of Information Security Karl Maria Michael de Leeuw
42 Parallel Computational Fluid Dynamics 2005: Theory and Applications A. Deane, Gunther Brenner, A. Ecer, David Emerson, James McDonough, J. Periaux, N. Satofuka, Damien Tromeur-Dervout
43 Parallel Computational Fluid Dynamics 2006 Jang-Hyuk Kwon, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox
44 Wireless Networking Technology Steve Rackley
45 CCTV Surveillance Herman Kruegle
46 Data Mining and Predictive Analysis Colleen McCue
47 Security Operations Management, 2nd ed. Robert McCrie
48 Integrated Security Systems Design Thomas L. Norman, CPP, PSP, CSC
49 Systems Thinking Gharajedaghi, Jamshid
50 The Art of War for Security Managers Scott Watson
51 Electronic Security Systems Robert Pearson
52 Secure Roaming in 802.11 Networks Raymond Greenlaw, Paul Goransson
53 Security Convergence Dave Tyson
54 Microsoft® Exchange Server 2003 Scalability with SP1 and SP2 Pierre Bijaoui
55 Developing Practical Wireless Applications Dean A. Gratton
56 Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook Ken England, Gavin JT Powell
57 Oracle 10g Developing Media Rich Applications Lynne Dunckley, Larry Guros
58 Microsoft Windows Security Fundamentals Jan De Clercq, Guido Grillenmeier
59 Oracle Performance Tuning for 10gR2 Gavin JT Powell
60 Microsoft Outlook 2007 Programming Sue Mosher
61 Microsoft Exchange 2007: Tony Redmond's Guide to Successful Implementation Tony Redmond
62 Computational Intelligence Russell C. Eberhart, Yuhui Shi
63 System Level Design with Rosetta Perry Alexander
64 Google Talking Joshua Brashars, Johnny Long
65 Syngress Force Emerging Threat Analysis Robert Graham
66 Scripting VMware Power Tools: Automating Virtual Infrastructure Administration Al Muller
67 Developer's Guide to Web Application Security Michael Cross
68 Wireshark & Ethereal Network Protocol Analyzer Toolkit Angela Orebaugh, Gilbert Ramirez, Jay Beale
69 Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research James Foster, David Maynor
70 Stealing the Network Johnny Long, Timothy Mullen, Ryan Russell
71 Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson
72 Snort Intrusion Detection and Prevention Toolkit Brian Caswell, Jay Beale, Andrew Baker
73 Designing and Building Enterprise DMZs Hal Flynn
74 Network Security Assessment Steve Manzuik, Ken Pfeil, Andrew Gold
75 Cryptography for Developers Tom St Denis
76 How to Cheat at Windows System Administration Using Command Line Scripts Pawan K Bhardwaj
77 Virtualization with Microsoft Virtual Server 2005 Andy Jones, Rogier Dittner, David Rule, Ken Majors, Matthijs ten Seldam, Twan Grotenhuis, Geoffrey Green
78 Hack the Stack Michael Gregg
79 WarDriving and Wireless Penetration Testing Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker
80 Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security T. Bradley
81 FISMA Certification and Accreditation Handbook L. Taylor
82 Configuring Juniper Networks NetScreen & SSG Firewalls Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin
83 Secure Your Network for Free Eric Seagren
84 CD and DVD Forensics Paul Crowley
85 Enemy at the Water Cooler Brian T Contos
86 Cyber Crime Investigations Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel
87 RFID+ Study Guide and Practice Exams Paul Sanghera
88 Botnets Craig Schiller, Jim Binkley
89 How to Cheat at Configuring Exchange Server 2007 Henrik Walther
90 Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood
91 Microsoft Vista for IT Security Professionals Tony Piltzecker
92 Asterisk Hacking Joshua Brashars
93 Building Robots with LEGO Mindstorms NXT Mario Ferrari, Guilio Ferrari, David Astolfo
94 Security+ Study Guide Ido Dubrawsky, Jeremy Faircloth
95 Cross Site Scripting Attacks Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager
96 How to Cheat at IIS 7 Server Administration Chris Adams, Brian Frederick
97 Windows Forensic Analysis DVD Toolkit Harlan Carvey
98 Alternate Data Storage Forensics Amber Schroader, Tyler Cohen
99 PCI Compliance Tony Bradley, Anton Chuvakin, Anatoly Elberg, Brian J. Koerner
100 Linksys WRT54G Ultimate Hacking Paul Asadoorian, Larry Pesce
101 Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress David E. Williams
102 Zen and the Art of Information Security Ira Winkler
103 How to Cheat at VoIP Security Thomas Porter, Michael Gough
104 How to Cheat at Configuring Open Source Security Tools Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
105 Business Continuity and Disaster Recovery for IT Professionals Susan Snedaker
106 Perl Scripting for Windows Security Harlan Carvey
107 How to Cheat at Microsoft Vista Administration Jan Kanclirz
108 How to Cheat at Configuring VmWare ESX Server David Rule
109 Open Source Fuzzing Tools Noam Rathaus, Gadi Evron
110 How to Cheat at Securing SQL Server 2005 Mark Horninger
111 The Official CHFI Study Guide (Exam 312-49) Dave Kleiman
112 Practical Oracle Security Josh Shaul, Aaron Ingram
113 Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W Shinder
114 Juniper(r) Networks Secure Access SSL VPN Configuration Guide Rob Cameron, Neil R. Wyler
115 The Designer's Guide to VHDL Peter J. Ashenden
116 Digital Modeling of Material Appearance Julie Dorsey, Holly Rushmeier, François Sillion
117 Architecture Design for Soft Errors Shubu Mukherjee
118 Reconfigurable Computing Scott Hauck, André DeHon
119 Verification Techniques for System-Level Design Masahiro Fujita, Indradeep Ghosh, Mukul Prasad
120 GUI Bloopers 2.0 Jeff Johnson
121 Keeping Found Things Found: The Study and Practice of Personal Information Management William Jones
122 Visual Thinking Colin Ware
123 Annotated C# Standard Jon Jagger, Nigel Perry, Peter Sestoft
124 Image Fusion Tania Stathaki
125 Wireless Sensor and Actuator Networks Roberto Verdone, Davide Dardari, Gianluca Mazzini, Andrea Conti
126 Microscope Image Processing Qiang Wu, Fatima Merchant, Kenneth Castleman
127 Digital Watermarking and Steganography Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
128 Semantic Web for the Working Ontologist Dean Allemang, James Hendler
129 Measuring the User Experience Thomas Tullis, William Albert
130 Information Assurance Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
131 Information Modeling and Relational Databases Terry Halpin, Tony Morgan
132 Microsoft SharePoint 2007 Technologies Kevin Laahs, Emer McKenna, Veli-Matti Vanamo
133 Business Metadata: Capturing Enterprise Knowledge William H. Inmon, Bonnie O'Neil, Lowell Fryman
134 On-Chip Communication Architectures Sudeep Pasricha, Nikil Dutt
135 Moderating Usability Tests: Principles and Practices for Interacting Joseph S. Dumas, Beth A. Loring
136 System-on-Chip Test Architectures Laung-Terng Wang, Charles E. Stroud, Nur A. Touba
137 HCI Beyond the GUI Philip Kortum
138 Unleashing Web 2.0 Gottfried Vossen, Stephan Hagemann
139 Evaluating Children's Interactive Products Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi
140 Embedded DSP Processor Design Dake Liu
141 Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL Joe Celko
142 Aspect-Oriented Programming with the e Verification Language David Robinson
143 VHDL-2008 Peter J. Ashenden, Jim Lewis
144 Wireless Networking Anurag Kumar, D. Manjunath, Joy Kuri
145 TCP/IP Sockets in Java Kenneth L. Calvert, Michael J. Donahoo
146 Systems Engineering with SysML/UML Tim Weilkiens
147 Processor Description Languages Prabhat Mishra, Nikil Dutt
148 Internet Multimedia Communications Using SIP Rogelio Martinez Perea
149 DW 2.0: The Architecture for the Next Generation of Data Warehousing William H. Inmon, Derek Strauss, Genia Neushloss
150 Bluetooth Application Programming with the Java APIs Essentials Edition Timothy J. Thompson, C Bala Kumar, Paul Kline
151 Executing Data Quality Projects Danette McGilvray
152 Practical Guide to SysML Sanford Friedenthal, Rick Steiner, Alan Moore
153 MPLS: Next Steps Bruce S. Davie, Adrian Farrel
154 Network Security: Know It All James Joshi
155 Digital Signal Processing System Design Nasser Kehtarnavaz
156 Memory Systems Bruce Jacob, Spencer Ng, David Wang
157 Handbook of Knowledge Representation Frank van Harmelen, Vladimir Lifschitz, Bruce Porter
158 Information Flow and Knowledge Sharing Flavio Soares Correa da Silva, Jaume Agusti-Cullell, Frank van Harmelen
159 Introduction to CDMA Wireless Communications Mosa Ali Abu-Rgheff
160 Designing Storage for Exchange 2007 SP1 Pierre Bijaoui, Juergen Hasslauer
161 Microsoft Exchange Server 2007 with SP1 Tony Redmond
162 Joe Grand's Best of Hardware, Wireless, and Game Console Hacking Joe Grand, Frank Thornton, Albert Yarusso, Lee Barken, Tom Owad, Ryan Russell, Bobby Kinstle, Marcus R Brown, Job de Haas, Deborah Kaplan
163 Kismet Hacking Frank Thornton
164 Physical and Logical Security Convergence: Powered By Enterprise Security Management William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole
165 AVIEN Malware Defense Guide for the Enterprise David Harley
166 Google Hacking for Penetration Testers Johnny Long
167 SonicWALL Secure Wireless Network Integrated Solutions Guide Khai Tran, Joe Levy, Lauren Pederson
168 How to Cheat at Securing Linux James Stanger
169 Nessus Network Auditing Russ Rogers
170 Web Application Vulnerabilities Steven Palmer
171 How to Cheat at Administering Office Communications Server 2007 Anthony Piltzecker
172 No Tech Hacking Johnny Long, Kevin D. Mitnick
173 Sarbanes-Oxley IT Compliance Using Open Source Tools Christian B Lahti, Roderick Peterson
174 The Best Damn Server Virtualization Book Period Rogier Dittner, David Rule
175 The Best Damn Firewall Book Period Thomas W Shinder
176 The Best Damn Exchange, SQL and IIS Book Period Henrik Walther, Mark Horninger, Chris Adams
177 TechnoSecurity's Guide to E-Discovery and Digital Forensics Jack Wiles
178 InfoSecurity 2008 Threat Analysis Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg
179 The Best Damn IT Security Management Book Period Susan Snedaker, Robert McCrie, Karim Vellani
180 The Best Damn Cybercrime and Digital Forensics Book Period Jack Wiles, Anthony Reyes
181 How to Cheat at Deploying and Securing RFID Frank Thornton, Paul Sanghera
182 How to Cheat at Securing Your Network Ido Dubrawsky
183 Reverse Engineering Code with IDA Pro Chris Paget, Walter Pearce, Damon Cortesi
184 Managing Catastrophic Loss of Sensitive Data Constantine Photopoulos
185 OSSEC Host-Based Intrusion Detection Guide Rory Bray, Daniel Cid, Andrew Hay
186 Nmap in the Enterprise Angela Orebaugh, Becky Pinkard
187 Microsoft Forefront Security Administration Guide Jesse Varsalone
188 Check Point NGX R65 Security Administration Ralph Bonnell
189 OS X Exploits and Defense David Harley
190 Secrets Stolen, Fortunes Lost Christopher Burgess, Richard Power
191 The IT Digital Legal Companion Gene K. Landy, Amy J. Mastrobattista
192 Netcat Power Tools Giovanni Giacobbi
193 The IT Regulatory and Standards Compliance Handbook: Craig S. Wright
194 Nagios 3 Enterprise Network Monitoring Max Schubert, Derrick Bennett, Andreas Ericsson
195 Malware Forensics Cameron H. Malin, Eoghan Casey, James M. Aquilina
196 The Best Damn Windows Server 2008 Book Period Anthony Piltzecker, Susan Snedaker
197 Integrating ISA Server 2006 with Microsoft Exchange 2007 Fergus Strachan
198 Scene of the Cybercrime Debra Littlejohn Shinder, Michael Cross
199 Programming Lego Mindstorms NXT Owen Bishop
200 Securing Windows Server 2008 Aaron Tiensivu
201 Securing Citrix Presentation Server in the Enterprise Tariq Azad
202 Techno Security's Guide to Securing SCADA Jack Wiles
203 Effective Prototyping with Excel Jonathan Arnowitz, Michael Arent, Nevin Berger, Fred Sampson
204 Probabilistic Methods for Bioinformatics Richard E Neapolitan, Xia Jiang
205 Building Intelligent Interactive Tutors Beverly Park Woolf
206 Technical, Commercial and Regulatory Challenges of QoS XiPeng Xiao
207 Business Modeling David M. Bridgeland, Ron Zahavi
208 Partial-Update Adaptive Signal Processing Kutluyil Dogancay
209 P2P Networking and Applications John Buford, Heather Yu, Eng Keong Lua
210 Master Data Management David Loshin
211 Web Application Design Patterns Pawan Vora
212 Three-dimensional Integrated Circuit Design Vasilis F. Pavlidis, Eby G. Friedman
213 Computer and Information Security Handbook John R. Vacca
214 Broadband Cable Access Networks David Large, James Farmer
215 Networked Graphics Steed, Anthony
216 Low-Power Design of Nanometer FPGAs Mohab Anis, Hassan Hassan
217 Building the Agile Enterprise Cummins, Fred
218 Deploying QoS for Cisco IP and Next Generation Networks Vinod Joseph, Tony Jeffress, Brett Chapman
219 Disappearing Cryptography Peter Wayner
220 Why Programs Fail Andreas Zeller
221 TCP/IP Sockets in C Michael J. Donahoo, Kenneth L. Calvert
222 The Illustrated Network Walter Goralski
223 Database Archiving Jack E. Olson
224 Joe Celko's Data, Measurements and Standards in SQL Celko, Joe
225 Relational Database Design and Implementation Harrington, Jan
226 Handbook of Global User Research Schumacher, Robert
227 How to Build a Digital Library Witten, Ian
228 SOA and Web Services Interface Design Bean, James
229 Mobile Technology for Children Druin, Allison
230 Geometric Algebra for Computer Science (Revised Edition) Dorst, Leo
231 Developing Virtual Reality Applications Craig, Alan
232 Principles of Computer System Design Saltzer, Jerome
233 Semiconductors and the Information Revolution Orton, John
234 RF and Digital Signal Processing for Software-Defined Radio Tony J. Rouphael
235 Embedded Linux Development Using Eclipse Doug Abbott
236 Principles of Transaction Processing Philip A. Bernstein, Eric Newcomer
237 Forms that Work Caroline Jarrett, Gerry Gaffney
238 Next Generation SSH2 Implementation Justin Peltier
239 SAP Security Configuration and Deployment Joey Hirao
240 GFI Network Security and PCI Compliance Power Tools Brien Posey
241 Nokia Firewall, VPN, and IPSO Configuration Guide Andrew Hay, Keli Hay, Peter Giannoulis
242 E-discovery: Creating and Managing an Enterprisewide Program Karen A. Schuler
243 Mobile Malware Attacks and Defense Ken Dunham
244 Virtualization for Security John Hoopes
245 Cisco Router and Switch Forensics Liu, Dale
246 SQL Injection Attacks and Defense Clarke, Justin
247 Professional Penetration Testing Wilhelm, Thomas
248 Eleventh Hour Security+ Dubrawsky, Ido
249 Eleventh Hour Network+ Alpern, Naomi
250 Bebop to the Boolean Boogie Clive Maxfield
251 The Practitioner's Guide to Data Quality Improvement Loshin, David
252 Optical Networks Ramaswami, Rajiv
253 Handbook of Digital Forensics and Investigation Casey, Eoghan
254 Electronic Design Automation Wang, Laung-Terng
255 Beyond the Usability Lab Albert, William
256 Smart Things: Ubiquitous Computing User Experience Design Kuniavsky, Mike
257 Information Systems Transformation Ulrich, William
258 Design to Thrive Howard, Tharon
259 Designing with the Mind in Mind Johnson, Jeff
260 Managing Time in Relational Databases Johnston, Tom
261 Physically Based Rendering Pharr, Matt
262 Usability Testing Essentials Barnum, Carol
263 Light and Skin Interactions Baranoski, Gladimir
264 User Experience Re-Mastered Wilson, Chauncey
265 Interconnecting Smart Objects with IP Vasseur, Jean-Philippe
266 Making Enterprise Information Management (EIM) Work for Business Ladley, John
267 SQL Clearly Explained Harrington, Jan
268 Thoughts on Interaction Design Kolko, Jon
269 ON THE DEVELOPMENT OF CHINA ’S INFORMATION TECHNOLOGY INDUSTRY Jiang, Zemin
270 System Assurance Mansourov, Nikolai
271 The Essential Persona Lifecycle: Your Guide to Building and Using Personas Adlin, Tamara
272 Understanding Motion Capture for Computer Animation Menache, Alberto
273 Agile Development and Business Goals Holtsnider, Bill
274 No Code Required Cypher, Allen
275 Entity Resolution and Information Quality Talburt, John
276 Joe Celko's SQL for Smarties Celko, Joe
277 Analyzing Social Media Networks with Microsoft NodeXL Hansen, Derek
278 Cyber Attacks Amoroso, Edward
279 Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit Liu, Dale
280 Microsoft Virtualization Olzak, Thomas
281 A Guide to Kernel Exploitation Perla, Enrico
282 Eleventh Hour Linux+ Speake, Graham
283 PCI Compliance Chuvakin, Anton
284 Digital Forensics for Network, Internet, and Cloud Computing Garrison, Clint
285 Seven Deadliest Wireless Technologies Attacks Haines, Brad
286 Seven Deadliest Web Application Attacks Shema, Mike
287 Seven Deadliest Social Network Attacks Timm, Carl
288 Seven Deadliest Unified Communications Attacks York, Dan
289 Seven Deadliest Network Attacks Prowell, Stacy
290 Seven Deadliest Microsoft Attacks Kraus, Rob
291 Seven Deadliest USB Attacks Anderson, Brian
292 Virtualization and Forensics Barrett, Diane
293 Microsoft Windows 7 Administrator's Reference Orchilles, Jorge
294 CISSP Study Guide Conrad, Eric
295 Eleventh Hour CISSP Conrad, Eric
296 Dissecting the Hack: The F0rb1dd3n Network, Revised Edition Street, Jayson
297 Securing the Smart Grid Flick, Tony
298 Managed Code Rootkits Metula, Erez
299 Microsoft Windows Server 2008 R2 Administrator's Reference Hannifin, Dustin
300 Citrix XenDesktop Implementation.. James, Gareth R.
301 Ninja Hacking Wilhelm, Thomas
302 Security for Microsoft Windows System Administrators Rountree, Derrick
303 Digital Video Surveillance and Security Caputo, Anthony
304 Metrics and Methods for Security Risk Management Young, Carl
305 Heuristic Search Edelkamp, Stefan
306 Architecture of Network Systems Serpanos, Dimitrios
307 Data Mining: Practical Machine Learning Tools and Techniques Witten, Ian
308 Developing High Quality Data Models West, Matthew
309 Global UX Sherman, Paul
310 Thoughts on Interaction Design Kolko, Jon
311 Data Mining Han, Jiawei
312 Effective Security Management Sennewald, Charles
313 Database Modeling and Design Teorey, Toby
314 Electronic Access Control Little, Karen
315 Pervasive Information Architecture Resmini, Andrea
316 Brave NUI World Wigdor, Dennis
317 Private Cloud Computing Smoot, Stephen
318 Deploying Next Generation Multicast-enabled Applications Joseph, Vinod
319 GPU Computing Gems Emerald Edition  
320 API Design for C++ Reddy, Martin
321 Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children Betz, Charles
322 Data Architecture Tupper, Charles
323 A Practical Guide to SysML Friedenthal, Sanford
324 3C Vision Levialdi
325 Design Research through Practice Koskinen, Ilpo
326 Systems Thinking Gharajedaghi, Jamshid
327 GPU Computing Gems Jade Edition  
328 Semantic Web for the Working Ontologist Allemang, Dean
329 Private Security and the Law Nemeth, Charles
330 OCEB Certification Guide Weilkiens, Tim
331 Heterogeneous Computing with OpenCL Gaster, Benedict
332 CUDA Application Design and Development Farber, Rob
333 Thor's Microsoft Security Bible Mullen, Timothy
334 Securing the Cloud Winkler, J.R. ("Vic")
335 Web Application Obfuscation Heiderich, Mario
336 Security Risk Management Wheeler, Evan
337 Securing SQL Server Cherry, Denny
338 Digital Forensics for Legal Professionals Daniel, Larry
339 Industrial Network Security Knapp, Eric
340 Migrating to the Cloud Laszewski, Tom
341 The Basics of Information Security Andress, Jason
342 The Basics of Hacking and Penetration Testing Engebretson, Patrick
343 iPhone and iOS Forensics Hoog, Andrew
344 Low Tech Hacking Wiles, Jack
345 Moving To The Cloud Dinkar, Sitaram
346 Coding for Penetration Testers Andress, Jason
347 Information Visualization Ware, Colin
348 Sketching User Experiences: The Workbook Greenberg, Saul
349 Risk Analysis and the Security Survey Broder, James F.
350 Tcl/Tk Flynt, Clif
351 Observing the User Experience Kuniavsky, Mike
352 Quantifying the User Experience Sauro, Jeff
353 Writing Effective Business Rules Witt, Graham
354 It's Our Research Sharon, Tomer
355 User Experience Management Lund, Arnie
356 Business Intelligence Loshin, David
357 Letting Go of the Words Redish, Janice (Ginny)
358 Grounded Innovation Holmquist, Lars Erik
359 Design for Emotion van Gorp, Trevor
360 Joe Celko's Trees and Hierarchies in SQL for Smarties Celko, Joe
361 Data Insights Whitney, Hunter
362 User Experience in the Age of Sustainability Kramer, Kem-Laurin
363 Intersection Guenther, Milan
364 Usability in Government Systems Buie, Elizabeth
365 Content Strategy at Work Bloomstein, Margot
366 Digital Video and HD Poynton, Charles
367 Data Virtualization for Business Intelligence Systems van der Lans, Rick
368 Agile Data Warehousing Project Management Hughes, Ralph
369 Designing the Search Experience Russell-Rose, Tony
370 Temporal QOS Management in Scientific Cloud Workflow Systems Liu, Xiao
371 Security Consulting Sennewald, Charles
372 Synchronous Precharge Logic Smoszna, Marek
373 The Basics of Cyber Warfare Winterfeld, Steve
374 Federated Identity Primer Rountree, Derrick
375 Introduction to Data Compression Sayood, Khalid
376 Homeland Security Bullock, Jane
377 Using Open Source Platforms for Business Intelligence Wise, Lyndsay
378 Handbook on Securing Cyber-Physical Critical Infrastructure Das, Sajal
379 Data Governance Ladley, John
380 Computer Animation Parent, Rick
381 Effective Physical Security Fennelly, Lawrence
382 CUDA Programming Cook, Shane
383 Collaborative Enterprise Architecture Bente, Stefan
384 IT Manager's Handbook Holtsnider, Bill
385 Agile User Experience Design Brown, Diana
386 Structured Parallel Programming McCool, Michael
387 Cargo Theft, Loss Prevention, and Supply Chain Security Burges, Dan
388 Principles of Data Integration Halevy, Alon
389 Malware Forensic Field Guide for Windows Systems Malin, Cameron
390 Client-Side Attacks and Defense Oriyano, Sean-Philip
391 Logging and Log Management Chuvakin, Anton
392 FISMA and the Risk Management Framework Gantz, Stephen
393 Wireless Reconnaissance in Penetration Testing Neely, Matthew
394 Augmented Reality Kipper, Greg
395 Information Security Risk Assessment Toolkit Talabis, Mark
396 Federal Cloud Computing Metheny, Matthew
397 Blackhatonomics Gragido, Will
398 Data Hiding Raggo, Michael
399 UTM Security with Fortinet Tam, Kenneth
400 Securing SQL Server Cherry, Denny
401 PCI Compliance Chuvakin, Anton
402 Advanced Persistent Threat Cole, Eric
403 The Hacker's Guide to OS X Ghassemlouei, Alijohn
404 Hacking Web Apps Shema, Mike
405 Violent Python O'Connor, TJ
406 CISSP Study Guide Conrad, Eric
407 Network Intrusion Analysis Fichera, Joe
408 SQL Injection Attacks and Defense Clarke, Justin
409 Keys to the Kingdom Ollam, Deviant
410 Practical Lock Picking Ollam, Deviant
411 Beyond CISSP Wheeler, Evan
412 Customer Interviewing Alvarez, Cindy
413 Cyber Security and IT Infrastructure Protection Vacca, John
414 Going Parallel with C++ Hummel, Joe
415 Insights in Computer Science 1 Doe, John
416 Insights in Computer Science 2 Doe, John
417 Managing Information Security Vacca, John
418 Network and System Security Vacca, John
419 Programming with CUDA and OpenACC Farber, Rob
420 UI Inspection Methods TBD
421 Computer and Information Security Handbook Vacca, John
422 Learning Processing Shiffman, Daniel
423 Writing for Interaction Newman Lior, Linda
424 Data Modeling Essentials Simsion, Graeme
425 UI is Communication McKay, Everett
426 Measuring Data Quality for Ongoing Improvement Sebastian-Coleman, Laura
427 Managing Data in Motion Reeve, April
428 Social Data Analytics Rogers, Shawn
429 Network Convergence Joseph, Vinod
430 Web Services, Service-Oriented Architectures, and Cloud Computing Barry, Douglas K.
431 Visual Usability Levinson, Deborah
432 Application Administrators Handbook Bourne, Kelly
433 Implementing Analytics Sheikh, Nauman
434 Principles of Big Data Berman, Jules
435 Combinatorial Topology and Distributed Computing Herlihy, Maurice
436 Practical Web Analytics for User Experience Beasley, Michael
437 Cloud Computing Marinescu, Dan
438 Moderating One-on-One User Research Tedesco, Donna
439 DIGITAL OUTCASTS Smith, Kel
440 Hacking the Scene Cohen, Tyler
441 Enterprise Data Services Sarkar, Pushpak
442 Analyzing the Social Web Golbeck, Jennifer
443 Total Information Risk Management Borek, Alexander
444 Human-Computer Interaction MacKenzie, I. Scott
445 FISMA Compliance Handbook Taylor, Laura
446 A Practical Guide to Business Analytics Fitzgerald, Jaime
447 Data Warehousing in the Age of Big Data Krishnan, Krish
448 Heterogeneous Computing with OpenCL Gaster, Benedict
449 The Basics of Cloud Computing Rountree, Derrick
450 Brainstorming and Beyond Wilson, Chauncey
451 Joe Celko’s Complete Guide to NoSQL Celko, Joe
452 The Digital Crown Leibtag, Ahava
453 High Performance Deformable Image Registration Algorithms for Manycore Processors Shackleford, James
454 Penetration Testing with Backtrack 5 Broad, James
455 Computation and Storage in the Cloud Yuan, Dong
456 Software Engineering Schmidt, Richard
457 Agile Software Architect Babar, Muhammad Ali
458 Enterprise Application Administration Faircloth, Jeremy
459 Introduction to Cyber-Warfare Shakarian, Paulo
460 Investigating Internet Crimes Shipley, Todd
461 Accelerating Matlab with GPU Suh, Jung
462 Mobile User Experience Archetypes Mendoza, Adrian
463 Assessing Vendors More, Josh
464 User Interface Inspection Methods Wilson, Chauncey
465 Credible Checklists and Quality Questionnaires Wilson, Chauncey
466 Interview Techniques for UX Practitioners Wilson, Chauncey
467 Practical Anonymity Loshin, Pete
468 The Wireshark Field Guide Shimonski, Robert
469 Intel Xeon Phi Coprocessor High Performance Programming Jeffers, Jim
470 Thor's OS Xodus Mullen, Timothy "Thor"
471 Business Continuity and Disaster Recovery Planning for IT Professionals Snedaker, Susan
472 Analytical Approaches for Customer Centricity Loshin, David
473 Using Information to Develop a Culture of Customer Centricity Loshin, David
474 Mastering Cloud Computing Buyya, Rajkumar
475 The Case for the Top Data Job Aiken, Peter
476 Emerging Trends in ICT Security Akhgar, Babak
477 Mastering Private Cloud with Windows Server 2012 Chou, Yung
478 Simple Steps to Data Encryption: Loshin, Pete
479 Measuring the User Experience Tullis, Thomas
480 Visualization in Medicine Preim, Bernhard
481 Understanding Augmented Reality Craig, Alan B.
482 Malware Forensics Field Guide for Linux Systems Malin, Cameron
483 When Botnets Attack Zachry, Josh
484 Digital Forensics Processing and Procedures Watson, David
485 Windows 2012 Server Network Security Rountree, Derrick
486 IT Audit Tuuri, Dan
487 Hacking .NET Simon, Robert
488 Windows Server 2012 Security from End to Edge and Beyond Shinder, Thomas W
489 Social Media Security Etue, David
490 Professional Penetration Testing Wilhelm, Thomas
491 Risk Management Framework Broad, James
492 Computer Incident Response and Forensics Team Management Johnson, Leighton
493 Applied Cyber Security and the Smart Grid Knapp, Eric
494 Time Frequency Analysis Boualem Boashash
495 Network Simulation Experiments Manual Emad Aboelela
496 XML in Data Management: Understanding and Applying Them Together Peter Aiken, M. David Allen
497 QuickTime Toolkit Volume One: Basic Movie Playback and Media Types Tim Monroe
498 QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types Tim Monroe
499 GMPLS: Architecture and Applications Adrian Farrel, Igor Bryskin
500 Face Processing: Advanced Modeling and Methods Wenyi Zhao, Rama Chellappa
501 Proceedings 2004 VLDB Conference: The 30th International Conference on Very Large Databases (VLDB) VLDB
502 Network Processor Design: Issues and Practices, Volume 3 Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
503 Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices George Varghese
504 Complete Maya Programming Volume II: An In-depth Guide to 3D Fundamentals, Geometry, and Modeling David Gould
505 An Introduction to Programming with IDL Kenneth Bowman
506 Smart Phone and Next Generation Mobile Computing Pei Zheng, Lionel Ni
507 MEL Scripting for Maya Animators Mark R. Wilkins, Chris Kazmier
508 Joe Celko's SQL Programming Style Joe Celko
509 Data Model Patterns: A Metadata Map David C. Hay
510 Moving Objects Databases Ralf Hartmut Güting, Markus Schneider
511 Cost-Justifying Usability: An Update for the Internet Age Randolph G. Bias, Deborah J. Mayhew
512 Practical Time-Frequency Analysis Rene Carmona, WenLiang Hwang, Bruno Torresani
513 Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper
514 C# 2.0: Practical Guide for Programmers Michel de Champlain, Brian G. Patrick
515 Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration Earl Cox
516 Network Processor Design: Issues and Practices, Volume 2 Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
517 Multiscale Wavelet Methods for Partial Differential Equations Wolfgang Dahmen, Andrew Kurdila, Peter Oswald
518 Machine Vision: Theory, Algorithms, Practicalities E. R. Davies
519 SQL: Practical Guide for Developers Michael J. Donahoo, Gregory D. Speegle
520 Mac OSX Developer Guide Jesse Feiler
521 Time-Frequency/Time-Scale Analysis Patrick Flandrin
522 Visual Effects in A Digital World: A Comprehensive Glossary of over 7000 Visual Effects Terms Karen Goulekas
523 Network Security: A Practical Approach Jan L. Harrington
524 Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design Karen Holtzblatt, Jessamyn Burns Wendell, Shelley Wood
525 Joe Celko's SQL for Smarties: Advanced SQL Programming Joe Celko
526 Commonsense Reasoning Erik T. Mueller
527 Spine Technology Handbook Steven M. Kurtz, Avram Edidin
528 Globus® Toolkit 4: Programming Java Services Borja Sotomayor, Lisa Childers
529 Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G Luis M. Correia
530 Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control Giorgio Franceschetti, Sabatino Stornelli
531 Programming with Quartz: 2D and PDF Graphics in Mac OS X David Gelphman, Bunny Laden
532 Joe Celko's Analytics and OLAP in SQL Joe Celko
533 Networks on Chips: Technology and Tools Giovanni De Micheli, Luca Benini, Luca Benini
534 VLSI Test Principles and Architectures: Design for Testability Laung-Terng Wang, Cheng-Wen Wu, Xiaoqing Wen
535 Designing SOCs with Configured Cores: Unleashing the Tensilica Xtensa and Diamond Cores Steve Leibson
536 Multiprocessor Systems-on-Chips Ahmed Jerraya, Wayne Wolf
537 Communication Networking: An Analytical Approach Anurag Kumar, D. Manjunath, Joy Kuri
538 VHDL: Coding and Logic Synthesis with SYNOPSYS Weng Fook Lee
539 Fuzzy Theory Systems Cornelius Leondes
540 Knowledge-Based Systems Cornelius Leondes
541 Expert Systems Cornelius Leondes
542 Database and Data Communication Network Systems Cornelius Leondes
543 Enterprise Knowledge Management: The Data Quality Approach David Loshin
544 TCP/IP Sockets in C#: Practical Guide for Programmers David Makofske, Michael J. Donahoo, Kenneth L. Calvert
545 ASIC and FPGA Verification: A Guide to Component Modeling Richard Munden
546 Physically Based Rendering: From Theory to Implementation Matt Pharr, Greg Humphreys
547 Routing, Flow, and Capacity Design in Communication and Computer Networks Michal Pióro, Deepankar Medhi
548 The Persona Lifecycle: Keeping People in Mind Throughout Product Design John Pruitt, Tamara Adlin
549 High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec
550 Nonlinear Computer Modeling of Chemical and Biochemical Data James Rusling / Thomas Kumosinski
551 Introduction to Data Compression Sayood
552 JSTL: Practical Guide for JSP Programmers Sue Spielman
553 Multirate and Wavelet Signal Processing Bruce Suter
554 Database Modeling and Design: Logical Design Toby J. Teorey, Sam S. Lightstone, Tom Nadeau
555 Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
556 Proceedings 2003 VLDB Conference: 29th International Conference on Very Large Databases (VLDB) VLDB
557 Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers David Wall
558 Grid Computing Pawel Plaszczak, Richard Wellner, Jr.
559 Java Cryptography Extensions: Practical Guide for Programmers Jason Weiss
560 QuickTime for .NET and COM Developers John Cromie
561 Signal and Image Representation in Combined Spaces Yehoshua Zeevi, Ronald Coifman
562 Chaos and Fractals C.A. Pickover
563 Neuromimetic Semantics Harry Howard
564 SDL '99: The Next Millennium R. Dssouli/G.V. Bochmann/Y. Lahav
565 Kohonen Maps Oja, E. / Kaski, S.
566 Charging Communication Networks D.J. Songhurst
567 A Computational Framework for Segmentation and Grouping Medioni, G. / Lee, Mi-Suen / Tang, Chi-Keung
568 CAFE: An Industrial-Strength Algebraic Formal Method Futatsugi, K. / Nakagawa, A.T. / Tamai, T.
569 Parallel Computational Fluid Dynamics 2001: Practice and Theory P. Wilders, A. Ecer, J. Periaux, N. Satofuka, P. Fox
570 Parallel Computational Fluid Dynamics 2000: Trends and Applications C.B. Jenssen, T. Kvamdal, H.I. Andersson, B. Pettersen, A. Ecer, J. Periaux, N. Satofuka, P. Fox
571 Parallel Computational Fluid Dynamics 2002: New Frontiers and Multi-Disciplinary Applications K. Matsuno, A. Ecer, P Fox, J. Periaux, N. Satofuka
572 Handbook of Automated Reasoning Alan Robinson / Andrei Voronkov
573 Handbook of Computer Aided Geometric Design G. Farin / J. Hoschek / M.-S. Kim
574 Intelligent Systems for Information Processing B. Bouchon-Meunier / L. Foulloy / R.R. Yager
575 Handbook of Temporal Reasoning in Artificial Intelligence Michael Fisher, Dov M. Gabbav, Lluis Vila
576 Parallel Computational Fluid Dynamics 2003: Advanced Numerical Methods, Software and Applications Boris Chetverushkin, A. Ecer, Jacques Periaux, N. Satofuka
577 Parallel Computing: Software Technology, Algorithms, Architectures & Applications Gerhard Joubert, Wolfgang Nagel, Frans Peters, Wolfgang Walter
578 Fuzzy Logic and the Semantic Web Elie Sanchez
579 Grid Computing: The New Frontier of High Performance Computing Lucio Grandinetti
580 Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications Gabriel Winter, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox
581 Reaction-Diffusion Computers Andrew Adamatzky/Benjamin De Lacy Costello/Tetsuya Asai
582 Modern Information Processing Bernadette Bouchon-Meunier / Giulianella Coletti / Ronald Yager
583 Handbook of Constraint Programming Francesca Rossi, Peter van Beek, Toby Walsh
584 The Economics of Open Source Software Development Jürgen Bitzer / Philipp Schröder
585 Recent Research Towards Advanced Man-Machine Interface Through Spoken Language H. Fujisaki
586 Principles of Logic and Logic Programming G. Metakides, A. Nerode
587 Symbiosis of Human and Artifact Yuichiro Anzai, Katsuhiko Ogawa, Hirohiko Mori
588 Handbook of Human-Computer Interaction Helander, M.G. / Landauer, T.K. / Prabhu, P.V.
589 Parallel Computational Fluid Dynamics 1993: New Trends and Advances Akin Ecer, J. Hauser, P. Leca, J. Periaux
590 Algorithms and Parallel VLSI Architectures III M. Moonen / F. Catthoor
591 SVD and Signal Processing III Marc Moonen, Bart De Moor
592 High Performance Computing: Technology, Methods and Applications Dongarra, J.J.
593 Problem Solving: Methods, Programming and Future Concepts O.V. German, D.V. Ofitserov
594 Intelligent Robots and Systems Volker Graefe
595 Time-Varying Image Processing and Moving Object Recognition, 4 V. Cappellini
596 Parallel Computational Fluid Dynamics 1995: Implementations and Results Using Parallel Computers A. Ecer, J. Periaux, N. Satofuka, S. Taylor
597 Parallel Computational Fluid Dynamics 1996: Algorithms and Results Using Advanced Computers P. Schiano, A. Ecer, J. Periaux, N. Satofuka
598 Intelligent Environments Droege, P.
599 Statistical Optimization for Geometric Computation: Theory and Practice K. Kanatani
600 Parallel Processing for Artificial Intelligence 3 J. Geller, H. Kitano, C.B. Suttner
601 Proceedings IWISP '96 B.G. Mertzios, P. Liatsis
602 SDL '97: Time for Testing A. Cavalli/A. Sarma
603 Handbook of Process Algebra J.A. Bergstra / A. Ponse / S.A. Smolka
604 Parallel Computational Fluid Dynamics 1997: Recent Developments and Advances Using Parallel Computers D. Emerson, A. Ecer, P. Fox, J. Periaux, N. Satofuka
605 Parallel Computational Fluid Dynamics 1998: Development and Applications of Parallel Technology C.A. Lin, A. Ecer, J. Periaux, N. Satofuka, P. Fox
606 Parallel Computational Fluid Dynamics 1999: Towards Teraflops, Optimization and Novel Formulations D. Keyes, A. Ecer, J. Periaux, N. Satofuka, P. Fox
607 Parallel Computing: Fundamentals, Applications and New Directions D'Hollander, E.H.
608 Topological Algorithms for Digital Image Processing T. Yung Kong, Azriel Rosenfeld
609 Sewers: Replacement and New Construction Geoffrey F Read
610 Newnes Data Communications Pocket Book Steve Winder, Mike Tooley
611 Newnes Radio and RF Engineering Pocket Book Steve Winder, Joseph Carr
612 Applying UML: Advanced Applications Rob Pooley, Pauline Wilcox
613 Newnes PC Troubleshooting Pocket Book Howard Anderson, Mike Tooley
614 Software Design Methodology: From Principles to Architectural Styles Hong Zhu
615 Introduction to Web Matrix: ASP.NET Development for Beginners Colin Hardy, Simon Stobart
616 Object-Oriented Design with UML and Java Kenneth Barclay, John Savage
617 A Student Guide to Object-Oriented Development Carol Britton, Jill Doake
618 Student's Essential Guide to .NET Tony Grimer
619 Value Creation from E-Business Models Wendy Currie
620 Fundamental Data Compression Ida Mengyi Pu
621 Strategies for Growth in SMEs: The Role of Information and Information Sytems Margi Levy, Philip Powell
622 Understanding Mobile Human-Computer Interaction Steve Love
623 Real-Time Systems Development Rob Williams
624 Advanced Systems Design with Java, UML and MDA Kevin Lano
625 Ultra Wideband Systems: Technologies and Applications Roberto Aiello, Ph.D., Anuj Batra, Ph.D.
626 Digital Signal Processing System-Level Design Using LabVIEW Nasser Kehtarnavaz, Namjin Kim
627 High-Technology Crime Investigator’s Handbook Gerald L. Kovacich, Andy Jones
628 Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking Doron Drusinsky
629 Embedded Software: The Works Colin Walls
630 Voice Over IPv6: Architectures for Next Generation VoIP Networks Daniel Minoli
631 OpenVMS Alpha Internals and Data Structures: Memory Management Ruth Goldenberg
632 High Performance Data Network Design: Design Techniques and Tools Tony Kenyon
633 Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management Barry de Ville
634 OpenVMS System Management Guide Lawrence Baldwin, Steve Hoffman, David Miller
635 Networking Explained Michael Gallo, William M. Hancock, PhD, CISSP, CI
636 Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle Charles Breakfield, Roxanne Burkey
637 TruCluster Server Handbook Scott Fafrak, Jim Lola, Dennis O'Brien, Gregory Yates, Brad Nichols
638 Computer Systems Performance Evaluation and Prediction Paul Fortier, Howard Michel
639 CRM: Redefining Customer Relationship Management Jeffrey Peel
640 OpenVMS with Apache, WASD, and OSU: The Nonstop Webserver Alan Winston
641 Understanding WMI Scripting: Exploiting Microsoft's Windows Management Instrumentation in Mission-Critical Computing Infrastructures Alain Lissoir
642 Linux and OpenVMS Interoperability: Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems John Robert Wisniewski
643 Data Networks: Routing, Security, and Performance Optimization Tony Kenyon
644 Linux and the Unix Philosophy Mike Gancarz
645 Tru64 UNIX Troubleshooting: Diagnosing and Correcting System Problems Martin Moore, Steven Hancock
646 UNIX for OpenVMS Users Philip Bourne, Richard Holstein, Joseph McMullen
647 Call Center Operation: Design, Operation, and Maintenance Duane Sharp
648 Getting Started with OpenVMS: A Guide for New Users Michael D Duffy
649 Corporate Portals Empowered with XML and Web Services Anura Guruge
650 Getting Started with OpenVMS System Management David Miller
651 Web Services: Theory and Practice Anura Guruge
652 Windows Server 2003 Security Infrastructures: Core Security Features Jan De Clercq
653 Microsoft Outlook Programming: Jumpstart for Administrators, Developers, and Power Users Sue Mosher
654 RAPID Value Management for the Business Cost of Ownership: Readiness, Architecture, Process, Integration, Deployment Andrew Wigodsky
655 Socially Responsible IT Management Michael Erbschloe
656 Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers Jerry Cochran
657 Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices William Wheeler
658 Firewalls: Jumpstart for Network and Systems Administrators John R. Vacca, Scott Ellis
659 Internet Security: A Jumpstart for Systems Administrators and IT Managers Tim Speed, Juanita Ellis
660 Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems Alain Lissoir
661 Microsoft SharePoint Technologies: Planning, Design and Implementation Kevin Laahs, Emer McKenna, Veli-Matti Vanamo
662 Monitoring and Managing Microsoft Exchange Server 2003 Mike Daugherty
663 Cybersecurity Operations Handbook John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CI
664 Debugging by Thinking: A Multidisciplinary Approach Robert Charles Metzger
665 Resilient Storage Networks: Designing Flexible Scalable Data Infrastructures Greg Schulz
666 Implementing Homeland Security for Enterprise IT Michael Erbschloe
667 Managing Software Deliverables: A Software Development Management Methodology John Rittinghouse, PhD, CISM
668 HP NonStop Server Security: A Practical Handbook XYPRO Technology Corp
669 Network programming in .NET: C# & Visual Basic .NET Fiach Reid
670 Microsoft® Exchange Server 2003 Deployment and Migration Kieran McCorry
671 Wireless Operational Security John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP
672 IPv6 Network Programming Jun-ichiro itojun Hagino
673 Open Source Software: Implementation and Management Paul Kavanagh
674 Oracle 10g RAC Grid, Services & Clustering Murali Vallath
675 Oracle 10g Data Warehousing Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith
676 Oracle SQL: Jumpstart with Examples Gavin JT Powell, Carol McCullough-Dieter
677 Physical Security for IT Michael Erbschloe
678 Deploying LINUX on the Desktop Edward Haletky
679 Oracle Database Programming using Java and Web Services Kuassi Mensah
680 Tony Redmond's Microsoft Exchange Server 2003: with SP1 Tony Redmond
681 Voice over Internet Protocol (VoIP) Security James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM
682 Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions René J. Chevance
683 Implementing Database Security and Auditing Ron Ben Natan
684 Oracle Data Warehouse Tuning for 10g Gavin JT Powell
685 Managing Microsoft's Remote Installation Services Soren Rasmussen, Michael Iversen
686 IM Instant Messaging Security John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP
687 Business Continuity and Disaster Recovery for InfoSec Managers John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP
688 Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL XYPRO Technology Corp
689 Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 Kieran McCorry
690 Understanding Virtual Reality: Interface, Application, and Design William R. Sherman, Alan Craig
691 Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling Ron Goldman
692 Subdivision Methods for Geometric Design: A Constructive Approac Joe Warren, Henrik Weimer
693 SQL: 1999 - Understanding Relational Language Components Jim Melton, Alan R. Simon
694 Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery Gerhard Weikum, Gottfried Vossen
695 Telecommunications Law in the Internet Age Sharon K. Black
696 Computer Animation: Algorithms and Techniques Richard Parent
697 Spatial Databases: With Application to GIS Philippe Rigaux, Michel Scholl, Agnès Voisard
698 Geometric Tools for Computer Graphics Philip Schneider, David H. Eberly
699 Swarm Intelligence Russell C. Eberhart, Yuhui Shi, James Kennedy
700 Internet QoS: Architectures and Mechanisms for Quality of Service Zheng Wang
701 Skew-Tolerant Circuit Design David Harris
702 Illustrating Evolutionary Computation with Mathematica Christian Jacob
703 Object-Oriented Reengineering Patterns Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz
704 Component Database Systems Klaus R. Dittrich, Andreas Geppert
705 Persuasive Technology: Using Computers to Change What We Think and Do B.J. Fogg
706 Distributed Systems Architecture: A Middleware Approach Arno Puder, Kay Römer, Frank Pilhofer
707 Readings in Multimedia Computing and Networking Kevin Jeffay, Hong Jiang Zhang
708 Business Modeling and Data Mining Dorian Pyle
709 Optical Networks: A Practical Perspective Rajiv Ramaswami, Kumar Sivarajan
710 Usability for the Web: Designing Web Sites that Work Tom Brinck, Darren Gergle, Scott D. Wood
711 Advanced Graphics Programming Using OpenGL Tom McReynolds, David Blythe
712 An Introduction to NURBS: With Historical Perspective David F. Rogers
713 Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design Terry Halpin
714 Creative Evolutionary Systems David W. Corne, Peter J. Bentley
715 The Designer's Guide to VHDL Peter J. Ashenden
716 Advanced SQL:1999: Understanding Object-Relational and Other Advanced Features Jim Melton
717 Data Warehousing: Using the Wal-Mart Model Paul Westerman
718 TCP/IP Sockets in Java: Practical Guide for Programmers Kenneth L. Calvert, Michael J. Donahoo
719 Object-Oriented Construction Handbook: Developing Application-Oriented Software with the Tools & Materials Approach Heinz Züllighoven
720 Your Wish is My Command: Programming By Example Henry Lieberman
721 Practical IDL Programming Liam E. Gumley
722 Higher-Order Perl: Transforming Programs with Programs Mark Jason Dominus
723 Readings in Hardware/Software Co-Design Giovanni De Micheli, Rolf Ernst, Wayne Wolf
724 Querying XML: XQuery, XPath, and SQL/XML in context Jim Melton, Stephen Buxton
725 Usability Engineering: Scenario-Based Development of Human-Computer Interaction Mary Beth Rosson, John M. Carroll
726 Data Warehousing And Business Intelligence For e-Commerce Alan R. Simon, Steven L. Shaffer
727 Digital Watermarking Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller
728 Foundations of Genetic Algorithms 2001 (FOGA 6) William Spears, Worthy N. Martin, Worth Martin
729 JDBC: Practical Guide for Java Programmers Gregory D. Speegle
730 Curves and Surfaces for CAGD: A Practical Guide Gerald Farin
731 System Architecture with XML Berthold Daum, Udo Merten
732 Interactive QuickTime: Authoring Wired Media Matthew R. Peterson
733 The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling Peter J. Ashenden, Gregory D. Peterson, Darrell A. Teegarden
734 MPLS Network Management: MIBs, Tools, and Techniques Thomas D. Nadeau
735 Web Application Design Handbook: Best Practices for Web-Based Software Susan Fowler, Victor Stanwick
736 Database Tuning: Principles, Experiments, and Troubleshooting Techniques Dennis Shasha, Philippe Bonnet
737 Mining the Web: Discovering Knowledge from Hypertext Data Soumen Chakrabarti
738 Design Methods for Reactive Systems: Yourdon, Statemate, and the UML R. J. Wieringa
739 Applying Knowledge Management: Techniques for Building Corporate Memories Ian Watson
740 Embedded Computing: A VLIW Approach to Architecture, Compilers and Tools Joseph A. Fisher, Paolo Faraboschi, Cliff Young
741 Voice Interaction Design:Crafting the New Conversational Speech Systems Randy Allen Harris
742 Disappearing Cryptography: Information Hiding: Steganography & Watermarking Peter Wayner
743 Developing IP-Based Services: Solutions for Service Providers and Vendors Monique Morrow, Kateel Vijayananda
744 TCP/IP Clearly Explained Pete Loshin
745 Blondie24: Playing at the Edge of AI David B. Fogel
746 Non-Photorealistic Computer Graphics: Modeling, Rendering, and Animation Thomas Strothotte, Stefan Schlechtweg
747 How to Build a Digital Library Ian H. Witten, David Bainbridge
748 Digital Video and HDTV: Algorithms and Interfaces Charles Poynton
749 Evolutionary Computation in Bioinformatics Gary B. Fogel, David W. Corne
750 Digital Arithmetic Miloš D. Ercegovac, Tomás Lang
751 Tcl/Tk: A Developer's Guide Clif Flynt
752 HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science John M. Carroll
753 IPv6: Theory, Protocol, and Practice Pete Loshin
754 Modeling Business Objects with XML Schema Berthold Daum
755 Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit Peter Braun, Wilhelm R. Rossak
756 Information Visualization: Perception for Design Colin Ware
757 Relational Database Design Clearly Explained Jan L. Harrington
758 From COBOL to OOP Markus Knasmüller
759 TCP/IP Sockets in C: Practical Guide for Programmers Michael J. Donahoo, Kenneth L. Calvert
760 Modern Cable Television Technology Walter Ciciora, James Farmer, David Large, Michael Adams
761 Bioinformatics: Managing Scientific Data Zoé Lacroix, Terence Critchlow
762 Maintaining and Evolving Successful Commercial Web Sites: Managing Change, Content, Customer Relationships, and Site Measurement Ashley Friedlein
763 Interaction Design for Complex Problem Solving: Developing Useful and Usable Software Barbara Mirel
764 Content Networking: Architecture, Protocols, and Practice Markus Hofmann, Leland R. Beaumont
765 Complete Maya Programming: An Extensive Guide to MEL and C++ API David Gould
766 JSP: Practical Guide for Programmers Robert Brunner
767 Level of Detail for 3D Graphics David Luebke, Martin Reddy, Jonathan D. Cohen, Amitabh Varshney, Benjamin Watson, Robert Huebner
768 Web Bloopers: 60 Common Web Design Mistakes, and How to Avoid Them Jeff Johnson
769 Designing Data-Intensive Web Applications Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera
770 Multicast Sockets: Practical Guide for Programmers David Makofske, Kevin Almeroth
771 Texturing and Modeling: A Procedural Approach David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, Steven Worley
772 Interconnection Networks Jose Duato, Sudhakar Yalamanchili, Lionel Ni
773 Real-Time Shader Programming Ron Fosner
774 Temporal Data & the Relational Model C.J. Date, Hugh Darwen, Nikos Lorentzos
775 Automated Planning: Theory & Practice Malik Ghallab, Dana Nau, Paolo Traverso
776 Policy-Based Network Management: Solutions for the Next Generation John Strassner
777 Jim Blinn's Corner: Notation, Notation, Notation Jim Blinn
778 Digital Geometry: Geometric Methods for Digital Picture Analysis Reinhard Klette, Azriel Rosenfeld
779 The Struts Framework: Practical Guide for Java Programmers Sue Spielman
780 Why Programs Fail: A Guide to Systematic Debugging Andreas Zeller
781 Unit Testing in Java: How Tests Drive the Code Johannes Link
782 VLDB '02: Proceedings of the 28th International Conference on Very Large Databases VLDB
783 Paper Prototyping: The Fast and Easy Way to Design and Refine User Interfaces Carolyn Snyder
784 Stochastic Local Search: Foundations & Applications Holger H. Hoos, Thomas Stützle
785 ARM System Developer's Guide: Designing and Optimizing System Software Andrew Sloss, Dominic Symes, Chris Wright
786 Network Processor Design: Issues and Practices, Volume 1 Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
787 SQL Clearly Explained Jan L. Harrington
788 Innovation Happens Elsewhere: Open Source as Business Strategy Ron Goldman, Richard P. Gabriel
789 Constraint Processing Rina Dechter
790 Data Quality: The Accuracy Dimension Jack E. Olson
791 Engineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions James Bean
792 Java Web Services Architecture James McGovern, Sameer Tyagi, Michael Stevens, Sunil Mathew
793 Web Services and Service-Oriented Architectures Douglas K. Barry
794 XML for Data Architects: Designing for Reuse and Integration James Bean
795 Java: Practical Guide for Programmers Michael Sikora
796 Virtual Machines: Versatile Platforms for Systems and Processes Jim Smith, Ravi Nair
797 The Internet and Its Protocols: A Comparative Approach Adrian Farrel
798 Wireless Sensor Networks: An Information Processing Approach Feng Zhao, Leonidas Guibas
799 The Craft of Information Visualization: Readings and Reflections Benjamin B. Bederson, Ben Shneiderman
800 Business Intelligence David Loshin
801 Semantics in Business Systems Dave McComb
802 How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering Malcolm Chisholm
803 Database Modeling with Microsoft® Visio for Enterprise Architects Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean
804 Joe Celko's Trees and Hierarchies in SQL for Smarties Joe Celko
805 Observing the User Experience: A Practitioner's Guide to User Research Mike Kuniavsky
806 Understanding Digital Libraries Michael Lesk
807 Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation Axel Jantsch
808 Location-Based Services Jochen Schiller, Agnès Voisard
809 Knowledge Representation and Reasoning Ronald Brachman, Hector Levesque
810 The Grid 2: Blueprint for a New Computing Infrastructure Ian Foster, Carl Kesselman
811 Bluetooth Application Programming with the Java APIs C Bala Kumar, Paul Kline, Tim Thompson
812 Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques Catherine Courage, Kathy Baxter
813 The Mobile Connection: The Cell Phone's Impact on Society Rich Ling
814 Cisco PIX Firewalls Umer Khan
815 Sockets, Shellcode, Porting, & Coding James Foster
816 Stealing the Network Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
817 InfoSec Career Hacking Chris Hurley, Johnny Long, Aaron Bayles, Ed Brindley
818 Securing IM and P2P Applications for the Enterprise Marcus Sachs, Paul Piccard
819 Host Integrity Monitoring Using Osiris and Samhain Brian Wotring
820 Virtualization with VMware ESX Server Al Muller, Seburn Wilson
821 Nessus, Snort, & Ethereal Power Tools Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus
822 Penetration Tester's Open Source Toolkit Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore
823 How to Cheat at Managing Windows Server Update Services B. Barber
824 Phishing Exposed Lance James
825 Configuring Check Point NGX VPN-1/Firewall-1 Barry Stiefel, Simon Desmeules
826 Skype Me! Markus Daehne
827 Network Security Evaluation Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham
828 Sarbanes-Oxley Compliance Using COBIT and Open Source Tools Christian Lahti, Roderick Peterson
829 How to Cheat at IT Project Management Susan Snedaker
830 OS X for Hackers at Heart Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
831 Perfect Password Mark Burnett
832 Security Log Management Jacob Babbin
833 RFID Security Frank Thornton, Chris Lanthem
834 Insider Threat Eric Cole, Sandra Ring
835 How to Cheat at Configuring ISA Server 2004 Thomas Shinder, Debra Littlejohn Shinder
836 How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure B. Barber, Melissa Craft, Michael Cross, Hal Kurz
837 Practical VoIP Security Thomas Porter
838 Video Conferencing over IP Michael Gough
839 Combating Spyware in the Enterprise Paul Piccard
840 Syngress IT Security Project Management Handbook Susan Snedaker
841 Building a VoIP Network with Nortel’s Multimedia Communication Server 5100 Larry Chaffin
842 Winternals Dave Kleiman, Laura Hunter
843 How to Cheat at Securing a Wireless Network Chris Hurley, Lee Barken
844 Firewall Policies and VPN Configurations Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, jennifer Davis
845 How to Cheat at Managing Information Security Mark Osborne
846 BigNum Math Tom St Denis
847 How to Cheat at Designing Security for a Windows Server 2003 Network Chris Ruston, Chris Peiris
848 Configuring SonicWALL Firewalls Chris Lathem
849 How to Cheat at Managing Microsoft Operations Manager 2005 Tony Piltzecker
850 Writing Security Tools and Exploits James Foster
851 The Enterprise Architecture IT Project: The Urbanisation Paradigm Christophe Longépé
852 IP Addressing & Subnetting INC IPV6: Including IPv6 J D Wegner, Robert Rockell, Syngress Media
853 DBAs Guide to Databases Under Linux David Egan, Paul Zikopoulos, Chris Rogers
854 Managing Windows 2000 Network Services Dr. Thomas W. Shinder, Debra Littlejohn Shinder, Thomas W. Shinder, Syngress
855 Windows 2000 Configuration Wizards Syngress Media, Brian M. Collins, Paul Shields
856 Windows 2000 Server System Administration Handbook Paul Shields, Ralph W Crump, Martin Weiss
857 Troubleshooting Windows 2000 TCP/IP Syngress Media Inc, Debra Littlejohn Shinder, Thomas W Shinder, Syngress
858 Building Cisco Remote Access Networks Wayne Lawson
859 Configuring Cisco AVVID Syngress Publishing, Erik Rozell, Sandy C. Kronenberg, Wayne Lawson
860 Mission Critical Windows 2000 Server Administration Robin Walshaw, Syngress Publishing
861 Configuring Citrix MetaFrame for Windows 2000 Terminal Services Melissa Craft, Allen V. Keele, et. al
862 Designing SQL Server 2000 Databases Travis Laird, Robert Patton, and Jennifer Ogle
863 E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks Syngress Media Inc, Brian Bagnall, Syngress Publishing, James Stanger
864 Configuring Exchange Server 2000 James Stagner
865 ASP Configuration Handbook John Gunson, Dale Booth, Sean Thurston
866 Hack Proofing Your E-Commerce Site - The only way to stop a hacker is to think like one Ryan Russell
867 Configuring ISA Server 2000 Thomas W. Shinder, Inc. Syngress Media
868 Hack Proofing Your Web Applications - The Only Way to stop a hacker is to think like one Ryan Russell, Inc. Syngress Media, Syngress Media
869 Palm OS Web Application Developer's Guide - Including PQA and Web Clipping Ben Coombe, R. Eric Lyons, David C. Matthews, Rory Lysaght
870 Hack Proofing Linux James Stanger, Patrick T. Lane
871 BizTalk Server 2000 Developer's Guide Scott Roberts, Milton Todd, Chris Farmer, Robert Shimonski
872 Bluetooth Application Developer's Guide Jennifer Bray, Brian Senese, Gordon McNutt, Bill Munday
873 Hack Proofing Sun Solaris 8 Ed Mitchell, Ido Dubrawsky, Wyman Miles, F Williams Lynch
874 Designing A Wireless Network Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely
875 Webmaster's Guide to the Wireless Internet Ryan Fife, Wei Meng Lee, Dan A. Olsen
876 XML .NET Developer's Guide Henk-Evert Sonder, Jonothon Ortiz, Adam Sills
877 VB.net Developer's Guide Cameron Wakefield, Henk-Evert Sonder, Wei Meng Lee
878 C#.Net Developer's Guide Saurabh Nandu, dotthatcom.com, Greg Hack, Adrian Turtschi
879 ASP .NET Web Developer's Guide Jonothon Ortiz, Mesbah Ahmed, Chris Garrett, Jeremy Faircloth, Wei Meng Lee, Adam Sills, Chris Payne
880 Configuring Windows 2000 without Active Directory Carol Bailey, Tom Shinder, Dr Thomas W Shinder, Thomas Shinder MD
881 .NET Mobile Web Developers Guide Steve Milroy, Ken Cox, DotThatCom.com, Amit Kalani
882 Building A Cisco Wireless LAN Ron Fuller, Tim Blankenship
883 Hackproofing Your Wireless Network Tony Bautts, Erif Ouellet, Eric Ouellet, Neal O'Farrell
884 Windows 2000 Active Directory 2E Melissa Craft
885 Ruby Developers Guide Michael Neumann, Robert Feldt, Lyle Johnson
886 Building Robots With Lego Mindstorms Mario Ferrari, Giulio Ferrari, Ralph Hempel
887 Hack Proofing Your Network Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
888 Hack Proofing ColdFusion Steve Casco, Rob Rusher, Greg Meyer, Sarge
889 Configuring and Troubleshooting Windows XP Professional Martin Grasdal, Brian Barber, Chad Todd, Norris L. Johnson Jr.
890 Developing .Net Web Services With Xml David Jorgensen
891 Cisco AVVID and IP Telephony Design & Implementation Robert Padjen, Larry Keefer, Sean Thurston, Jeff Bankston
892 Configuring IPv6 For Cisco IOS Edgar, Jr. Parenti, Eric Knipp, Brian Browne
893 Developing Web Services with Java APIs for XML (JAX Pack) Robert Hablutzel
894 Hacking a Terror Network: The Silent Threat of Covert Channels Russ Rogers, Matthew Devost
895 Security Sage's Guide to Hardening the Network Infrastructure Steven Andres, Brian Kenyon, Erik Pack Birkholz
896 Wardriving: Drive, Detect, Defend: A Guide to Wireless Security Chris Hurley
897 Snort 2.1 Intrusion Detection Brian Caswell, Jay Beale
898 Stealing the Network: How to Own a Continent Ryan Russell, Joe Grand, Tom Craig
899 Nessus Network Auditing: Jay Beale Open Source Security Series Jay Beale, Haroon Meer, Charl van der Walt, Renaud Deraison
900 Zero-Day Exploit:: Countdown to Darkness Rob Shein, Marcus Sachs
901 Cyber Adversary Characterization: Auditing the Hacker Mind Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz
902 The Best Damn Windows Server 2003 Book Period Debra Littlejohn Shinder, Thomas Shinder
903 Dr. Tom Shinder's Configuring ISA Server 2004 Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal
904 Aggressive Network Self-Defense Neil Wyler
905 Richard Thieme's Islands in the Clickstream Richard Thieme
906 CYA Securing Exchange Server 2003 Mark Fugatt, Henrik Walther, Pattrick Santry
907 CYA Securing IIS 6.0 Chris Peiris, Bernard Cheah, Ken Schaefer
908 Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari, & Sega Joe Grand, Albert Yarusso
909 Google Hacking for Penetration Testers Johnny Long
910 Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Lee Barken
911 Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover David Allen
912 Apple I Replica Creation: Back to the Garage Tom Owad
913 Cyber Spying Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole
914 Network+ Study Guide & Practice Exams Robert Shimonski, Laura Hunter, Norris Johnson
915 Hack Proofing Windows 2000 Server Chad Todd, Norris L., Jr. Johnson
916 Hack Proofing XML Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis Jr Franklin
917 Hack Proofing Your Identity Teri Bidwell
918 Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1 Melissa Craft
919 C# For Java Programmers Harold Cabrera, Jeremy Faircloth, Stephen Goldberg
920 Managing Cisco Network Security Sean Thurston
921 Sniffer Pro Network Optimization and Troubleshooting Handbook Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko
922 Cisco Security Specialists Guide to PIX Firewall Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver
923 Configuring Cisco Voice Over IP Jason Sinclair, Paul Fong, Scott M. Harris, Martin Walshaw
924 Scene of the Cybercrime Debra Littlejohn Shinder, Ed Tittel
925 Dr Tom Shinder's ISA Server and Beyond Thomas W. Shinder, Martin Grasdal, Debra Littlejohn Shinder
926 Special Ops Erik Pace Birkholz, Stuart McClure
927 Nokia Network Security Solutions Handbook Doug Maxwell
928 Snort Intrusion Detection 2.0 Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth
929 SSCP Study Guide and DVD Training System Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth
930 Configuring Symantec AntiVirus Enterprise Edition Laura E Hunter, Athar A Khan, James Stanger, Jay Cee Taylor
931 MCSE/MCSA (Exam 70-214) Study Guide Will Schmied, Thomas W. Shinder
932 Stealing The Network: How to Own the Box Ryan Russell, Ido Dubrawsky, FX, Joe Grand
933 Building DMZs For Enterprise Networks Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder
934 The Best Damn Firewall Book Period Cherie Amon, Thomas W. Shinder, Anne Carasik-Henmi
935 The Best Damn Cisco Internetworking Book Period Charles Riley
936 MCSA/MCSE (Exam 70-291) Study Guide Dr Thomas W. Shinder, Thomas W. Shinder, Debra Littlejohn Shinder
937 MCSE (Exam 70-293) Study Guide Dr Thomas W Shinder, Thomas W Shinder, Debra Littlejohn Shinder, Martin Grasdal
938 MCSE (Exam 70-294) Study Guide Michael Cross, Todd Walls, Jeffery A Martin, Martin Grasdal
939 CheckPoint NG VPN 1/Firewall 1 Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble
940 Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks Rick Gallaher
941 Configuring NetScreen Firewalls Cameron, Rob
942 Intrusion Prevention and Active Response: Deploying Network and Host IPS Michael Rash, Angela Orebaugh, Graham Clark
943 Deploying Citrix MetaFrame Presentation Server 3.0 Melissa Craft, Connie S. Wilson, Chris Broomes
944 Microsoft Log Parser Toolkit Gabriele Giuseppini, Mark Burnett
945 MCSE (Exam 70-297) Study Guide Neil Ruston, Laura E. Hunter
946 MCSE (Exam 70-298) Study Guide Neil Ruston
947 MCSA/MCSE (Exam 70-292) Study Guide Will Schmied, Robert J. Shimonski
948 MCSE (Exam 70-296) Study Guide Anthony Piltzecker, Laura E Hunter, Melissa Craft, Brian Barber
949 MCSA/MCSE (Exam 70-290) Study Guide Thomas W. Shinder, Debra Littlejohn Shinder, Syngress Publishing, Chris Peiris
950 Hacking the Code Mark Burnett
951 Buffer Overflow Attacks James C. Foster, Vitaly Osipov, Nish Bhalla
952 Cisco Security Professional's Guide to Secure Intrusion Detection Systems Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky
953 Programmer's Ultimate Security DeskRef James Foster
954 How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King Susan Snedaker
955 Black Hat Physical Device Security: Exploiting Hardware and Software Drew Miller
956 Ethereal Packet Sniffing Angela D Orebaugh, Greg Morris, Ed Warnicke, Gilbert Ramirez
957 Hardware Hacking Joe Grand, Kevin Mitnick, Ryan Russell
958 Inside the SPAM Cartel Spammer-X, Jeffrey Posluns
959 Check Point Next Generation with Application Intelligence Security Administration Chris Tobkin, Daniel Kligerman
960 Managing and Securing a Cisco SWAN David Wall, Jeremy Faircloth, Joel Barrett, Jan Kanclirz Jr
961 Security Assessment Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra
962 Software Piracy Exposed Paul Craig, Mark Burnet
963 Mathematical Programming: Theory and Methods S. M. Sinha

Wiley E-Books

SL. No. E-Book Titles Author
1 Codecharts: Roadmaps and Blueprints for Object-Oriented Programs Eden
2 Algorithms and Parallel Computing Gebali
3 Model-based Visual Tracking: the OpenTL Framework Panin
4 Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition Kantardzic
5 Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems Bauer
6 Compiler Construction Using Java, JavaCC, and Yacc Dos Reis
7 Enterprise Software Architecture and Design: Entities, Services, and Resources Duggan
8 Advanced Internet Protocols, Services, and Applications Oki
9 Cyber Security Policy Guidebook Bayuk
10 Practical Database Programming with Visual Basic.N ET, Second Edition Bai
11 Convert! Designing Web Sites to Increase Traffic and Conversion Hunt
12 Java For Dummies(R), 5th Edition Burd
13 The Death of the Internet Jakobsson
14 Energy-Efficient Distributed Computing Systems Zomaya
15 Information Overload: An International Challengefor Professional Engineers and Technical Communicators Strother
16 Reliability and Availability of Cloud Computing Bauer
17 Model-Driven and Software Product Line Engineering Royer
18 Digital Color Imaging Fernandez-Maloi
19 Assembly Language Programming: ARM Cortex-M3 Mahout
20 Digital Holography Li
21 Digital Color: Acquisition, Perception, Coding and Rendering Fernandez-Maloi
22 Program Specialization Engineering Marlet
23 Computer Architecture Blanchet
24 Memory Allocation Problems in Embedded Systems / Optimization Methods Soto
25 Advanced Transport Protocols Adila
26 Computer Science and Ambient Intelligence Calvary
27 Graph Partitioning Bichot
28 Qualitative Spatial and Temporal Reasoning Ligozat
29 Cluster and Computing Networks Vicat-Blanc
30 Static Analysis of Software: The Abstract Interpretation Boulanger
31 Practical Database Programming with Java Bai
32 Computer, Network, Software, and Hardware Engineering with Applications Schneidewind
33 Design of Multithreaded Software: The Entity-Life Modeling Approach Sandén
34 The Dark Side of Software Engineering: Evil on Computing Projects Rost
35 Cloud Computing Principles and Paradigms Buyya
36 Energy Security - An Interdiscinplinary Approach Bahgat
37 Computer System Design: System-on-Chip Flynn
38 Systems and Software Engineering with Applications Schneidewind
39 Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing Ebert
40 Oracle Database Performance and Scalability: a quantitative approach Liu
41 Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue Grinshpan
42 Case Study Research in Software Engineering: Guidelines and Examples Runeson
43 Computational Number Theory and Modern Cryptography Yan
44 Adobe Acrobat X PDF Bible Padova
45 Drupal 7 Bible Shreves
46 Objective-C DeVoe
47 SolidWorks 2011 Parts Bible Lombard
48 Game Invaders: The Theory and Understanding of Computer Games Fencott
49 Music Navigation with Symbols and Layers: Toward Content Browsing with IEEE 1599 XML Encoding Baggi
50 Interoperability for Enterprise Software and Applications: Proceedings of the Workshops and the Doctorial Symposium of the I-ESA International Confer Panetto
51 Fundamentals of Software Testing Homès
52 Models and Analysis for Distributed Systems Kordon
53 Agile Contracts: Creating and Managing Successful Projects with Scrum Opelt
54 Distibuted Systems: Design and Algorithms Kordon

Taylor & Francis E-Books

SL. No. E-Book Titles Author
1 Introduction to Contextual Processing: Theory and Applications Vert, Gregory
2 Polygon Mesh Processing Botsch, Mario
3 GPU Pro: Advanced Rendering Techniques Engel, Wolfgang
4 Game Physics Pearls van den Bergen, Gino
5 On the Way to Fun: An Emotion Based Approach to Successful Game Design Dillon, Roberto
6 Virtual Reality: Concepts and Technologies Fuchs, Philippe
7 Visual Perception from a Computer Graphics Perspective Thompson, William
8 GPU Pro 2 Engel, Wolfgang
9 Real-Time Shadows Eisemann, Elmar
10 Game Development Tools Ansari, Marwan
11 Graphics Shaders: Theory and Practice, Second Edition Bailey, Mike
12 Basics of Game Design Moore, Michael
13 Practical Data Mining Hancock, Jr., Monte F.
14 Game Engine Gems 2 Lengyel, Eric
15 The Golden Age of Video Games: The Birth of a Multibillion Dollar Industry Dillon, Roberto
16 The Magic of Computer Graphics Kurachi, Noriko
17 Data Structure and Software Engineering: Challenges and Improvements Antonakos, James L.
18 Computational Modelling of Objects Represented in Images III: Fundamentals, Methods and Applications Di Giamberardino, Paolo
19 Large-Scale Simulation: Models, Algorithms, and Applications Chen, Dan
20 Intelligent Technologies for Web Applications Srinivas Sajja, Priti
21 Production Volume Rendering: Design and Implementation Wrenninge, Magnus
22 Service-Oriented Distributed Knowledge Discovery Talia, Domenico
23 High Performance Visualization: Enabling Extreme-Scale Scientific Insight Bethel, E. Wes
24 Shadow Algorithms Data Miner Woo, Andrew
25 GPU PRO 3: Advanced Rendering Techniques Engel, Wolfgang
26 Game Development for iOS with Unity3D Murray, Jeff W.
27 OpenGL Insights Cozzi, Patrick
28 Internet-Scale Pattern Recognition: New Techniques for Voluminous Data Sets and Data Clouds Muhamad Amin, Anang
29 Developing Essbase Applications: Advanced Techniques for Finance and IT Professionals Lackpour, Cameron
30 Embedded Systems and Wireless Technology: Theory and Practical Applications Santos, Raul A.
31 Microsurgery: Advances, Simulations and Applications Fukuda, Toshio
32 Genome Annotation Soh, Jung
33 Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5) Mena, Jesus
34 Technological Advances in Interactive Collaborative Learning Alexandrov, Nia
35 Programming GPS and OpenStreetMap Applications with Java: The RealObject Application Framework Beiglböck, Kristof
36 Performance Tuning of Scientific Applications Bailey, David H.
37 Scientific Computing with Multicore and Accelerators Kurzak, Jakub
38 Pattern Theory: The Stochastic Analysis of Real-World Signals Mumford, David
39 Combinatory Logic: Pure, Applied and Typed Bimbó, Katalin
40 Handbook of Product Graphs, Second Edition Hammack, Richard
41 Feedback Control in Systems Biology Cosentino, Carlo
42 Mathematical and Algorithmic Foundations of the Internet Luccio, Fabrizio
43 Particle Swarm Optimisation: Classical and Quantum Perspectives Sun, Jun
44 Algebraic Number Theory, Second Edition Mollin, Richard A.
45 Mathematics Education for a New Era: Video Games as a Medium for Learning Devlin, Keith
46 Undocumented Secrets of MATLAB-Java Programming Altman, Yair M.
47 3D Math Primer for Graphics and Game Development, 2nd Edition Dunn, Fletcher
48 Iterative Splitting Methods for Differential Equations Geiser, Juergen
49 Combinatorial Scientific Computing Naumann, Uwe
50 Combinatorics of Permutations, Second Edition Bona, Miklos
51 Desktop Grid Computing Cerin, Christophe
52 Combinatorics of Set Partitions Mansour, Toufik
53 Applications of Combinatorial Matrix Theory to Laplacian Matrices of Graphs Molitierno, Jason J.
54 Limits of Computation: An Introduction to the Undecidable and the Intractable Reiter, Edna E.
55 Cloud Computing: Data-Intensive Computing and Scheduling Magoules, Frederic
56 XML in Scientific Computing Pozrikidis, Constantine
57 Game Design Theory: A New Philosophy for Understanding Games Burgun, Keith
58 Smoothing Splines: Methods and Applications Wang, Yuedong
59 Statistical Inference: The Minimum Distance Approach Basu, Ayanendranath
60 R Graphics, Second Edition Murrell, Paul
61 Spectral Feature Selection for Data Mining Zhao, Zheng Alan
62 Data Clustering in C++: An Object-Oriented Approach Gan, Guojun
63 Statistical Learning and Data Science Summa, Mireille Gettler
64 Manifold Learning Theory and Applications Ma, Yunqian
65 Foundations of Predictive Analytics Wu, James
66 Patterns of Data Modeling Blaha, Michael
67 Mathematical Aspects of Logic Programming Semantics Hitzler, Pascal
68 Mining Software Specifications: Methodologies and Applications Lo, David
69 Fundamentals of Multicore Software Development Pankratius, Victor
70 Automated Physical Database Design and Tuning Bruno, Nicolas
71 Cost-Sensitive Machine Learning Krishnapuram, Balaji
72 Honeypots: A New Paradigm to Information Security Joshi, R. C.
73 Wireless Security Osterhage, Wolfgang
74 Microarray Image Analysis: An Algorithmic Approach Fraser, Karl
75 Methods in Medical Informatics: Fundamentals of Healthcare Programming in Perl, Python, and Ruby Berman, Jules J.
76 Handbook of Chemoinformatics Algorithms Faulon, Jean-Loup
77 Support Vector Machines and Their Application in Chemistry and Biotechnology Liang, Yizeng
78 Discrete-Event Modeling and Simulation: Theory and Applications Wainer, Gabriel A.
79 Analysis and Synthesis of Fuzzy Control Systems: A Model-Based Approach Feng, Gang
80 Rough Fuzzy Image Analysis: Foundations and Methodologies Pal, Sankar K.
81 Computational Intelligence Paradigms: Theory & Applications using MATLAB Sumathi, S.
82 Reinforcement Learning and Dynamic Programming Using Function Approximators Busoniu, Lucian
83 Design of Low-Power Coarse-Grained Reconfigurable Architectures Kim, Yoonjin
84 Nonvolatile Memory Design: Magnetic, Resistive, and Phase Change Li, Hai
85 Semiconductors: Integrated Circuit Design for Manufacturability Balasinski, Artur
86 Real-Time Embedded Systems: Optimization, Synthesis, and Networking Qiu, Meikang
87 Model-Based Testing for Embedded Systems Zander, Justyna
88 Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks Stanco, Filippo
89 Autonomic Networking-on-Chip: Bio-Inspired Specification, Development, and Verification Cong-Vinh, Phan
90 The Image Processing Handbook, Sixth Edition Russ, John C.
91 Time-Triggered Communication Obermaisser, Roman
92 Real-Time Embedded Systems: Open-Source Operating Systems Perspective Bertolotti, Ivan Cibrario
93 Image Processing and Analysis with Graphs: Theory and Practice Lezoray, Olivier
94 Measuring Shape Neal, F. Brent
95 Distributed Sensor Networks, Second Edition: Image and Sensor Signal Processing Iyengar, S. Sitharama
96 Distributed Sensor Networks, Second Edition: Sensor Networking and Applications Iyengar, S. Sitharama
97 Perceptual Digital Imaging: Methods and Applications Lukac, Rastislav
98 Image Restoration: Fundamentals and Advances Gunturk, Bahadir Kursat
99 Embedded Systems Circuits and Programming Sanchez, Julio
100 Dynamic RAM: Technology Advancements Siddiqi, Muzaffer A.
101 Image Super-Resolution and Applications El-Samie, Fathi E. Abd
102 Creation of a Conscious Robot: Mirror Image Cognition and Self-Awareness Takeno, Junichi
103 Experimental Design: From User Studies to Psychophysics Cunningham, Douglas
104 Utility-Based Learning from Data Friedman, Craig
105 Paradoxes in Scientific Inference Chang, Mark
106 Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions Deng, Naiyang
107 Clustering in Bioinformatics and Drug Discovery MacCuish, John David
108 Cancer Systems Biology Wang, Edwin
109 Introduction to Proteins: Structure, Function, and Motion Kessel, Amit
110 Thermostable Proteins: Structural Stability and Design Sen, Srikanta
111 Computational Methods in Plasma Physics Jardin, Stephen
112 Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition Ratner, Bruce
113 Understanding Information Retrieval Systems: Management, Types, and Standards Bates, Marcia J.
114 Introduction to the Numerical Modeling of Groundwater and Geothermal Systems: Fundamentals of Mass, Energy and Solute Transport in Poroelastic Rocks Bundschuh, Jochen
115 Epilepsy: The Intersection of Neurosciences, Biology, Mathematics, Engineering, and Physics Osorio, Ivan
116 Open Systems Dependability: Dependability Engineering for Ever-Changing Systems Tokoro, Mario
117 Machine Learning Forensics for Law Enforcement, Security, and Intelligence Mena, Jesus
118 Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications Bremner, Murray R.
119 RC4 Stream Cipher and Its Variants Paul, Goutam
120 Algebraic and Stochastic Coding Theory Kythe, Dave K.
121 New Directions of Modern Cryptography Cao, Zhenfu
122 Bioinformatics: High Performance Parallel Computer Architectures Schmidt, Bertil
123 Introduction to Bio-Ontologies Robinson, Peter N.
124 Data Mining in Biomedical Imaging, Signaling, and Systems Dua, Sumeet
125 High Performance Computing: Programming and Applications Levesque, John
126 Introduction to High Performance Computing for Scientists and Engineers Hager, Georg
127 Knowledge Science: Modeling the Knowledge Creation Process Nakamori, Yoshiteru
128 Handbook of Finite State Based Models and Applications Wang, Jiacun
129 Relational Data Clustering: Models, Algorithms, and Applications Long, Bo
130 Handbook of Natural Language Processing, Second Edition Indurkhya, Nitin
131 Temporal Data Mining Mitsa, Theophano
132 Handbook of Educational Data Mining Romero, Cristobal
133 Statistical Data Mining Using SAS Applications, Second Edition Fernandez, George
134 Bayesian Artificial Intelligence, Second Edition Korb, Kevin B.
135 Knowledge Discovery from Data Streams Gama, Joao
136 Data Mining with R: Learning with Case Studies Torgo, Luis
137 Music Data Mining Li, Tao
138 Ensemble Methods: Foundations and Algorithms Zhou, Zhi-Hua
139 Clustering: A Data Recovery Approach, Second Edition Mirkin, Boris
140 Contrast Data Mining: Concepts, Algorithms, and Applications Dong, Guozhu
141 Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques Fung, Benjamin C.M.
142 Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques Bonchi, Francesco
143 Security and Policy Driven Computing Liu, Lei
144 Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges Kwok, Yu-Kwong Ricky
145 Data Mining and Machine Learning in Cybersecurity Dua, Sumeet
146 Music Emotion Recognition Yang, Yi-Hsuan
147 Data Mining Tools for Malware Detection Masud, Mehedy
148 TV Content Analysis: Techniques and Applications Kompatsiaris, Yiannis
149 Computer Security Literacy: Staying Safe in a Digital World Jacobson, Douglas
150 Methods and Algorithms in Navigation: Marine Navigation and Safety of Sea Transportation Weintrit, Adam
151 Signal and Image Processing for Remote Sensing, Second Edition Chen, C.H.
152 Human-Robot Interaction in Social Robotics Kanda, Takayuki
153 Image and Video Processing in the Compressed Domain Mukhopadhyay, Jayanta
154 Handbook on Soft Computing for Video Surveillance Pal, Sankar K.
155 Circular and Linear Regression: Fitting Circles and Lines by Least Squares Chernov, Nikolai
156 Computer Vision: From Surfaces to 3D Objects Tyler, Christopher W.
157 Security for Wireless Sensor Networks using Identity-Based Cryptography Patil, Harsh Kupwade
158 Multimedia Security: Watermarking, Steganography, and Forensics Shih, Frank Y.
159 Delaunay Mesh Generation Cheng, Siu-Wing
160 Science for the Curious Photographer: An Introduction to the Science of Photography Johnson, Jr., Charles
161 Advanced High Dynamic Range Imaging: Theory and Practice Banterle, Francesco
162 Multi-Core Embedded Systems Kornaros, Georgios
163 Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition Mills, David L.
164 Computational Photography: Methods and Applications Lukac, Rastislav
165 Super-Resolution Imaging Milanfar, Peyman
166 Bio-Inspired Computing and Networking Xiao, Yang
167 Communication Architectures for Systems-on-Chip Ayala, José L.
168 The Practical OPNET User Guide for Computer Network Simulation Sethi, Adarshpal S.
169 Multimedia Image and Video Processing, Second Edition Guan, Ling
170 Conceptual Modeling for Discrete-Event Simulation Robinson, Stewart
171 Data Mining for Bioinformatics Dua, Sumeet
172 Spatial Decision Support Systems: Principles and Practices Sugumaran, Ramanathan
173 Real Life Applications of Soft Computing Shukla, Anupam
174 Designing Network On-Chip Architectures in the Nanoscale Era Flich, Jose
175 Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach Balasa, Florin
176 Robot Development Using Microsoft Robotics Developer Studio Kang, Shih-Chung
177 LabVIEW: A Developer's Guide to Real World Integration Fairweather, Ian
178 Machine Learning and Knowledge Discovery for Engineering Systems Health Management Srivastava, Ashok N.
179 Logo Recognition: Theory and Practice Chen, Jingying
180 Advances in Machine Learning and Data Mining for Astronomy Way, Michael J.
181 Visualizing Data Patterns with Micromaps Carr, Daniel B.
182 Noiseless Steganography: The Key to Covert Communications Desoky, Abdelrahman
183 Location-Based Information Systems: Developing Real-Time Tracking Applications Labrador, Miguel A.
184 Enabling Context-Aware Web Services: Methods, Architectures, and Technologies Sheng, Quan Z.
185 Handbook of Financial Cryptography and Security Rosenberg, Burton
186 Visual Cryptography and Secret Image Sharing Cimato, Stelvio
187 Multiple-Base Number System: Theory and Applications Dimitrov, Vassil
188 Cloud Computing: Methodology, Systems, and Applications Wang, Lizhe
189 Handbook of Mobile Systems Applications and Services Kumar, Anup

Cambrideg E-Books

SL. No. E-Book Titles Author
1 Computational Complexity Arora/Barak
2 Concentration of Measure for the Analysis of Randomized Algorithms Dubhashi/Panconesi
3 Graph Algorithms Even/Even
4 Iterative Methods in Combinatorial Optimization Lau/Ravi/Singh
5 Networks, Crowds, and Markets Easley/Kleinberg
6 P, NP, and NP-Completeness Goldreich
7 The Design of Approximation Algorithms Williamson/Shmoys
8 Practical Formal Software Engineering Mills
9 Programming in Visual Basic 2010 McKeown
10 Software Modeling and Design Gomaa
11 Artificial Intelligence Poole/Mackworth
12 Computational Logic and Human Thinking Kowalski
13 Statistical Machine Translation Koehn
14 Microprocessor Architecture Baer
15 Mining of Massive Datasets Rajaraman/Ullman
16 Web Data Management Abiteboul et al
17 Constraint Handling Rules Frühwirth
18 Modelling Systems Fitzgerald/Larsen
19 Programming with Higher-Order Logic Miller/Nadathur
20 Steps in Scala Loverdos/Syropoulos
21 Transitions and Trees Hüttel
22 Computers and the Law Dunne

IEEE & MIT E-Books

SL. No. E-Book Titles Author
1 Algorithmic and Artificial Intelligence Methods for Protein Bioinformatics: Li, M.
2 Aluminum Dreams: The Making of Light Modernity Sheller, M.
3 Circularly Polarized Antennas: Zhu, F.
4 Designing High Availability Systems: DFSS and Classical Reliability Techniques with Practical Real Life Examples Taylor, Z.
5 Disaster Robotics: Murphy, R.
6 Filamentary Ion Flow: Theory and Experiments Amoruso, V.
7 Flight Vehicle Aerodynamics: Drela, M.
8 Handbook of Digital Games: Agius, H.
9 Introduction to Numerical Electrostatics Using MATLAB: Dworsky, L.
10 Large Scale Network-Centric Distributed Systems: Zomaya, A.
11 Logic in Games: van Benthem, J.
12 Media Technologies: Essays on Communication, Materiality, and Society Foot, K.
13 Memes in Digital Culture: Shifman, L.
14 Microgrids: Architectures and Control Hatziargyriou, N.
15 Networking Peripheries: Technological Futures and the Myth of Digital Universalism Chan, A.
16 Operator-Based Nonlinear Control Systems Design and Applications: Deng, M.
17 Power Magnetic Devices: A Multi-Objective Design Approach Sudhoff, S.
18 Practical Power System Operation: Vaahedi, E.
19 Risk Assessment of Power Systems: Models, Methods, and Applications Li, W.
20 Security Management of Next Generation Telecommunications Networks and Services: Jacobs, S.
21 Service Quality of Cloud-Based Applications: Adams, R.
22 Software War Stories: Case Studies in Software Management Reifer, D.
23 Synthetic Aesthetics: Investigating Synthetic Biology's Designs on Nature Endy, D.
24 Techniques for Surviving Mobile Data Explosion: Verma, P.
25 The Geometry of Meaning: Semantics Based on Conceptual Spaces Gardenfors, P.
26 Ultra-Capacitors in Power Conversion Systems: Analysis, Modeling and Design in Theory and Practice Grbovic, P.
27 Who's Asking?: Native Science, Western Science, and Science Education Bang, M.
28 "Raw Data" Is an Oxymoron: Gitelman, L.
29 A Case for Climate Engineering: Keith, D.
30 Acoustic Array Systems: Theory, Implementation, and Application Benesty, J.
31 Advanced Quantum Communications: An Engineering Approach Gyongyosi, L.
32 Algorithms Unlocked: Cormen, T.
33 Ambient Commons: Attention in the Age of Embodied Information McCullough, M.
34 An Aesthesia of Networks: Conjunctive Experience in Art and Technology Munster, A.
35 Analysis of Electric Machinery and Drive Systems: Pekarek, S.
36 Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 Slayton, R.
37 Beyond Choices: The Design of Ethical Gameplay Sicart, M.
38 Business and Scientific Workflows: A Web Service-Oriented Approach Zhou, M.
39 CMOS Sigma-Delta Converters: Practical Design Guide del R?o, R.
40 CMOS Voltage References: An Analytical and Practical Perspective Tam, W.
41 Certified Programming with Dependent Types: A Pragmatic Introduction to the Coq Proof Assistant Chlipala, A.
42 Collaborative Media: Production, Consumption, and Design Interventions Reimer, B.
43 Complex-Valued Neural Networks: Advances and Applications Hirose, A.
44 Computability: Turing, Gödel, Church, and Beyond Shagrir, O.
45 Contagious Architecture: Computation, Aesthetics, and Space Parisi, L.
46 Cosmopolitan Commons: Sharing Resources and Risks across Borders Kranakis, E.
47 Crowdsourcing: Brabham, D.
48 Digital Crossroads: Telecommunications Law and Policy in the Internet Age Weiser, P.
49 Digital Methods: Rogers, R.
50 Digital Microwave Communication: Engineering Point-to-Point Microwave Systems Kizer, G.
51 Direct Eigen Control for Induction Machines and Synchronous Motors: Alacoque, J.
52 Effective Interpersonal and Team Communication Skills for Engineers: Whitcomb, L.
53 Electrical Energy Conversion and Transport: An Interactive Computer-Based Approach Holbert, K.
54 Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers: Lipiansky, E.
55 Electromagnetic Simulation Using the FDTD Method: Sullivan, D.
56 Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures Dande, A.
57 Extruded Cables for High-Voltage Direct-Current Transmission: Advances in Research and Development Marzinotto, M.
58 Fast-Tracking Your Career: Soft Skills for Engineering and IT Professionals Chou, W.
59 Finite State Machines in Hardware: Theory and Design (with VHDL and SystemVerilog) Pedroni, V.
60 From X-rays to DNA: How Engineering Drives Biology Langer, R.
61 Functional Differential Geometry: Wisdom, J.
62 Future Trends in Microelectronics: Frontiers and Innovations Zaslavsky, A.
63 Girls Coming to Tech!: A History of American Engineering Education for Women Bix, A.
64 Global Networks: Engineering, Operations and Design Cambron, G.
65 Good Science: The Ethical Choreography of Stem Cell Research Thompson, C.
66 Handbook of Electrical Power System Dynamics: Modeling, Stability, and Control Shahidehpour, M.
67 Homeplug AV and IEEE 1901: A Handbook for PLC Designers and Users Katar, S.
68 Human Robotics: Neuromechanics and Motor Control Milner, T.
69 Humanity Enhanced: Genetic Choice and the Challenge for Liberal Democracies Blackford, R.
70 IPv6 Deployment and Management: Rooney, T.
71 Illumination Engineering: Design with Nonimaging Optics Koshel, R.
72 Imbalanced Learning: Foundations, Algorithms, and Applications Ma, Y.
73 Implosion: Lessons from National Security, High Reliability Spacecraft, Electronics, and the Forces Which Changed Them Temple, L.
74 Introduction to Neural Engineering for Motor Rehabilitation: Jensen, W.
75 Leading Open Innovation: Reichwald, R.
76 Micro and Nanotechnologies in Engineering Stem Cells and Tissues: Khademhosseini, A.
77 Mobile Ad Hoc Networking: The Cutting Edge Directions Stojmenovic, I.
78 Modern Machine Learning Techniques and Their Applications in Cartoon Animation Research: Tao, D.
79 Moving without a Body: Digital Philosophy and Choreographic Thoughts Portanova, S.
80 Music Navigation with Symbols and Layers: Toward Content Browsing with IEEE 1599 XML Encoding Haus, G.
81 Negotiating Cultural Encounters: Narrating Intercultural Engineering and Technical Communication Savage, G.
82 Numerical Analysis with Applications in Mechanics and Engineering: Pandrea, N.
83 Patently Contestable: Electrical Technologies and Inventor Identities on Trial in Britain Gooday, G.
84 Paul Lauterbur and the Invention of MRI: Dawson, M.
85 Periodic Structures: Mode-Matching Approach and Applications in Electromagnetic Engineering Hwang, R.
86 Phantasmal Media: An Approach to Imagination, Computation, and Expression Harrell, D.
87 Playing with Sound: A Theory of Interacting with Sound and Music in Video Games Collins, K.
88 Poiesis and Enchantment in Topological Matter: Plotnitsky, A.
89 Polarimetric Scattering and SAR Information Retrieval: Xu, F.
90 Public Key Cryptography: Applications and Attacks Batten, L.
91 Pulsewidth Modulated DC-to-DC Power Conversion: Circuits, Dynamics, and Control Designs Choi, B.
92 Regulating Code: Good Governance and Better Regulation in the Information Age Marsden, C.
93 Reinforcement Learning and Approximate Dynamic Programming for Feedback Control: Liu, D.
94 Research Misconduct Policy in Biomedicine: Beyond the Bad-Apple Approach Redman, B.
95 Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks McMakin, A.
96 Robot Futures: Nourbakhsh, I.
97 Robotics: Science and Systems VIII Srinivasa, S.
98 SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors Omura, Y.
99 Selective Visual Attention: Computational Models and Applications Lin, W.
100 Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid Bush, S.
101 Sonic Interaction Design: Serafin, S.
102 Spam: A Shadow History of the Internet Brunton, F.
103 The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business van Hemert, J.
104 The Outer Limits of Reason: What Science, Mathematics, and Logic Cannot Tell Us Yanofsky, N.
105 The Well-Played Game: A Player's Philosophy De Koven, B.
106 Uncertainty in Games: Costikyan, G.
107 Wireless Networking: Understanding Internetworking Challenges Kasch, W.
108 10 PRINT CHR$(205.5+RND(1)); : GOTO 10: Vawter, N.
109 802.1aq Shortest Path Bridging Design and Evolution: The Architect's Perspective Bragg, N.
110 A Guide to the Wireless Engineering Body of Knowledge (WEBOK): Jajszczyk, A.
111 ARC Flash Hazard Analysis and Mitigation: Das, J.
112 An Introduction to Audio Content Analysis: Applications in Signal Processing and Music Informatics Lerch, A.
113 Baseband Receiver Design for Wireless MIMO-OFDM Communications: Lai, I.
114 Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems Eustace, D.
115 Body Area Communications: Channel Modeling, Communication Systems, and EMC Wang, Q.
116 Boosting: Foundations and Algorithms Freund, Y.
117 Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents Blanchette, J.
118 Car Crashes without Cars: Lessons about Simulation Technology and Organizational Change from Automotive Design Leonardi, P.
119 Codename Revolution: The Nintendo Wii Platform Thiruvathukal, G.
120 Coding Places: Software Practice in a South American City Takhteyev, Y.
121 Cognitive Search: Evolution, Algorithms, and the Brain Todd, P.
122 Compiler Construction Using Java, JavaCC, and Yacc: Dos Reis, A.
123 Computer, Network, Software, and Hardware Engineering with Applications: Schneidewind, N.
124 Computing: A Concise History Ceruzzi, P.
125 Control of Power Inverters in Renewable Energy and Smart Grid Integration: Hornik, T.
126 Cyberpolitics in International Relations: Choucri, N.
127 Design Structure Matrix Methods and Applications: Browning, T.
128 Design for Reliability: Gullo, L.
129 Developments in Data Storage: Materials Perspective Chong, T.
130 Digital Filters: Principles and Applications with MATLAB Taylor, F.
131 Discovering the Human Connectome: Sporns, O.
132 Disturbance Analysis for Power Systems: Ibrahim, M.
133 Effective Cycling: Forester, J.
134 Electrical Modeling and Design for 3D System Integration: 3D Integrated Circuits and Packaging, Signal Integrity, Power Integrity and EMC Li, E.
135 Electromechanical Motion Devices: Pekarek, S.
136 Engineering a Safer World: Systems Thinking Applied to Safety Leveson, N.
137 Essentials of Computational Electromagnetics: Song, W.
138 Formal Methods for Industrial Critical Systems: A Survey of Applications Margaria, T.
139 Frequency Acquisition Techniques for Phase Locked Loops: Talbot, D.
140 Frequency Stability: Introduction and Applications Kroupa, V.
141 Frequency-Domain Analysis and Design of Distributed Control Systems: Tian, Y.
142 Game Invaders: The Theory and Understanding of Computer Games Massey, P.
143 Gas Insulated Transmission Lines (GIL): Koch, H.
144 Generalizations of Cyclostationary Signal Processing: Spectral Analysis and Applications Napolitano, A.
145 Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing Ebert, C.
146 Handbook of Position Location: Theory, Practice and Advances Buehrer, R.
147 Harnessing Green IT: Principles and Practices Gangadharan, G.
148 Human Information Interaction: An Ecological Approach to Information Behavior Fidel, R.
149 Hybrid Control and Motion Planning of Dynamical Legged Locomotion: Gruver, W.
150 Information Overload: An International Challenge for Professional Engineers and Technical Communicators Fazal, Z.
151 Internet Success: A Study of Open-Source Software Commons English, R.
152 Introduction to Laser Technology: Ewing, J.
153 Introduction to Wireless Localization: With iPhone SDK Examples Baciu, G.
154 Machine Learning in Image Steganalysis: Schaathun, H.
155 Machine Learning in Non-Stationary Environments: Introduction to Covariate Shift Adaptation Kawanabe, M.
156 Mastering System Identification in 100 Exercises: Pintelon, R.
157 Metabolism of the Anthroposphere: Analysis, Evaluation, Design Brunner, P.
158 Mining the Biomedical Literature: Craven, M.
159 Modern Lens Antennas for Communications Engineering: Huang, K.
160 Nanometer Frequency Synthesis Beyond the Phase-Locked Loop: Xiu, L.
161 Net Smart: How to Thrive Online Weeks, A.
162 Networked: The New Social Operating System Wellman, B.
163 Non-Gaussian Statistical Communication Theory: Middleton, D.
164 Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB Gharaibeh, K.
165 On Computing: The Fourth Great Scientific Domain Rosenbloom, P.
166 Open Access: Suber, P.
167 Practical Database Programming with Visual Basic.NET: Bai, Y.
168 Predictive Control of Power Converters and Electrical Drives: Cortes, P.
169 Quantum Mechanics for Electrical Engineers: Sullivan, D.
170 Real-Time Systems Design and Analysis: Tools for the Practitioner Ovaska, S.
171 Recoding Gender: Women's Changing Participation in Computing Abbate, J.
172 Reinforcement and Systemic Machine Learning for Decision Making: Kulkarni, P.
173 Reliability and Availability of Cloud Computing: Adams, R.
174 Remote Sensing and Actuation Using Unmanned Vehicles: Chen, Y.
175 Resource Allocation in Uplink OFDMA Wireless Systems: Optimal Solutions and Practical Implementations Dawy, Z.
176 Robot Ethics: The Ethical and Social Implications of Robotics Bekey, G.
177 Robotics: Science and Systems VII Abbeel, P.
178 Satellite Communications Payload and System: Braun, T.
179 Semantic Web and Model-Driven Engineering: Parreiras, F.
180 Service-Learning in the Computer and Information Sciences: Practical Applications in Engineering Education Nejmeh, B.
181 Signals and Boundaries: Building Blocks for Complex Adaptive Systems Holland, J.
182 Smart Grid: Fundamentals of Design and Analysis Momoh, J.
183 Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue Grinshpan, L.
184 Speaking Code: Coding as Aesthetic and Political Expression Berardi, F.
185 Streamlining Digital Signal Processing: A Tricks of the Trade Guidebook Lyons, R.
186 System Identification: A Frequency Domain Approach Schoukens, J.
187 Taken for Grantedness: The Embedding of Mobile Communication into Society Ling, R.
188 Telecommunications System Reliability Engineering, Theory, and Practice: Ayers, M.
189 The ComSoc Guide to Passive Optical Networks: Enhancing the Last Mile Access Luo, Y.
190 The Design Way: Intentional Change in an Unpredictable World Stolterman, E.
191 The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright Postigo, H.
192 The Future Was Here: The Commodore Amiga Maher, J.
193 The Machine Question: Critical Perspectives on AI, Robots, and Ethics Gunkel, D.
194 The More We Know: NBC News, Educational Innovation, and Learning from Failure Haas, J.
195 The Soar Cognitive Architecture: Laird, J.
196 The Technology of Nonviolence: Social Media and Violence Prevention Lederach, J.
197 The Voice in the Machine: Building Computers That Understand Speech Rabiner, L.
198 Tomorrow's Energy: Hydrogen, Fuel Cells, and the Prospects for a Cleaner Planet Dorgan, B.
199 Transmission Lines in Digital Systems for EMC Practitioners: Paul, C.
200 Ultrasonic Inspection Technology Development and Search Unit Design: Examples of Pratical Applications Brook, M.
201 Virtual Knowledge: Experimenting in the Humanities and the Social Sciences Wyatt, S.
202 Working on Mars: Voyages of Scientific Discovery with the Mars Exploration Rovers Clancey, W.
203 Advanced Biomedical Image Analysis: Haidekker, M.
204 Advanced Frequency Synthesis by Phase Lock: Egan, W.
205 Advanced Methods of Biomedical Signal Processing: Marchesi, C.
206 An Introduction to Network Modeling and Simulation for the Practicing Engineer: Ward, J.
207 An Introduction to Wavelet Modulated Inverters: Rahman, M.
208 Antenna Design for Mobile Devices: Zhang, Z.
209 Applications of High Temperature Superconductors to Electric Power Equipment: Kalsi, S.
210 Applied Intelligent Control of Induction Motor Drives: Shi, K.
211 CMOS Biomicrosystems: Where Electronics Meet Biology Iniewski, K.
212 Channel Equalization for Wireless Communications: From Concepts to Detailed Mathematics Bottomley, G.
213 Chaos in Electric Drive Systems: Analysis, Control and Application Wang, Z.
214 Climate Change and Global Energy Security: Technology and Policy Options Sovacool, B.
215 Code/Space: Software and Everyday Life Dodge, M.
216 Control of Electric Machine Drive Systems: Sul, S.
217 Data Mining: Concepts, Models, Methods, and Algorithms Kantardzic, M.
218 Design for Embedded Image Processing on FPGAs: Bailey, D.
219 Design of Multithreaded Software: The Entity-Life Modeling Approach Sand&#233n, B.
220 Digital Dead End: Fighting for Social Justice in the Information Age Eubanks, V.
221 Direct Methods for Stability Analysis of Electric Power Systems: Theoretical Foundation, BCU Methodologies, and Applications Chiang, H.
222 Discontinuities in the Electromagnetic Field: Idemen, M.
223 Divining a Digital Future: Mess and Mythology in Ubiquitous Computing Bell, G.
224 Doubly Fed Induction Machine: Modeling and Control for Wind Energy Generation Applications: Iwanski, G.
225 Electric Distribution Systems: Malik, O.
226 Electricity Power Generation: The Changing Dimensions Tagare, D.
227 Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Jacobs, S.
228 Engineering Quantum Mechanics: Park, S.
229 Engineering Systems: Meeting Human Needs in a Complex Technological World Vest, C.
230 Epistemology of the Cell: A Systems Perspective on Biological Knowledge Bittner, M.
231 Flexibility in Engineering Design: Scholtes, S.
232 Free Space Optical Networks for Ultra-Broad Band Services: Kartalopoulos, S.
233 Fundamentals of Sensor Network Programming: Applications and Technology Okoye, C.
234 Grid Converters for Photovoltaic and Wind Power Systems: Rodr?guez, P.
235 High Voltage Protection for Telecommunications: Blume, S.
236 High Voltage and Electrical Insulation Engineering: Mosch, W.
237 IP Address Management Principles and Practice: Rooney, T.
238 Integration of Distributed Generation in the Power System: Hassan, F.
239 Introduction to Autonomous Mobile Robots: Scaramuzza, D.
240 Introduction to Modeling and Simulation of Technical and Physical Systems with Modelica: Fritzson, P.
241 Laser Diodes and Their Applications to Communications and Information Processing: Numai, T.
242 Lead-Free Solder Process Development: Handwerker, C.
243 MIMO-OFDM for LTE, WiFi and WiMAX: Coherent versus Non-coherent and Cooperative Turbo Transceivers Jiang, M.
244 Maintaining Mission Critical Systems in a 24/7 Environment: Curtis, P.
245 Medical Image Analysis: Dhawan, A.
246 Millimeter Wave Communication Systems: Wang, Z.
247 Mobile Robots: Navigation, Control and Remote Sensing Cook, G.
248 Motion Control Systems: Ohnishi, K.
249 Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends Staszewski, R.
250 Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring Maybury, M.
251 NESC Handbook: A Discussion of the National Electrical Safety Code Clapp, A.
252 Near-Capacity Variable-Length Coding: Regular and EXIT-Chart-Aided Irregular Designs Yang, L.
253 Optical CDMA Networks: Principles, Analysis and Applications Karbassian, M.
254 Power Conversion and Control of Wind Energy Systems: Kouro, S.
255 Practical Database Programming with Java: Bai, Y.
256 Practical Image and Video Processing Using MATLAB: Marques, O.
257 Practical Lighting Design with LEDs: Lenk, C.
258 Principles of Microelectromechanical Systems: Lee, K.
259 Probabilistic Transmission System Planning: Li, W.
260 Single Event Effects in Aerospace: Petersen, E.
261 Social Modeling for Requirements Engineering: Fickas, S.
262 Standards: Recipes for Reality Busch, L.
263 Still Image and Video Compression with MATLAB: Thyagarajan, K.
264 The Atlas of New Librarianship: Lankes, R.
265 The Dark Side of Software Engineering: Evil on Computing Projects Glass, R.
266 The End of Energy: The Unmaking of America's Environment, Security, and Independence Graetz, M.
267 The Theory of Scintillation with Applications in Remote Sensing: Rino, C.
268 Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels Ng, S.
269 Understanding Geometric Algebra for Electromagnetic Theory: Arthur, J.
270 Unlocking Energy Innovation: How America Can Build a Low-Cost, Low-Carbon Energy System Hart, D.
271 Wireless Communications: Molisch, A.
272 3DTV Content Capture, Encoding and Transmission: Building the Transport Infrastructure for Commercial Services Minoli, D.
273 A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming Edwards, P.
274 Adaptive Signal Processing: Next Generation Solutions Haykin, S.
275 America Identified: Biometric Technology and Society Nelson, L.
276 Antenna Arrays: A Computational Approach Haupt, R.
277 Basics of Biomedical Ultrasound for Engineers: Azhari, H.
278 Biometrics: Theory, Methods, and Applications Micheli-Tzanakou, E.
279 Circuit Simulation: Najm, F.
280 ComSoc Pocket Guide to Managing Telecommunications Projects: Desmond, C.
281 Design for Reliability: Information and Computer-Based Systems Bauer, E.
282 Distributed Database Management Systems: A Practical Approach Haug, F.
283 EM Detection of Concealed Targets: Daniels, D.
284 Economic Market Design and Planning for Electric Power Systems: Mili, L.
285 Engineering Invention: Frank J. Sprague and the U.S. Electrical Industry Sprague, J.
286 Evolving Intelligent Systems: Methodology and Applications Kasabov, N.
287 Future Trends in Microelectronics: From Nanophotonics to Sensors to Energy Zaslavsky, A.
288 Fuzzy Control and Identification: Lilly, J.
289 Gender Codes: Why Women Are Leaving Computing Misa, T.
290 Good Faith Collaboration: The Culture of Wikipedia Lessig, L.
291 Grounds for Grounding: A Circuit to System Handbook Lock, K.
292 Handbook of Smart Antennas for RFID Systems: Karmakar, N.
293 Health Informatics: A Patient-Centered Approach to Diabetes Aspray, W.
294 Human Information Retrieval: Warner, J.
295 Image Processing and Pattern Recognition: Fundamentals and Techniques Shih, F.
296 Inductance: Loop and Partial Paul, C.
297 Instruction and Technology: Designs for Everyday Learning Mehlenbacher, B.
298 Internet Architecture and Innovation: van Schewick, B.
299 Introduction to IP Address Management: Rooney, T.
300 Introduction to Machine Learning: Alpaydin, E.
301 Korea's Online Gaming Empire: Jin, D.
302 Learning to Communicate in Science and Engineering: Case Studies from MIT Paradis, J.
303 MIMO-OFDM Wireless Communications with MATLAB<sup>&#174;</sup>: Kang, C.
304 Makers of the Microchip: A Documentary History of Fairchild Semiconductor Last, J.
305 Maxwell&#39;s Equations: Huray, P.
306 Mobile 3D Graphics SoC: From Algorithm to Chip Nam, B.
307 Mobile Intelligence: Yang, L.
308 Networks and States: The Global Politics of Internet Governance Mueller, M.
309 Neural-Based Orthogonal Data Fitting: The EXIN Neural Networks Cirrincione, M.
310 Next Generation Telecommunications Networks, Services, and Management: Sahin, V.
311 Operation and Control of Electric Energy Processing Systems: Mili, L.
312 Perceptual Computing: Aiding People in Making Subjective Judgments Wu, D.
313 Power Definitions and the Physical Mechanism of Power Flow: Emanuel, A.
314 Practical Database Programming With Visual C#.NET: Bai, Y.
315 Radio Frequency Circuit Design: Davis, W.
316 Reinventing the Automobile: Personal Urban Mobility for the 21st Century Burns, L.
317 Renewable Energy and Climate Change: Quaschning , V.
318 Restructured Electric Power Systems: Analysis of Electricity Markets with Equilibrium Models Zhang, X.
319 Robotic Micro-Assembly: R?gnier, S.
320 Semantic Computing: Zadeh, L.
321 Software Metrics and Software Metrology: Abran, A.
322 Surfaces and Interfaces of Electronic Materials: Brillson, L.
323 Technical Writing for Teams: The STREAM Tools Handbook Williams, S.
324 Texture: Human Expression in the Age of Communications Overload Harper, R.
325 The Comingled Code: Open Source and Economic Development Schankerman, M.
326 The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise Ensmenger, N.
327 The Configuration Space Method for Kinematic Design of Mechanisms: Joskowicz, L.
328 The Foundations of Signal Integrity: Huray, P.
329 The Privacy Advocates: Resisting the Spread of Surveillance Bennett, C.
330 Theory and Computation of Electromagnetic Fields: Jin, J.
331 Time and Frequency Domain Solutions of EM Problems Using Integral Equations and a Hybrid Methodology: De, A.
332 Time-Varying Waveform Distortions in Power Systems: Ribeiro, P.
333 Transmission Lines in Digital and Analog Electronic Systems: Signal Integrity and Crosstalk Paul, C.
334 Understanding Electric Power Systems: An Overview of the Technology, the Marketplace, and Government Regulation Casazza, J.
335 Voltage-Sourced Converters in Power Systems: Modeling, Control, and Applications Iravani, R.
336 WiMAX Technology and Network Evolution: Lai, M.
337 Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication Stojmenovic, I.
338 Wirelessness: Radical Empiricism in Network Cultures Mackenzie, A.
339 A Guide to the Wireless Engineering Body of Knowledge (WEBOK):  
340 Advanced Signal Integrity for High-Speed Digital Designs: Heck, H.
341 Advances in Multiuser Detection: Honig, M.
342 Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks: Boukerche, A.
343 Analysis and Design of Autonomous Microwave Circuits: Suarez, A.
344 At Your Service: Service-Oriented Computing from an EU Perspective Zwegers, A.
345 Building IBM: Shaping an Industry and Its Technology Pugh, E.
346 Chess Metaphors: Artificial Intelligence and the Human Mind Klosky, D.
347 Clustering: Wunsch, D.
348 Compact MOSFET Models for VLSI Design: Bhattacharyya, A.
349 Dataset Shift in Machine Learning: Lawrence, N.
350 Electro Static Discharge: Understand, Simulate, and Fix ESD Problems Mardiguian, M.
351 Expressive Processing: Digital Fictions, Computer Games, and Software Studies Wardrip-Fruin, N.
352 Finite Element Analysis of Antennas and Arrays: Riley, D.
353 Ground-Based Wireless Positioning: Guo, Y.
354 Handbook on Array Processing and Sensor Networks: Liu, K.
355 How Societies Embrace Information Technology: Lessons for Management and the Rest of Us Cortada, J.
356 Insulators for Icing and Polluted Environments: Chisholm, W.
357 Introduction to FACTS Controllers: Theory, Modeling, and Applications Sen, M.
358 Introduction to Magnetic Materials: Graham, C.
359 Learning Machine Translation: Foster, G.
360 MIMO Radar Signal Processing: Stoica, P.
361 Managing and Leading Software Projects: Fairley, R.
362 Mobile Communication Systems and Security: Rhee, M.
363 Modeling and Control of Fuel Cells: Distributed Generation Applications Wang, C.
364 Near-Capacity Multi-Functional MIMO Systems: Sphere-Packing, Iterative Detection and Cooperation Wu, N.
365 Optimization of Power System Operation: Zhu, J.
366 Parallel Solution of Integral Equation-Based EM Problems in the Frequency Domain: Sarkar, T.
367 Participatory IT Design: Designing for Business and Workplace Realities Simonsen, J.
368 Power Distribution System Reliability: Practical Methods and Applications Koval, D.
369 Practical System Reliability: Kimber, D.
370 Process Identification and PID Control: Lee, I.
371 Racing the Beam: The Atari Video Computer System Montfort, N.
372 Real-Time Stability Assessment in Modern Power System Control Centers: Savulescu, S.
373 Reliability Wearout Mechanisms in Advanced CMOS Technologies: Rauch, S.
374 Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks McMakin, A.
375 Robotics: Science and Systems IV Ramos, F.
376 Space-Time Layered Information Processing for Wireless Communications: Haykin, S.
377 Systems and Software Engineering with Applications: Schneidewind, N.
378 The Art of Agent-Oriented Modeling: Taveter, K.
379 The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN Helvoort, H.
380 The Ethics of Computer Games: Sicart, M.
381 Too Soon To Tell: Essays for the End of The Computer Revolution Grier, D.
382 Transforming Global Information and Communication Markets: The Political Economy of Innovation Abelson, D.
383 Transient-Induced Latchup in CMOS Integrated Circuits: Hsu, S.
384 Transportation in a Climate-Constrained World: Waitz, I.
385 Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes Losh, E.
386 Wired for Innovation: How Information Technology Is Reshaping the Economy Saunders, A.
387 Wireless Sensor Networks: A Networking Perspective Jamalipour, A.
388 Working-Class Network Society: Communication Technology and the Information Have-Less in Urban China Cartier, C.
389 3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation Ni, S.
390 Access Denied: The Practice and Policy of Global Internet Filtering Stein, J.
391 Adaptive Filters: Sayed, A.
392 Adaptive Inverse Control, Reissue Edition: A Signal Processing Approach Walach, E.
393 Advanced Design Techniques and Realizations of Microwave and RF Filters: Beneat, J.
394 Algorithms and Protocols for Wireless Sensor Networks: Boukerche, A.
395 Analysis of Multiconductor Transmission Lines: Paul, C.
396 Applied Industrial Energy and Environmental Management: Gvozdenac, D.
397 Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches Shen, Q.
398 Connections: Patterns of Discovery Smith, C.
399 Control and Freedom: Power and Paranoia in the Age of Fiber Optics Chun, W.
400 Dependability Benchmarking for Computer Systems: Spainhower, L.
401 Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK: Reay, D.
402 Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services McGrath, T.
403 Electromagnetic Shielding: Lovat, G.
404 Energy in Nature and Society: General Energetics of Complex Systems Smil, V.
405 Game Sound: An Introduction to the History, Theory, and Practice of Video Game Music and Sound Design Collins, K.
406 Governing Global Electronic Networks: International Perspectives on Policy and Power Wilson, E.
407 Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems Stojmenovic, I.
408 Handbook of Large Turbo-Generator Operation and Maintenance: Kerszenbaum, I.
409 High-Speed VLSI Interconnections: Goel, A.
410 How to Build a Person: A Prolegomenon Pollock, J.
411 IP Multicast with Applications to IPTV and Mobile DVB-H: Minoli, D.
412 Introduction to Electrical Power Systems: El-Hawary, M.
413 Kalman Filtering: Theory and Practice Using MATLAB Andrews, A.
414 Learning in Embedded Systems: Kaelbling, L.
415 Liberating Voices: A Pattern Language for Communication Revolution Schuler, D.
416 Mobile WiMAX: de Marca, J.
417 Modeling and Design Techniques for RF Power Amplifiers: Laskar, J.
418 Modern Heuristic Optimization Techniques: Theory and Applications to Power Systems El-Sharkawi, M.
419 Networked Publics: Varnelis, K.
420 Niche Envy: Marketing Discrimination in the Digital Age Turow, J.
421 Nonvolatile Memory Technologies with Emphasis on Flash: A Comprehensive Guide to Understanding and Using Flash Memory Devices Gill, M.
422 Passive Solar Buildings: Balcomb, J.
423 Phase-Lock Basics: Egan, W.
424 Policy-Driven Mobile Ad hoc Network Management: Kant, L.
425 Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards Walz, J.
426 Quantum Computing Without Magic: Devices Meglicki, Z.
427 RF Measurements for Cellular Phones and Wireless Data Systems: Frobenius, R.
428 Reflectarray Antennas: Encinar, J.
429 Riding the Waves: A Life in Sound, Science, and Industry Beranek, L.
430 Robotics: Science and Systems III Stachniss, C.
431 Scientific Collaboration on the Internet: Wulf, W.
432 Service-Oriented Computing: Papazoglou, M.
433 Software Maintenance Management: Evaluation and Continuous Improvement Abran, A.
434 Software Process Dynamics: Madachy, R.
435 Stuck in the Shallow End: Education, Race, and Computing Nao, K.
436 TCP/IP Architecture, Design and Implementation in Linux: Venkatesulu, M.
437 The Elements of Computing Systems: Building a Modern Computer from First Principles Schocken, S.
438 The Inner History of Devices: Turkle, S.
439 The Internet and American Business: Ceruzzi, P.
440 The Mechanical Mind in History: Wheeler, M.
441 The Stripline Circulators: Theory and Practice Helszajn, J.
442 Tutorial on Hardware and Software Reliability, Maintainability and Availability: Schneidewind, N.
443 UMTS Network Planning, Optimization, and Inter-Operation with GSM: Rahnema, M.
444 Ultra-Wideband Communications Systems: Multiband OFDM Approach Liu, K.
445 Understanding Lasers: An Entry-Level Guide Hecht, J.
446 VLSI Circuit Design Methodology Demystified: A Conceptual Taxonomy Xiu, L.
447 Video Compression and Communications: From Basics to H.261, H.263, H.264, MPEG4 for DVB and HSDPA-Style Adaptive Turbo-Transceivers Streit, J.
448 Video Game Spaces: Image, Play, and Structure in 3D Worlds Nitsche, M.
449 Wireless Broadband: Conflict and Convergence Sharma, C.
450 Wireless LAN Radios: System Definition to Transistor Design Behzad, A.
451 Wireless Local Area Networks Quality of Service: An Engineering Perspective Aboul-Magd, O.
452 Women and Information Technology: Research on Underrepresentation Aspray, W.
453 Advanced FPGA Design: Architecture, Implementation, and Optimization Kilts, S.
454 Advanced Integrated Communication Microsystems: Tantzeris, M.
455 Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference Hofmann, T.
456 Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective van den Heuvel, W.
457 An Introduction to Communication Network Analysis: Kesidis, G.
458 Applied Cryptanalysis: Breaking Ciphers in the Real World Low, R.
459 Automated Defect Prevention: Best Practices in Software Management Kolawa, A.
460 Autonomous Bidding Agents: Strategies and Lessons from the Trading Agent Competition Stone, P.
461 Bayesian Bounds for Parameter Estimation and Nonlinear Filtering/Tracking: Bell, K.
462 Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments Czerwinski, M.
463 Communications Engineering: Essentials for Computer Scientists and Electrical Engineers Lin, J.
464 Computational Intelligence in Bioinformatics: Pan, Y.
465 Cornucopia Limited: Design and Dissent on the Internet Coyne, R.
466 Designing with Blends: Conceptual Foundations of Human-Computer Interaction and Software Engineering Benyon, D.
467 Electric Power Planning for Regulated and Deregulated Markets: Mazer, A.
468 Electric Power System Basics for the Nonelectrical Professional: Blume, S.
469 Electromagnetic Fields: Bladel, J.
470 Elements of Tidal-Electric Engineering: Clark, R.
471 Embedded Signal Processing with the Micro Signal Architecture: Kuo, S.
472 Embodied Music Cognition and Mediation Technology: Leman, M.
473 Fiber Optic Essentials: Ghatak, A.
474 Fundamentals of the Physical Theory of Diffraction: Ufimtsev, P.
475 Future Trends in Microelectronics: Up the Nano Creek Zaslavsky, A.
476 Fuzzy Systems Engineering: Toward Human-Centric Computing Gomide, F.
477 Genetic Algorithms in Electromagnetics: Werner, D.
478 Genomics and Proteomics Engineering in Medicine and Biology: Akay, M.
479 Grounding and Shielding: Circuits and Interference Morrison, R.
480 HCI Remixed: Reflections on Works That Have Influenced the HCI Community McDonald, D.
481 Handbook of Neural Engineering: Akay, M.
482 High Performance Switches and Routers: Liu, B.
483 IEEE Computer Society Real-World Software Engineering Problems: A Self-Study Guide for Today&#39;s Software Professional Seidman, S.
484 Instantaneous Power Theory and Applications to Power Conditioning: Aredes, M.
485 Introduction to Evolvable Hardware: A Practical Guide for Designing Self-Adaptive Systems Tyrrell, A.
486 Introduction to Statistical Relational Learning: Taskar, B.
487 Knowledge Structures for Communications in Human-Computer Systems: General Automata-Based Koenig, E.
488 Large-Scale Kernel Machines: Weston, J.
489 Lead-Free Electronics: iNEMI Projects Lead to Successful Manufacturing Gedney, R.
490 Learning from Data: Concepts, Theory, and Methods Mulier, F.
491 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4 Barrett, R.
492 Maintaining Mission Critical Systems in a 24/7 Environment: Curtis, P.
493 Mobile Communication and Society: A Global Perspective Sey, A.
494 Music and Probability: Temperley, D.
495 Network Security: Current Status and Future Directions Serpanos, D.
496 New Directions in Statistical Signal Processing: From Systems to Brains Mcwhirter, J.
497 Perspectives on Free and Open Source Software: huff, K.
498 Practical Support for ISO 9001 Software Project Documentation: Using IEEE Software Engineering Standards Walz, J.
499 Predicting Structured Data: Vishwanathan, S.
500 Press On: Principles of Interaction Programming Thimbleby, H.
501 Privacy on the Line: The Politics of Wiretapping and Encryption Landau, S.
502 Radio System Design for Telecommunication: Freeman, R.
503 Remote Sensing with Polarimetric Radar: Mott, H.
504 Scholarship in the Digital Age: Information, Infrastructure, and the Internet Borgman, C.
505 Software Engineering: Barry W. Boehm&#39;s Lifetime Contributions to Software Development, Management, and Research Selby, R.
506 Software Management: Boehm, B.
507 Software Testing: Testing Across the Entire Software Development Life Cycle McLeod, R.
508 Streamlining Digital Signal Processing: A Tricks of the Trade Guidebook Lyons, R.
509 Technology as Experience: Wright, P.
510 Tectonic Faults: Agents of Change on a Dynamic Earth Hovius, N.
511 The Best of the Best: Fifty Years of Communications and Networking Research Mark, J.
512 The Minimum Description Length Principle: Grünwald, P.
513 The Robotics Primer: Mataric, M.
514 The Web&#39;s Awake: An Introduction to the Field of Web Science and the Concept of Web Life Tetlow, P.
515 Thoughtful Interaction Design: A Design Perspective on Information Technology Stolterman, E.
516 Toward Brain-Computer Interfacing: Müller, K.
517 Understanding Knowledge as a Commons: From Theory to Practice Ostrom, E.
518 Using OpenMP: Portable Shared Memory Parallel Programming van der Pas, R.
519 Voice and Audio Compression for Wireless Communications: Woodard, J.
520 Web Application Design and Implementation: Apache 2, PHP5, MySQL, JavaScript, and Linux/UNIX Gabarro, S.
521 Wireless Internet and Mobile Computing: Interoperability and Performance Lau, V.
522 Acting with Technology: Activity Theory and Interaction Design Nardi, B.
523 Advanced Electronic Packaging: With Emphasis on Multichip Modules Brown, W.
524 Advanced Electronic Packaging: Brown, W.
525 Advancing Knowledge and The Knowledge Economy: Foray, D.
526 Aesthetic Computing: Fishwick, P.
527 CODE: Collaborative Ownership and the Digital Economy Ghosh, R.
528 Change of State: Information, Policy, and Power Braman, S.
529 Computational Auditory Scene Analysis: Principles, Algorithms, and Applications Brown, G.
530 Conformal Array Antenna Theory and Design: Persson, P.
531 Contamination and ESD Control in High Technology Manufacturing: Newberg, C.
532 Crystal Clear: The Struggle for Reliable Communications Technology in World War II Thompson, R.
533 Data Mining Methods and Models: Larose, D.
534 Electric Bicycles: A Guide to Design and Use Oman, H.
535 Electric Power Systems: A Conceptual Introduction Meier, A.
536 Electromagnetic Metamaterials: Transmission Line Theory and Microwave Applications Itoh, T.
537 Emergent Information Technologies and Enabling Policies for Counter-Terrorism: Yen, J.
538 Engineering Your Retirement: Retirement Planning for Technology Professionals Golio, M.
539 Ethernet in the First Mile: Access for Everyone Frazier, H.
540 Evolutionary Computation: A Unified Approach De Jong, K.
541 Evolutionary Computation: Toward a New Philosophy of Machine Intelligence Fogel, D.
542 FTTX Concepts and Applications: Keiser, G.
543 Fundamentals of Semiconductor Manufacturing and Process Control: Spanos, C.
544 Group Cognition: Computer Support for Building Collaborative Knowledge Stahl, G.
545 High-Power Converters and AC Drives: Wu, B.
546 History of Wireless: Sengupta, D.
547 Human Rights in the Global Information Society: Jørgensen, R.
548 Information Politics on the Web: Rogers, R.
549 Information Security: A Strategic Approach LeVeque, V.
550 Integration of Alternative Sources of Energy: Sim&#245es, M.
551 Journey to Data Quality: Lee, Y.
552 Jumpstart CMM<sup>?</sup>/CMMI<sup>?</sup>?Software Process Improvements: Using?IEEE Software Engineering Standards Land, S.
553 Magnetic Actuators and Sensors: Brauer, J.
554 Managing Power Electronics: VLSI and DSP-Driven Computer Systems Rossetti, N.
555 Managing Projects in Telecommunication Services: Sherif, M.
556 Math Refresher for Scientists and Engineers: Fanchi, J.
557 Metamaterials: Physics and Engineering Explorations Ziolkowski, R.
558 Model-Based Signal Processing: Candy, J.
559 Modern Industrial Automation Software Design: Tan, K.
560 Multigrid Finite Element Methods for Electromagnetic Field Modeling: Cangellaris, A.
561 NESC Handbook: A Discussion of the National Electrical Safety Code Clapp, A.
562 Nearest-Neighbor Methods in Learning and Vision: Theory and Practice Indyk, P.
563 OFDM and MC-CDMA: A Primer Keller, T.
564 Online Stochastic Combinatorial Optimization: Van Hentenryck, P.
565 Performance-Based Earned Value: Young, R.
566 Personal, Portable, Pedestrian: Mobile Phones in Japanese Life Okabe, D.
567 Practical Support for CMMI-SW Software Project Documentation Using IEEE Software Engineering Standards: Walz, J.
568 Putt&#39;s Law and the Successful Technocrat: How to Win in the Information Age Putt, A.
569 RF/Microwave Interaction with Biological Tissues: Kotsuka, Y.
570 RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability Chu, P.
571 Semi-Supervised Learning: Schölkopf, B.
572 Semiconductor Material and Device Characterization: Schroder, D.
573 Sensor Network Operations: Griffin, C.
574 Signal Processing of Power Quality Disturbances: Gu, I.
575 Software Engineering for Internet Applications: Grumet, A.
576 Software Measurement and Estimation: A Practical Approach Brennan, M.
577 System Modeling in Cellular Biology: From Concepts to Nuts and Bolts Periwal, V.
578 The Cognitive Dynamics of Computer Science: Cost-Effective Large Scale Software Development Tarbell, M.
579 The Pentium Chronicles: The People, Passion, and Politics Behind Intel&#39;s Landmark Chips Colwell, R.
580 The Road Map to Software Engineering: A Standards-Based Guide Moore, J.
581 Uncertainty and Information: Foundations of Generalized Information Theory Klir, G.
582 Web Campaigning: Schneider, S.
583 WirelessMAN<sup>&#174;</sup>: Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks van Waes, N.
584 Computationally Intelligent Hybrid Systems: The Fusion of Soft Computing and Hard Computing Ovaska, S.
585 Digital Communication over Fading Channels: Alouini, M.
586 Digital Transmission Engineering: Anderson, J.
587 Electrical Energy Conversion and Transport: An Interactive Computer-Based Approach Holbert, K.
588 Energy at the Crossroads: Global Perspectives and Uncertainties Smil, V.
589 Engineering Education: Research and Development in Curriculum and Instruction Heywood, J.
590 Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design: Astola, J.
591 Fundamentals of Telecommunications: Freeman, R.
592 Gaussian Processes for Machine Learning: Williams, C.
593 IEEE 802.11 Handbook: A Designer&#39;s Companion Petrick, A.
594 Imitation of Life: How Biology Is Inspiring Computing Forbes, N.
595 Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future Directions Ooi, W.
596 Modern Antenna Design: Milligan, T.
597 Modern Microwave and Millimeter-Wave Power Electronics: Nusinovich, G.
598 Negative-Refraction Metamaterials: Fundamental Principles and Applications Balmain, K.
599 Next Generation of Data-Mining Applications: Zurada, J.
600 Open Process Frameworks: Patterns for the Adaptive e-Enterprise Marca, D.
601 Practical Design of Power Supplies: Lenk, R.
602 Principles of Robot Motion: Theory, Algorithms, and Implementations Thrun, S.
603 Rating of Electric Power Cables in Unfavorable Thermal Environment: Anders, G.
604 Risk Assessment Of Power Systems: Models, Methods, and Applications Li, W.
605 Software Ecosystem: Understanding an Indispensable Technology and Industry Szyperski, C.
606 Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement Tian, J.
607 Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential Berners-Lee, T.
608 Tele-Visionaries: The People Behind the Invention of Television Webb, R.
609 The Reasoned Schemer: Kiselyov, O.
610 The Second Self: Computers and the Human Spirit Turkle, S.
611 Trustworthy Systems Through Quantitative Software Engineering: Yuhas, C.
612 Tunable Laser Diodes and Related Optical Sources: Blumenthal, D.
613 Turing (A Novel about Computation): Papadimitriou, C.
614 Understanding Delta-Sigma Data Converters: Temes, G.
615 Understanding Information Transmission: Johnnesson, R.
616 Wireless Dictionary: Gilb, J.
617 Acoustic Echo and Noise Control: A Practical Approach Schmidt, G.
618 Activity-Centered Design: An Ecological Approach to Designing Smart Tools and Usable Systems Hembrooke, H.
619 Algorithmic Program Debugging: Shapiro, E.
620 Ant Colony Optimization: Stützle, T.
621 Artificial Life IX: Proceedings of the Ninth International Conference on the Simulation and Synthesis of Living Systems Ikegami, T.
622 Bicycling Science: Wilson, D.
623 C# Precisely: Hansen, H.
624 CMOS Electronics: How It Works, How It Fails Hawkins, C.
625 Circuit Design with VHDL: Pedroni, V.
626 Communication Patterns of Engineers: King, D.
627 Concepts, Techniques, and Models of Computer Programming: Haridi, S.
628 Concurrent and Distributed Computing in Java: Garg, V.
629 Design Through Verilog HDL: Sundari, B.
630 Designing Sociable Robots: Breazeal, C.
631 Differential Forms in Electromagnetics: Lindell, I.
632 Earth System Analysis for Sustainability: Held, H.
633 Electrical Insulation for Rotating Machines: Design, Evaluation, Aging, Testing, and Repair Dhirani, H.
634 Electromyography: Physiology, Engineering, and Non-Invasive Applications Parker, P.
635 Evolutionary Robotics: The Biology, Intelligence, and Technology of Self-Organizing Machines Floreano, D.
636 Fatal Exit: The Automotive Black Box Debate Kowalick, T.
637 Feedback Control of Computing Systems: Diao, Y.
638 From animals to animats 8: Proceedings of the Eighth International Conference on the Simulation of Adaptive Behavior Meyer, J.
639 Generating Language-Based Environments: Reps, T.
640 Handbook of Learning and Approximate Dynamic Programming: Powell, W.
641 Handbook to IEEE Standard 45: A Guide to Electrical Installations on Shipboard Islam, M.
642 High Frequency Techniques: An Introduction to RF and Microwave Engineering White, J.
643 Histories of the Electron: The Birth of Microphysics Warwick, A.
644 Independent Component Analysis: A Tutorial Introduction Stone, J.
645 Intellectual Property Law for Engineers and Scientists: Rockman, H.
646 Introduction to WLLs: Application and Deployment for Fixed and Broadband Services Pandya, R.
647 It Sounded Good When We Started: A Project Manager&#39;s Guide to Working with People on Projects O&#39Bryan, R.
648 Kernel Methods in Computational Biology: Vert, J.
649 Machine Musicianship: Rowe, R.
650 Microwave Photonics: Devices and Applications Iezekiel, S.
651 Mobile Ad Hoc Networking: Stojmenovic, I.
652 Multicomputer Networks: Message-Based Parallel Processing Fujimoto, R.
653 Next Generation SONET/SDH: Voice and Data Kartalopoulos, S.
654 Nonlinear Dynamic Modeling of Physiological Systems: Marmarelis, V.
655 Operation and Maintenance of Large Turbo-Generators: Kerszenbaum, I.
656 Optical Bit Error Rate: An Estimation Methodology Kartalopoulos, S.
657 Optical WDM Networks: Concepts and Design Principles Mouftah, H.
658 Principles of Object-Oriented Modeling and Simulation with Modelica 2.1: Fritzson, P.
659 Quadrature Amplitude Modulation: From Basics to Adaptive Trellis-Coded, Turbo-Equalised and Space-Time Coded OFDM, CDMA and MC-CDMA Systems Webb, W.
660 Radar Signals: Mozeson, E.
661 Real-Time Systems Design and Analysis: Laplante, P.
662 Reasoning About Knowledge: Vardi, M.
663 Renewable and Efficient Electric Power Systems: Masters, G.
664 Silicon Germanium: Technology, Modeling, and Design Harame, D.
665 Single and Multi-Carrier DS-CDMA: Multi-User Detection, Space-Time Spreading, Synchronisation, Networking?and Standards Yen, K.
666 Social Capital and Information Technology: Wulf, V.
667 Stuff You Don&#39;t Learn in Engineering School: Skills for Success in the Real World Selinger, C.
668 Technology and Social Inclusion: Rethinking the Digital Divide Warschauer, M.
669 Testing for EMC Compliance: Approaches and Techniques Nakauchi, E.
670 The Software Project Manager&#39;s Handbook: Principles That Work at Work Phillips, D.
671 The Turing Test: Verbal Behavior as the Hallmark of Intelligence Shieber, S.
672 Theory of Code Division Multiple Access Communication: Zigangirov, K.
673 Transforming Enterprise: The Economic and Social Implications of Information Technology Wyckoff, A.
674 Trellis and Turbo Coding: Perez, L.
675 Understanding Electric Power Systems: An Overview of the Technology and the Marketplace Delea, F.
676 Virtual Music: Computer Synthesis of Musical Style Cope, D.
677 Where the Action Is: The Foundations of Embodied Interaction Dourish, P.
678 Wiley Electrical and Electronics Engineering Dictionary: Kaplan, S.
679 Wireless Communication Standards: A Study of IEEE 802.11, 802.15, 802.16 Cooklev, T.
680 Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard Gilb, J.
681 A Grammatical View of Logic Programming: Maluszy¿ski, J.
682 A History of Online Information Services, 1963-1976: Hahn, T.
683 A Robot Ping-Pong Player: Experiments in Real-Time Intelligent Control Andersson, R.
684 A Social History of Engineering: Armytage, W.
685 Adaptive Control Design and Analysis: Tao, G.
686 Advanced Semiconductor Memories: Architectures, Designs, and Applications Sharma, A.
687 Antenna Theory & Design: Elliott, R.
688 Bandwagon Effects in High Technology Industries: Varian, H.
689 Beyond Our Control?: Confronting the Limits of Our Legal System in the Age of Cyberspace Biegel, S.
690 Communication Researchers and Policy-making: Braman, S.
691 Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing Wang, Y.
692 Complex Electromagnetic Problems and Numerical Simulation Approaches: Sevgi, L.
693 Computational Intelligence: The Experts Speak Robinson, C.
694 Computationalism: New Directions Scheutz, M.
695 Computers and Design in Context: Mathiassen, L.
696 Constraint-Based Grammar Formalisms: Parsing and Type Inference for Natural and Computer Languages Shieber, S.
697 Cyber Rights: Defending Free speech in the Digital Age Godwin, M.
698 Data Mining: Concepts, Models, Methods, and Algorithms Kantardzic, M.
699 Database Design and Development: An Essential Guide for IT Professionals Ponniah, P.
700 Digital Library Use: Social Practice in Design and Evaluation Schatz, B.
701 Digital System Clocking: High-Performance and Low-Power Aspects Nedovic, N.
702 Do the Right Thing: Studies in Limited Rationality Wefald, E.
703 Electric Power Systems: Analysis and Control Saccomanno, F.
704 Electricity Economics: Regulation and Deregulation G&#243mez, T.
705 Essential Communication Strategies: For Scientists, Engineers, and Technology Professionals Hirsch, H.
706 Finite Antenna Arrays and FSS: Munk, B.
707 Foundations of Robotics: Analysis and Control Yoshikawa, T.
708 From Gutenberg to the Global Information Infrastructure: Access to Information in the Networked World Borgman, C.
709 IBM&#39;s 360 and Early 370 Systems: Palmer, J.
710 Identification of Nonlinear Physiological Systems: Kearney, R.
711 Implementation of Solar Thermal Technology: West, R.
712 Information Technology and People: Designing for the Future Oborne, D.
713 Insulated Gate Bipolar Transistor IGBT Theory and Design: Khanna, V.
714 Integrated Passive Component Technology: Schaper, L.
715 Intentions in Communication: Pollack, M.
716 Introduction to Biomedical Imaging: Webb, A.
717 Iterative Arrays of Logical Circuits: Hennie, F.
718 Kinetics of High-Temperature Processes: Kingery, W.
719 Lab on the Web: Running Real Electronics Experiments via the Internet Shur, M.
720 Leonardo&#39;s Laptop: Human Needs and the New Computing Technologies Shneiderman, B.
721 Linear Time-Invariant Systems: Schetzen, M.
722 Low-Density Parity-Check Codes: Gallagher, R.
723 Made-Up Minds: A Constructivist Approach to Artificial Intelligence Drescher, G.
724 Magnetohydrodynamic Shock Waves: Anderson, E.
725 Making Use: Scenario-Based Design of Human-Computer Interactions Carroll, J.
726 Managing IP Networks: Challenges and Opportunities Valcarenghi, L.
727 Meme Media and Meme Market Architectures: Knowledge Media for Editing, Distributing, and Managing Intellectual Resources Tanaka, Y.
728 Metadyne Statics: Pestarini, J.
729 Metamodeling: A Study of Approximations in Queueing Models Agrawal, S.
730 Music and Connectionism: Loy, G.
731 NETL: A System for Representing and Using Real-World Knowledge Fahlman, S.
732 Neural Computing Architectures: The Design of Brain-Like Machines Aleksander, I.
733 Neurobiology of Neural Networks: Gardner, D.
734 Noise in Electron Devices: Haus, H.
735 Notes on Analog-Digital Coversion Techniques: Susskind, A.
736 OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting: Keller, T.
737 Optimization Principles: Practical Applications to the Operation and Markets of the Electric Power Industry Rau, N.
738 Performance Analysis of Data-Sharing Environments: Dan, A.
739 Phase-Locking in High-Performance Systems: From Devices to Architectures Razavi, B.
740 Power Generation and Environmental Change: Squires, A.
741 Power System Control and Stability: Fouad, A.
742 Power-System Reliability Calculations: Wood, A.
743 Practical RF System Design: Egan, W.
744 Programming with Objects: A Comparative Presentation of Object-Oriented Programming With C++ and Java Kak, A.
745 Pulse Width Modulation for Power Converters: Principles and Practice Lipo, T.
746 Random Processes: Filtering, Estimation, and Detection Ludeman, L.
747 Readings in Machine Translation: Wilks, Y.
748 Reasoning about Rational Agents: Wooldridge, M.
749 Research Directions in Concurrent Object-Oriented Programming: Yonezawa, A.
750 Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies Wildman, S.
751 Scalable Input/Output: Achieving System Balance Reed, D.
752 Shaping the Network Society: The New Role of Civil Society in Cyberspace Day, P.
753 Signal Analysis: Time, Frequency, Scale, and Structure Mills, D.
754 Smart Antennas: Bonneau, R.
755 Software Development Failures: Ewusi-Mensah, K.
756 Software-Enabled Control: Information Technology for Dynamical Systems Balas, G.
757 Solar Resources: Hulstrom, R.
758 Solving Problems in Environmental Engineering and Geosciences with Artificial Neural Networks: Rogers, L.
759 State Variables and Communication Theory: Baggeroer, A.
760 Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory Homma, N.
761 Statistical Energy Analysis of Dynamical Systems: Theory and Applications Lyon, R.
762 Stochastic Approximation and NonLinear Regression: Gardner, L.
763 Structures Technology for Large Radio and Radar Telescope Systems: Liebowitz, H.
764 The LOCUS Distributed System Architecture: Popek, G.
765 The Practice of Prolog: Sterling, L.
766 The Principles of Switching Circuits: Edwards, F.
767 The Rapid Evaluation of Potential Fields in Particle Systems: Greengard, L.
768 The Short Road to Great Presentations: How to Reach Any Audience Through Focused Preparation, Inspired Delivery, and Smart Use of Technology Reimold, P.
769 The Theory of Turbulent Jets: Schindel, L.
770 The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family Kavanaugh, A.
771 The Worldwide History of Telecommunications: Huurdeman, A.
772 Thermodynamics for Chemical Engineers: Saville, G.
773 Trace Theory for Automatic Hierarchical Verification of Speed-Independent Circuits: Dill, D.
774 Tracing Genres through Organizations: A Sociocultural Approach to Information Design Spinuzzi, C.
775 Understanding Calculus: Bear, H.
776 Urban Air Pollution Modeling: Benarie, M.
777 Using Hard Problems to Create Pseudorandom Generators: Nisan, N.
778 Visual Reconstruction: Zisserman, A.
779 Wavelets in Electromagnetics and Device Modeling: Pan, G.
780 2D Object Detection and Recognition: Models, Algorithms, and Networks Amit, Y.
781 Adaptive Wireless Transceivers: Turbo-Coded, Turbo-Equalized and Space-Time Coded TDMA, CDMA, and OFDM Systems Yee, M.
782 Analog VLSI: Circuits and Principles Mead, C.
783 Analysis of Electric Machinery and Drive Systems: Sudhoff, S.
784 Artifacts: An Archaeologist&#39;s Year in Silicon Valley Finn, C.
785 Biomedical Signal Analysis: A Case-Study Approach Rangayyan, R.
786 Communications Policy and Information Technology: Promises, Problems, Prospects Greenstein, S.
787 Complete Guide to Semiconductor Devices: Ng, K.
788 Computer-Aided Design of Analog Integrated Circuits and Systems: Antao, B.
789 Current Topics in Computational Molecular Biology: Zhang, M.
790 DWDM: Networks, Devices, and Technology Kartalopoulos, S.
791 Distributed Work: Kiesler, S.
792 Electromagnetic Anechoic Chambers: A Fundamental Design and Specification Guide Hemming, L.
793 Foundations of Object-Oriented Languages: Types and Semantics Bruce, K.
794 From animals to animats 7: Proceedings of the Seventh International Conference on Simulation of Adaptive Behavior Hayes, G.
795 High Performance Mass Storage and Parallel I/O: Technologies and Applications Jin, H.
796 Imitation in Animals and Artifacts: Nehaniv, C.
797 Intelligent Image Processing: Mann, S.
798 Market Operations in Electric Power Systems: Forecasting, Scheduling, and Risk Management Li, Z.
799 Mixed-Signal Systems: A Guide to CMOS Circuit Design Handkiewicz, A.
800 Power System Economics: Designing Markets for Electricity Stoft, S.
801 Precoding and Signal Shaping for Digital Transmission: Fischer, R.
802 Principles of Electric Machines with Power Electronic Applications: El-Hawary, M.
803 Principles of Random Signal Analysis and Low Noise Design: The Power Spectral Density and its Applications Howard, R.
804 Signal Integrity Effects in Custom IC and ASIC Designs: Singh, R.
805 Social Consequences of Internet Use: Access, Involvement, and Interaction Rice, R.
806 Sourcebook of ATM and IP Internetworking: Ahmad, K.
807 System Theory and Practical Applications of Biomedical Signals: Baura, G.
808 The First Computers: History and Architectures Hashagen, U.
809 The MIT Guide to Science and Engineering Communication: Zimmerman, M.
810 Third-Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation Hanzo, L.
811 Thyristor-Based FACTS Controllers for Electrical Transmission Systems: Varma, R.
812 Turbo Coding, Turbo Equalisation and Space-Time Coding for Transmission over Fading Channels: Yeap, B.
813 Types and Programming Languages: Pierce, B.
814 Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide Nellist, J.
815 Voltage References: From Diodes to Precision High-Order Bandgap Circuits Rincon-Mora, G.
816 Wireless Communications in the 21st Century: Hattori, T.
817 A Field Guide to Dynamical Recurrent Networks: Kremer, S.
818 Accelerated Stress Testing Handbook: Guide for Achieving Quality Products Chan, H.
819 Accessing and Browsing Information and Communication: Chang, S.
820 Adaptive Antennas for Wireless Communications: Tsoulos, G.
821 Advanced Mean Field Methods: Theory and Practice Saad, D.
822 Advances in the Evolutionary Synthesis of Intelligent Agents: Balakrishnan, K.
823 Beowulf Cluster Computing with Linux: Sterling, T.
824 Beowulf Cluster Computing with Windows: Sterling, T.
825 Bioinformatics, second edition: The Machine Learning Approach Brunak, S.
826 Communications Policy in Transition: The Internet and Beyond Greenstein, S.
827 Control Theory: Twenty-Five Seminal Papers (1932-1981) Basar, T.
828 Coplanar Waveguide Circuits, Components, and Systems: Simons, R.
829 Crypto Anarchy, Cyberstates, and Pirate Utopias: Ludlow, P.
830 Design and Analysis of Magnetoresistive Recording Heads: Williams, E.
831 Design of High-Performance Microprocessor Circuits: Fox, F.
832 Digital Libraries: Arms, W.
833 Empirical Methods for Exploiting Parallel Texts: Melamed, I.
834 Engineering Electromagnetic Compatibility: Principles, Measurements, Technologies, and Computer Models Kodali, W.
835 Engineering Superconductivity: Lee, P.
836 Ethics and Computing: Living Responsibly in a Computerized World Bowyer, K.
837 Fault Detectability in DWDM: Toward Higher Signal Quality and System Reliability Kartalopoulos, S.
838 Foundations for Microwave Engineering: Collin, R.
839 Fundamentals of Digital Television Transmission: Collins, G.
840 Graphical Models: Foundations of Neural Computation Sejnowski, T.
841 Hargrave&#39;s Communications Dictionary: Hargrave, F.
842 High-Power Microwave Sources and Technologies: Schamiloglu, E.
843 How to Design Programs: An Introduction to Programming and Computing Krishnamurthi, S.
844 Information Technologies in Medicine, Medical Simulation and Education: Marsh, A.
845 Information Technologies in Medicine, Rehabilitation and Treatment: Marsh, A.
846 Intelligent Signal Processing: Kosko, B.
847 Internet Telephony: Clark, D.
848 Introduction to Laser Technology: Hecht, J.
849 Introduction to Microwave Circuits: Radio Frequency and Design Applications Weber, R.
850 Learning Kernel Classifiers: Theory and Algorithms Herbrich, R.
851 Learning and Soft Computing: Support Vector Machines, Neural Networks, and Fuzzy Logic Models Kecman, V.
852 Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond Smola, A.
853 Materials Matter: Toward a Sustainable Materials Policy Commoner, B.
854 Mechanics of Robotic Manipulation: Mason, M.
855 Mind and Mechanism: McDermott, D.
856 Mosfet Models for Spice Simulation, Including BSIM3v3 and BSIM4: Liu, W.
857 The Computer Age: A Twenty-Year View Moses, J.
858 Project Icarus Systems Engineering:  
859 Telecommunications Switching Principles: Hills, M.
860 The Interpretation of Visual Motion: Ullman, S.
861 Ferromagnetism: Bozorth, R.
862 Magnetic Circuits and Transformers: A First Course for Power and Communication Engineers Press, M.
863 Marine Hydrodynamics: Newman, J.
864 Microwave Mobile Communications: Jakes, W.
865 A First Course in Turbulence: Lumley, J.
866 The Analysis of Feedback Systems:  
867 Estimation and Control with Quantized Measurements: Curry, R.
868 Information, Mechanism and Meaning: MacKay, D.
869 Papers on Digital Signal Processing: Press, M.
870 Computer Methods in the Analysis of Large-Scale Social Systems: Beshers, J.
871 Electromagnetic Energy Transmission and Radiation: Fano, R.
872 The Industrial Practice of Chemical Process Engineering: Bodman, S.
873 Electron-Stream Interaction with Plasmas: Briggs, R.
874 STRESS: A Problem-Oriented Computer Language for Structural Engineering Reinschmidt, K.
875 LISP 1.5 Programmer&#39;s Manual: McCarthy, J.
876 Electronic Processes in Solids: Ascarelli, G.
877 Circuit Theory of Linear Noisy Networks: Adler, R.
878 The Analysis and Synthesis of Linear Servomechanisms: Hall, A.