Computer Science

Elsevier Science Direct E-Books


E-Book titles


See MIPS Run

Dominic Sweetman

Multimedia over IP and Wireless Networks

Mihaela van der Schaar, Philip A Chou


Don Brutzman, Leonard Daly

Fault-Tolerant Systems

Israel Koren, C. Mani Krishna

Effective Prototyping for Software Makers

Jonathan Arnowitz, Michael Arent, Nevin Berger

Network Routing

Deepankar Medhi, Karthikeyan Ramasamy

Physical Database Design

Sam S. Lightstone, Toby J. Teorey, Tom Nadeau

Geometric Algebra for Computer Science

Leo Dorst, Daniel Fontijne, Stephen Mann

High-Performance Embedded Computing

Wayne Wolf

Letting Go of the Words

Janice (Ginny) Redish


Frank Cohen

Customizable Embedded Processors

Paolo Ienne, Rainer Leupers

Java Data Mining: Strategy, Standard, and Practice

Mark F. Hornick, Erik Marcadé, Sunil Venkayala

Probabilistic Methods for Financial and Marketing Informatics

Richard E Neapolitan, Xia Jiang

IPv6 Advanced Protocols Implementation

Qing Li, Jinmei Tatuya, Keiichi Shima

Network Analysis, Architecture, and Design

James D. McCabe

IT Manager's Handbook

Bill Holtsnider, Brian D. Jaffe

Digital Design and Computer Architecture

David Harris, Sarah Harris

Deploying IP and MPLS QoS for Multiservice Networks

John William Evans, Clarence Filsfils

Real-Life MDA

Michael Guttman, John Parodi

Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

Charles T. Betz

Visualization in Medicine

Bernhard Preim, Dirk Bartz

Point-Based Graphics

Markus Gross, Hanspeter Pfister

User-Centered Design Stories

Carol Righi, Janice James

Web Dragons

Ian H. Witten, Marco Gori, Teresa Numerico

Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks

Gerald R. Ash

Strategic Security Management

Karim Vellani

The Profit Impact of Business Intelligence

Steve Williams, Nancy Williams

Practical Model-Based Testing

Mark Utting, Bruno Legeard

Groovy Programming

Kenneth Barclay, John Savage

ESL Design and Verification

Grant Martin, Brian Bailey, Andrew Piziali

Data Preparation for Data Mining Using SAS

Mamdouh Refaat

Wireless Communications & Networking

Vijay Garg

UML 2 Certification Guide

Tim Weilkiens, Bernd Oestereich

Text Entry Systems

I. Scott MacKenzie, Kumiko Tanaka-Ishii

Joe Celko's SQL Puzzles and Answers

Joe Celko

Ethernet Networking for the Small Office and Professional Home Office

Jan L. Harrington

Sketching User Experiences: Getting the Design Right and the Right Design

Bill Buxton

Business Process Change

Paul Harmon

IPv6 Core Protocols Implementation

Qing Li, Tatuya Jinmei, Keiichi Shima

The History of Information Security

Karl Maria Michael de Leeuw

Parallel Computational Fluid Dynamics 2005: Theory and Applications

A. Deane, Gunther Brenner, A. Ecer, David Emerson, James McDonough, J. Periaux, N. Satofuka, Damien Tromeur-Dervout

Parallel Computational Fluid Dynamics 2006

Jang-Hyuk Kwon, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox

Wireless Networking Technology

Steve Rackley

CCTV Surveillance

Herman Kruegle

Data Mining and Predictive Analysis

Colleen McCue

Security Operations Management, 2nd ed.

Robert McCrie

Integrated Security Systems Design

Thomas L. Norman, CPP, PSP, CSC

Systems Thinking

Gharajedaghi, Jamshid

The Art of War for Security Managers

Scott Watson

Electronic Security Systems

Robert Pearson

Secure Roaming in 802.11 Networks

Raymond Greenlaw, Paul Goransson

Security Convergence

Dave Tyson

Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

Pierre Bijaoui

Developing Practical Wireless Applications

Dean A. Gratton

Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook

Ken England, Gavin JT Powell

Oracle 10g Developing Media Rich Applications

Lynne Dunckley, Larry Guros

Microsoft Windows Security Fundamentals

Jan De Clercq, Guido Grillenmeier

Oracle Performance Tuning for 10gR2

Gavin JT Powell

Microsoft Outlook 2007 Programming

Sue Mosher

Microsoft Exchange 2007: Tony Redmond's Guide to Successful Implementation

Tony Redmond

Computational Intelligence

Russell C. Eberhart, Yuhui Shi

System Level Design with Rosetta

Perry Alexander

Google Talking

Joshua Brashars, Johnny Long

Syngress Force Emerging Threat Analysis

Robert Graham

Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

Al Muller

Developer's Guide to Web Application Security

Michael Cross

Wireshark & Ethereal Network Protocol Analyzer Toolkit

Angela Orebaugh, Gilbert Ramirez, Jay Beale

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

James Foster, David Maynor

Stealing the Network

Johnny Long, Timothy Mullen, Ryan Russell

Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders

Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson

Snort Intrusion Detection and Prevention Toolkit

Brian Caswell, Jay Beale, Andrew Baker

Designing and Building Enterprise DMZs

Hal Flynn

Network Security Assessment

Steve Manzuik, Ken Pfeil, Andrew Gold

Cryptography for Developers

Tom St Denis

How to Cheat at Windows System Administration Using Command Line Scripts

Pawan K Bhardwaj

Virtualization with Microsoft Virtual Server 2005

Andy Jones, Rogier Dittner, David Rule, Ken Majors, Matthijs ten Seldam, Twan Grotenhuis, Geoffrey Green

Hack the Stack

Michael Gregg

WarDriving and Wireless Penetration Testing

Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

T. Bradley

FISMA Certification and Accreditation Handbook

L. Taylor

Configuring Juniper Networks NetScreen & SSG Firewalls

Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin

Secure Your Network for Free

Eric Seagren

CD and DVD Forensics

Paul Crowley

Enemy at the Water Cooler

Brian T Contos

Cyber Crime Investigations

Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel

RFID+ Study Guide and Practice Exams

Paul Sanghera


Craig Schiller, Jim Binkley

How to Cheat at Configuring Exchange Server 2007

Henrik Walther

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood

Microsoft Vista for IT Security Professionals

Tony Piltzecker

Asterisk Hacking

Joshua Brashars

Building Robots with LEGO Mindstorms NXT

Mario Ferrari, Guilio Ferrari, David Astolfo

Security+ Study Guide

Ido Dubrawsky, Jeremy Faircloth

Cross Site Scripting Attacks

Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager

How to Cheat at IIS 7 Server Administration

Chris Adams, Brian Frederick

Windows Forensic Analysis DVD Toolkit

Harlan Carvey

Alternate Data Storage Forensics

Amber Schroader, Tyler Cohen

PCI Compliance

Tony Bradley, Anton Chuvakin, Anatoly Elberg, Brian J. Koerner

Linksys WRT54G Ultimate Hacking

Paul Asadoorian, Larry Pesce

Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress

David E. Williams

Zen and the Art of Information Security

Ira Winkler

How to Cheat at VoIP Security

Thomas Porter, Michael Gough

How to Cheat at Configuring Open Source Security Tools

Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty

Business Continuity and Disaster Recovery for IT Professionals

Susan Snedaker

Perl Scripting for Windows Security

Harlan Carvey

How to Cheat at Microsoft Vista Administration

Jan Kanclirz

How to Cheat at Configuring VmWare ESX Server

David Rule

Open Source Fuzzing Tools

Noam Rathaus, Gadi Evron

How to Cheat at Securing SQL Server 2005

Mark Horninger

The Official CHFI Study Guide (Exam 312-49)

Dave Kleiman

Practical Oracle Security

Josh Shaul, Aaron Ingram

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Thomas W Shinder

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Rob Cameron, Neil R. Wyler

The Designer's Guide to VHDL

Peter J. Ashenden

Digital Modeling of Material Appearance

Julie Dorsey, Holly Rushmeier, François Sillion

Architecture Design for Soft Errors

Shubu Mukherjee

Reconfigurable Computing

Scott Hauck, André DeHon

Verification Techniques for System-Level Design

Masahiro Fujita, Indradeep Ghosh, Mukul Prasad

GUI Bloopers 2.0

Jeff Johnson

Keeping Found Things Found: The Study and Practice of Personal Information Management

William Jones

Visual Thinking

Colin Ware

Annotated C# Standard

Jon Jagger, Nigel Perry, Peter Sestoft

Image Fusion

Tania Stathaki

Wireless Sensor and Actuator Networks

Roberto Verdone, Davide Dardari, Gianluca Mazzini, Andrea Conti

Microscope Image Processing

Qiang Wu, Fatima Merchant, Kenneth Castleman

Digital Watermarking and Steganography

Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker

Semantic Web for the Working Ontologist

Dean Allemang, James Hendler

Measuring the User Experience

Thomas Tullis, William Albert

Information Assurance

Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi

Information Modeling and Relational Databases

Terry Halpin, Tony Morgan

Microsoft SharePoint 2007 Technologies

Kevin Laahs, Emer McKenna, Veli-Matti Vanamo

Business Metadata: Capturing Enterprise Knowledge

William H. Inmon, Bonnie O'Neil, Lowell Fryman

On-Chip Communication Architectures

Sudeep Pasricha, Nikil Dutt

Moderating Usability Tests: Principles and Practices for Interacting

Joseph S. Dumas, Beth A. Loring

System-on-Chip Test Architectures

Laung-Terng Wang, Charles E. Stroud, Nur A. Touba

HCI Beyond the GUI

Philip Kortum

Unleashing Web 2.0

Gottfried Vossen, Stephan Hagemann

Evaluating Children's Interactive Products

Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi

Embedded DSP Processor Design

Dake Liu

Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL

Joe Celko

Aspect-Oriented Programming with the e Verification Language

David Robinson


Peter J. Ashenden, Jim Lewis

Wireless Networking

Anurag Kumar, D. Manjunath, Joy Kuri

TCP/IP Sockets in Java

Kenneth L. Calvert, Michael J. Donahoo

Systems Engineering with SysML/UML

Tim Weilkiens

Processor Description Languages

Prabhat Mishra, Nikil Dutt

Internet Multimedia Communications Using SIP

Rogelio Martinez Perea

DW 2.0: The Architecture for the Next Generation of Data Warehousing

William H. Inmon, Derek Strauss, Genia Neushloss

Bluetooth Application Programming with the Java APIs Essentials Edition

Timothy J. Thompson, C Bala Kumar, Paul Kline

Executing Data Quality Projects

Danette McGilvray

Practical Guide to SysML

Sanford Friedenthal, Rick Steiner, Alan Moore

MPLS: Next Steps

Bruce S. Davie, Adrian Farrel

Network Security: Know It All

James Joshi

Digital Signal Processing System Design

Nasser Kehtarnavaz

Memory Systems

Bruce Jacob, Spencer Ng, David Wang

Handbook of Knowledge Representation

Frank van Harmelen, Vladimir Lifschitz, Bruce Porter

Information Flow and Knowledge Sharing

Flavio Soares Correa da Silva, Jaume Agusti-Cullell, Frank van Harmelen

Introduction to CDMA Wireless Communications

Mosa Ali Abu-Rgheff

Designing Storage for Exchange 2007 SP1

Pierre Bijaoui, Juergen Hasslauer

Microsoft Exchange Server 2007 with SP1

Tony Redmond

Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

Joe Grand, Frank Thornton, Albert Yarusso, Lee Barken, Tom Owad, Ryan Russell, Bobby Kinstle, Marcus R Brown, Job de Haas, Deborah Kaplan

Kismet Hacking

Frank Thornton

Physical and Logical Security Convergence: Powered By Enterprise Security Management

William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole

AVIEN Malware Defense Guide for the Enterprise

David Harley

Google Hacking for Penetration Testers

Johnny Long

SonicWALL Secure Wireless Network Integrated Solutions Guide

Khai Tran, Joe Levy, Lauren Pederson

How to Cheat at Securing Linux

James Stanger

Nessus Network Auditing

Russ Rogers

Web Application Vulnerabilities

Steven Palmer

How to Cheat at Administering Office Communications Server 2007

Anthony Piltzecker

No Tech Hacking

Johnny Long, Kevin D. Mitnick

Sarbanes-Oxley IT Compliance Using Open Source Tools

Christian B Lahti, Roderick Peterson

The Best Damn Server Virtualization Book Period

Rogier Dittner, David Rule

The Best Damn Firewall Book Period

Thomas W Shinder

The Best Damn Exchange, SQL and IIS Book Period

Henrik Walther, Mark Horninger, Chris Adams

TechnoSecurity's Guide to E-Discovery and Digital Forensics

Jack Wiles

InfoSecurity 2008 Threat Analysis

Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg

The Best Damn IT Security Management Book Period

Susan Snedaker, Robert McCrie, Karim Vellani

The Best Damn Cybercrime and Digital Forensics Book Period

Jack Wiles, Anthony Reyes

How to Cheat at Deploying and Securing RFID

Frank Thornton, Paul Sanghera

How to Cheat at Securing Your Network

Ido Dubrawsky

Reverse Engineering Code with IDA Pro

Chris Paget, Walter Pearce, Damon Cortesi

Managing Catastrophic Loss of Sensitive Data

Constantine Photopoulos

OSSEC Host-Based Intrusion Detection Guide

Rory Bray, Daniel Cid, Andrew Hay

Nmap in the Enterprise

Angela Orebaugh, Becky Pinkard

Microsoft Forefront Security Administration Guide

Jesse Varsalone

Check Point NGX R65 Security Administration

Ralph Bonnell

OS X Exploits and Defense

David Harley

Secrets Stolen, Fortunes Lost

Christopher Burgess, Richard Power

The IT Digital Legal Companion

Gene K. Landy, Amy J. Mastrobattista

Netcat Power Tools

Giovanni Giacobbi

The IT Regulatory and Standards Compliance Handbook:

Craig S. Wright

Nagios 3 Enterprise Network Monitoring

Max Schubert, Derrick Bennett, Andreas Ericsson

Malware Forensics

Cameron H. Malin, Eoghan Casey, James M. Aquilina

The Best Damn Windows Server 2008 Book Period

Anthony Piltzecker, Susan Snedaker

Integrating ISA Server 2006 with Microsoft Exchange 2007

Fergus Strachan

Scene of the Cybercrime

Debra Littlejohn Shinder, Michael Cross

Programming Lego Mindstorms NXT

Owen Bishop

Securing Windows Server 2008

Aaron Tiensivu

Securing Citrix Presentation Server in the Enterprise

Tariq Azad

Techno Security's Guide to Securing SCADA

Jack Wiles

Effective Prototyping with Excel

Jonathan Arnowitz, Michael Arent, Nevin Berger, Fred Sampson

Probabilistic Methods for Bioinformatics

Richard E Neapolitan, Xia Jiang

Building Intelligent Interactive Tutors

Beverly Park Woolf

Technical, Commercial and Regulatory Challenges of QoS

XiPeng Xiao

Business Modeling

David M. Bridgeland, Ron Zahavi

Partial-Update Adaptive Signal Processing

Kutluyil Dogancay

P2P Networking and Applications

John Buford, Heather Yu, Eng Keong Lua

Master Data Management

David Loshin

Web Application Design Patterns

Pawan Vora

Three-dimensional Integrated Circuit Design

Vasilis F. Pavlidis, Eby G. Friedman

Computer and Information Security Handbook

John R. Vacca

Broadband Cable Access Networks

David Large, James Farmer

Networked Graphics

Steed, Anthony

Low-Power Design of Nanometer FPGAs

Mohab Anis, Hassan Hassan

Building the Agile Enterprise

Cummins, Fred

Deploying QoS for Cisco IP and Next Generation Networks

Vinod Joseph, Tony Jeffress, Brett Chapman

Disappearing Cryptography

Peter Wayner

Why Programs Fail

Andreas Zeller

TCP/IP Sockets in C

Michael J. Donahoo, Kenneth L. Calvert

The Illustrated Network

Walter Goralski

Database Archiving

Jack E. Olson

Joe Celko's Data, Measurements and Standards in SQL

Celko, Joe

Relational Database Design and Implementation

Harrington, Jan

Handbook of Global User Research

Schumacher, Robert

How to Build a Digital Library

Witten, Ian

SOA and Web Services Interface Design

Bean, James

Mobile Technology for Children

Druin, Allison

Geometric Algebra for Computer Science (Revised Edition)

Dorst, Leo

Developing Virtual Reality Applications

Craig, Alan

Principles of Computer System Design

Saltzer, Jerome

Semiconductors and the Information Revolution

Orton, John

RF and Digital Signal Processing for Software-Defined Radio

Tony J. Rouphael

Embedded Linux Development Using Eclipse

Doug Abbott

Principles of Transaction Processing

Philip A. Bernstein, Eric Newcomer

Forms that Work

Caroline Jarrett, Gerry Gaffney

Next Generation SSH2 Implementation

Justin Peltier

SAP Security Configuration and Deployment

Joey Hirao

GFI Network Security and PCI Compliance Power Tools

Brien Posey

Nokia Firewall, VPN, and IPSO Configuration Guide

Andrew Hay, Keli Hay, Peter Giannoulis

E-discovery: Creating and Managing an Enterprisewide Program

Karen A. Schuler

Mobile Malware Attacks and Defense

Ken Dunham

Virtualization for Security

John Hoopes

Cisco Router and Switch Forensics

Liu, Dale

SQL Injection Attacks and Defense

Clarke, Justin

Professional Penetration Testing

Wilhelm, Thomas

Eleventh Hour Security+

Dubrawsky, Ido

Eleventh Hour Network+

Alpern, Naomi

Bebop to the Boolean Boogie

Clive Maxfield

The Practitioner's Guide to Data Quality Improvement

Loshin, David

Optical Networks

Ramaswami, Rajiv

Handbook of Digital Forensics and Investigation

Casey, Eoghan

Electronic Design Automation

Wang, Laung-Terng

Beyond the Usability Lab

Albert, William

Smart Things: Ubiquitous Computing User Experience Design

Kuniavsky, Mike

Information Systems Transformation

Ulrich, William

Design to Thrive

Howard, Tharon

Designing with the Mind in Mind

Johnson, Jeff

Managing Time in Relational Databases

Johnston, Tom

Physically Based Rendering

Pharr, Matt

Usability Testing Essentials

Barnum, Carol

Light and Skin Interactions

Baranoski, Gladimir

User Experience Re-Mastered

Wilson, Chauncey

Interconnecting Smart Objects with IP

Vasseur, Jean-Philippe

Making Enterprise Information Management (EIM) Work for Business

Ladley, John

SQL Clearly Explained

Harrington, Jan

Thoughts on Interaction Design

Kolko, Jon


Jiang, Zemin

System Assurance

Mansourov, Nikolai

The Essential Persona Lifecycle: Your Guide to Building and Using Personas

Adlin, Tamara

Understanding Motion Capture for Computer Animation

Menache, Alberto

Agile Development and Business Goals

Holtsnider, Bill

No Code Required

Cypher, Allen

Entity Resolution and Information Quality

Talburt, John

Joe Celko's SQL for Smarties

Celko, Joe

Analyzing Social Media Networks with Microsoft NodeXL

Hansen, Derek

Cyber Attacks

Amoroso, Edward

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

Liu, Dale

Microsoft Virtualization

Olzak, Thomas

A Guide to Kernel Exploitation

Perla, Enrico

Eleventh Hour Linux+

Speake, Graham

PCI Compliance

Chuvakin, Anton

Digital Forensics for Network, Internet, and Cloud Computing

Garrison, Clint

Seven Deadliest Wireless Technologies Attacks

Haines, Brad

Seven Deadliest Web Application Attacks

Shema, Mike

Seven Deadliest Social Network Attacks

Timm, Carl

Seven Deadliest Unified Communications Attacks

York, Dan

Seven Deadliest Network Attacks

Prowell, Stacy

Seven Deadliest Microsoft Attacks

Kraus, Rob

Seven Deadliest USB Attacks

Anderson, Brian

Virtualization and Forensics

Barrett, Diane

Microsoft Windows 7 Administrator's Reference

Orchilles, Jorge

CISSP Study Guide

Conrad, Eric

Eleventh Hour CISSP

Conrad, Eric

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Street, Jayson

Securing the Smart Grid

Flick, Tony

Managed Code Rootkits

Metula, Erez

Microsoft Windows Server 2008 R2 Administrator's Reference

Hannifin, Dustin

Citrix XenDesktop Implementation..

James, Gareth R.

Ninja Hacking

Wilhelm, Thomas

Security for Microsoft Windows System Administrators

Rountree, Derrick

Digital Video Surveillance and Security

Caputo, Anthony

Metrics and Methods for Security Risk Management

Young, Carl

Heuristic Search

Edelkamp, Stefan

Architecture of Network Systems

Serpanos, Dimitrios

Data Mining: Practical Machine Learning Tools and Techniques

Witten, Ian

Developing High Quality Data Models

West, Matthew

Global UX

Sherman, Paul

Thoughts on Interaction Design

Kolko, Jon

Data Mining

Han, Jiawei

Effective Security Management

Sennewald, Charles

Database Modeling and Design

Teorey, Toby

Electronic Access Control

Little, Karen

Pervasive Information Architecture

Resmini, Andrea

Brave NUI World

Wigdor, Dennis

Private Cloud Computing

Smoot, Stephen

Deploying Next Generation Multicast-enabled Applications

Joseph, Vinod

GPU Computing Gems Emerald Edition


API Design for C++

Reddy, Martin

Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

Betz, Charles

Data Architecture

Tupper, Charles

A Practical Guide to SysML

Friedenthal, Sanford

3C Vision


Design Research through Practice

Koskinen, Ilpo

Systems Thinking

Gharajedaghi, Jamshid

GPU Computing Gems Jade Edition


Semantic Web for the Working Ontologist

Allemang, Dean

Private Security and the Law

Nemeth, Charles

OCEB Certification Guide

Weilkiens, Tim

Heterogeneous Computing with OpenCL

Gaster, Benedict

CUDA Application Design and Development

Farber, Rob

Thor's Microsoft Security Bible

Mullen, Timothy

Securing the Cloud

Winkler, J.R. ("Vic")

Web Application Obfuscation

Heiderich, Mario

Security Risk Management

Wheeler, Evan

Securing SQL Server

Cherry, Denny

Digital Forensics for Legal Professionals

Daniel, Larry

Industrial Network Security

Knapp, Eric

Migrating to the Cloud

Laszewski, Tom

The Basics of Information Security

Andress, Jason

The Basics of Hacking and Penetration Testing

Engebretson, Patrick

iPhone and iOS Forensics

Hoog, Andrew

Low Tech Hacking

Wiles, Jack

Moving To The Cloud

Dinkar, Sitaram

Coding for Penetration Testers

Andress, Jason

Information Visualization

Ware, Colin

Sketching User Experiences: The Workbook

Greenberg, Saul

Risk Analysis and the Security Survey

Broder, James F.


Flynt, Clif

Observing the User Experience

Kuniavsky, Mike

Quantifying the User Experience

Sauro, Jeff

Writing Effective Business Rules

Witt, Graham

It's Our Research

Sharon, Tomer

User Experience Management

Lund, Arnie

Business Intelligence

Loshin, David

Letting Go of the Words

Redish, Janice (Ginny)

Grounded Innovation

Holmquist, Lars Erik

Design for Emotion

van Gorp, Trevor

Joe Celko's Trees and Hierarchies in SQL for Smarties

Celko, Joe

Data Insights

Whitney, Hunter

User Experience in the Age of Sustainability

Kramer, Kem-Laurin


Guenther, Milan

Usability in Government Systems

Buie, Elizabeth

Content Strategy at Work

Bloomstein, Margot

Digital Video and HD

Poynton, Charles

Data Virtualization for Business Intelligence Systems

van der Lans, Rick

Agile Data Warehousing Project Management

Hughes, Ralph

Designing the Search Experience

Russell-Rose, Tony

Temporal QOS Management in Scientific Cloud Workflow Systems

Liu, Xiao

Security Consulting

Sennewald, Charles

Synchronous Precharge Logic

Smoszna, Marek

The Basics of Cyber Warfare

Winterfeld, Steve

Federated Identity Primer

Rountree, Derrick

Introduction to Data Compression

Sayood, Khalid

Homeland Security

Bullock, Jane

Using Open Source Platforms for Business Intelligence

Wise, Lyndsay

Handbook on Securing Cyber-Physical Critical Infrastructure

Das, Sajal

Data Governance

Ladley, John

Computer Animation

Parent, Rick

Effective Physical Security

Fennelly, Lawrence

CUDA Programming

Cook, Shane

Collaborative Enterprise Architecture

Bente, Stefan

IT Manager's Handbook

Holtsnider, Bill

Agile User Experience Design

Brown, Diana

Structured Parallel Programming

McCool, Michael

Cargo Theft, Loss Prevention, and Supply Chain Security

Burges, Dan

Principles of Data Integration

Halevy, Alon

Malware Forensic Field Guide for Windows Systems

Malin, Cameron

Client-Side Attacks and Defense

Oriyano, Sean-Philip

Logging and Log Management

Chuvakin, Anton

FISMA and the Risk Management Framework

Gantz, Stephen

Wireless Reconnaissance in Penetration Testing

Neely, Matthew

Augmented Reality

Kipper, Greg

Information Security Risk Assessment Toolkit

Talabis, Mark

Federal Cloud Computing

Metheny, Matthew


Gragido, Will

Data Hiding

Raggo, Michael

UTM Security with Fortinet

Tam, Kenneth

Securing SQL Server

Cherry, Denny

PCI Compliance

Chuvakin, Anton

Advanced Persistent Threat

Cole, Eric

The Hacker's Guide to OS X

Ghassemlouei, Alijohn

Hacking Web Apps

Shema, Mike

Violent Python

O'Connor, TJ

CISSP Study Guide

Conrad, Eric

Network Intrusion Analysis

Fichera, Joe

SQL Injection Attacks and Defense

Clarke, Justin

Keys to the Kingdom

Ollam, Deviant

Practical Lock Picking

Ollam, Deviant

Beyond CISSP

Wheeler, Evan

Customer Interviewing

Alvarez, Cindy

Cyber Security and IT Infrastructure Protection

Vacca, John

Going Parallel with C++

Hummel, Joe

Insights in Computer Science 1

Doe, John

Insights in Computer Science 2

Doe, John

Managing Information Security

Vacca, John

Network and System Security

Vacca, John

Programming with CUDA and OpenACC

Farber, Rob

UI Inspection Methods


Computer and Information Security Handbook

Vacca, John

Learning Processing

Shiffman, Daniel

Writing for Interaction

Newman Lior, Linda

Data Modeling Essentials

Simsion, Graeme

UI is Communication

McKay, Everett

Measuring Data Quality for Ongoing Improvement

Sebastian-Coleman, Laura

Managing Data in Motion

Reeve, April

Social Data Analytics

Rogers, Shawn

Network Convergence

Joseph, Vinod

Web Services, Service-Oriented Architectures, and Cloud Computing

Barry, Douglas K.

Visual Usability

Levinson, Deborah

Application Administrators Handbook

Bourne, Kelly

Implementing Analytics

Sheikh, Nauman

Principles of Big Data

Berman, Jules

Combinatorial Topology and Distributed Computing

Herlihy, Maurice

Practical Web Analytics for User Experience

Beasley, Michael

Cloud Computing

Marinescu, Dan

Moderating One-on-One User Research

Tedesco, Donna


Smith, Kel

Hacking the Scene

Cohen, Tyler

Enterprise Data Services

Sarkar, Pushpak

Analyzing the Social Web

Golbeck, Jennifer

Total Information Risk Management

Borek, Alexander

Human-Computer Interaction

MacKenzie, I. Scott

FISMA Compliance Handbook

Taylor, Laura

A Practical Guide to Business Analytics

Fitzgerald, Jaime

Data Warehousing in the Age of Big Data

Krishnan, Krish

Heterogeneous Computing with OpenCL

Gaster, Benedict

The Basics of Cloud Computing

Rountree, Derrick

Brainstorming and Beyond

Wilson, Chauncey

Joe Celko’s Complete Guide to NoSQL

Celko, Joe

The Digital Crown

Leibtag, Ahava

High Performance Deformable Image Registration Algorithms for Manycore Processors

Shackleford, James

Penetration Testing with Backtrack 5

Broad, James

Computation and Storage in the Cloud

Yuan, Dong

Software Engineering

Schmidt, Richard

Agile Software Architect

Babar, Muhammad Ali

Enterprise Application Administration

Faircloth, Jeremy

Introduction to Cyber-Warfare

Shakarian, Paulo

Investigating Internet Crimes

Shipley, Todd

Accelerating Matlab with GPU

Suh, Jung

Mobile User Experience Archetypes

Mendoza, Adrian

Assessing Vendors

More, Josh

User Interface Inspection Methods

Wilson, Chauncey

Credible Checklists and Quality Questionnaires

Wilson, Chauncey

Interview Techniques for UX Practitioners

Wilson, Chauncey

Practical Anonymity

Loshin, Pete

The Wireshark Field Guide

Shimonski, Robert

Intel Xeon Phi Coprocessor High Performance Programming

Jeffers, Jim

Thor's OS Xodus

Mullen, Timothy "Thor"

Business Continuity and Disaster Recovery Planning for IT Professionals

Snedaker, Susan

Analytical Approaches for Customer Centricity

Loshin, David

Using Information to Develop a Culture of Customer Centricity

Loshin, David

Mastering Cloud Computing

Buyya, Rajkumar

The Case for the Top Data Job

Aiken, Peter

Emerging Trends in ICT Security

Akhgar, Babak

Mastering Private Cloud with Windows Server 2012

Chou, Yung

Simple Steps to Data Encryption:

Loshin, Pete

Measuring the User Experience

Tullis, Thomas

Visualization in Medicine

Preim, Bernhard

Understanding Augmented Reality

Craig, Alan B.

Malware Forensics Field Guide for Linux Systems

Malin, Cameron

When Botnets Attack

Zachry, Josh

Digital Forensics Processing and Procedures

Watson, David

Windows 2012 Server Network Security

Rountree, Derrick

IT Audit

Tuuri, Dan

Hacking .NET

Simon, Robert

Windows Server 2012 Security from End to Edge and Beyond

Shinder, Thomas W

Social Media Security

Etue, David

Professional Penetration Testing

Wilhelm, Thomas

Risk Management Framework

Broad, James

Computer Incident Response and Forensics Team Management

Johnson, Leighton

Applied Cyber Security and the Smart Grid

Knapp, Eric

Time Frequency Analysis

Boualem Boashash

Network Simulation Experiments Manual

Emad Aboelela

XML in Data Management: Understanding and Applying Them Together

Peter Aiken, M. David Allen

QuickTime Toolkit Volume One: Basic Movie Playback and Media Types

Tim Monroe

QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types

Tim Monroe

GMPLS: Architecture and Applications

Adrian Farrel, Igor Bryskin

Face Processing: Advanced Modeling and Methods

Wenyi Zhao, Rama Chellappa

Proceedings 2004 VLDB Conference: The 30th International Conference on Very Large Databases (VLDB)


Network Processor Design: Issues and Practices, Volume 3

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices

George Varghese

Complete Maya Programming Volume II: An In-depth Guide to 3D Fundamentals, Geometry, and Modeling

David Gould

An Introduction to Programming with IDL

Kenneth Bowman

Smart Phone and Next Generation Mobile Computing

Pei Zheng, Lionel Ni

MEL Scripting for Maya Animators

Mark R. Wilkins, Chris Kazmier

Joe Celko's SQL Programming Style

Joe Celko

Data Model Patterns: A Metadata Map

David C. Hay

Moving Objects Databases

Ralf Hartmut Güting, Markus Schneider

Cost-Justifying Usability: An Update for the Internet Age

Randolph G. Bias, Deborah J. Mayhew

Practical Time-Frequency Analysis

Rene Carmona, WenLiang Hwang, Bruno Torresani

Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization

Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper

C# 2.0: Practical Guide for Programmers

Michel de Champlain, Brian G. Patrick

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration

Earl Cox

Network Processor Design: Issues and Practices, Volume 2

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

Multiscale Wavelet Methods for Partial Differential Equations

Wolfgang Dahmen, Andrew Kurdila, Peter Oswald

Machine Vision: Theory, Algorithms, Practicalities

E. R. Davies

SQL: Practical Guide for Developers

Michael J. Donahoo, Gregory D. Speegle

Mac OSX Developer Guide

Jesse Feiler

Time-Frequency/Time-Scale Analysis

Patrick Flandrin

Visual Effects in A Digital World: A Comprehensive Glossary of over 7000 Visual Effects Terms

Karen Goulekas

Network Security: A Practical Approach

Jan L. Harrington

Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design

Karen Holtzblatt, Jessamyn Burns Wendell, Shelley Wood

Joe Celko's SQL for Smarties: Advanced SQL Programming

Joe Celko

Commonsense Reasoning

Erik T. Mueller

Spine Technology Handbook

Steven M. Kurtz, Avram Edidin

Globus® Toolkit 4: Programming Java Services

Borja Sotomayor, Lisa Childers

Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G

Luis M. Correia

Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control

Giorgio Franceschetti, Sabatino Stornelli

Programming with Quartz: 2D and PDF Graphics in Mac OS X

David Gelphman, Bunny Laden

Joe Celko's Analytics and OLAP in SQL

Joe Celko

Networks on Chips: Technology and Tools

Giovanni De Micheli, Luca Benini, Luca Benini

VLSI Test Principles and Architectures: Design for Testability

Laung-Terng Wang, Cheng-Wen Wu, Xiaoqing Wen

Designing SOCs with Configured Cores: Unleashing the Tensilica Xtensa and Diamond Cores

Steve Leibson

Multiprocessor Systems-on-Chips

Ahmed Jerraya, Wayne Wolf

Communication Networking: An Analytical Approach

Anurag Kumar, D. Manjunath, Joy Kuri

VHDL: Coding and Logic Synthesis with SYNOPSYS

Weng Fook Lee

Fuzzy Theory Systems

Cornelius Leondes

Knowledge-Based Systems

Cornelius Leondes

Expert Systems

Cornelius Leondes

Database and Data Communication Network Systems

Cornelius Leondes

Enterprise Knowledge Management: The Data Quality Approach

David Loshin

TCP/IP Sockets in C#: Practical Guide for Programmers

David Makofske, Michael J. Donahoo, Kenneth L. Calvert

ASIC and FPGA Verification: A Guide to Component Modeling

Richard Munden

Physically Based Rendering: From Theory to Implementation

Matt Pharr, Greg Humphreys

Routing, Flow, and Capacity Design in Communication and Computer Networks

Michal Pióro, Deepankar Medhi

The Persona Lifecycle: Keeping People in Mind Throughout Product Design

John Pruitt, Tamara Adlin

High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting

Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec

Nonlinear Computer Modeling of Chemical and Biochemical Data

James Rusling / Thomas Kumosinski

Introduction to Data Compression


JSTL: Practical Guide for JSP Programmers

Sue Spielman

Multirate and Wavelet Signal Processing

Bruce Suter

Database Modeling and Design: Logical Design

Toby J. Teorey, Sam S. Lightstone, Tom Nadeau

Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS

Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester

Proceedings 2003 VLDB Conference: 29th International Conference on Very Large Databases (VLDB)


Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers

David Wall

Grid Computing

Pawel Plaszczak, Richard Wellner, Jr.

Java Cryptography Extensions: Practical Guide for Programmers

Jason Weiss

QuickTime for .NET and COM Developers

John Cromie

Signal and Image Representation in Combined Spaces

Yehoshua Zeevi, Ronald Coifman

Chaos and Fractals

C.A. Pickover

Neuromimetic Semantics

Harry Howard

SDL '99: The Next Millennium

R. Dssouli/G.V. Bochmann/Y. Lahav

Kohonen Maps

Oja, E. / Kaski, S.

Charging Communication Networks

D.J. Songhurst

A Computational Framework for Segmentation and Grouping

Medioni, G. / Lee, Mi-Suen / Tang, Chi-Keung

CAFE: An Industrial-Strength Algebraic Formal Method

Futatsugi, K. / Nakagawa, A.T. / Tamai, T.

Parallel Computational Fluid Dynamics 2001: Practice and Theory

P. Wilders, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 2000: Trends and Applications

C.B. Jenssen, T. Kvamdal, H.I. Andersson, B. Pettersen, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 2002: New Frontiers and Multi-Disciplinary Applications

K. Matsuno, A. Ecer, P Fox, J. Periaux, N. Satofuka

Handbook of Automated Reasoning

Alan Robinson / Andrei Voronkov

Handbook of Computer Aided Geometric Design

G. Farin / J. Hoschek / M.-S. Kim

Intelligent Systems for Information Processing

B. Bouchon-Meunier / L. Foulloy / R.R. Yager

Handbook of Temporal Reasoning in Artificial Intelligence

Michael Fisher, Dov M. Gabbav, Lluis Vila

Parallel Computational Fluid Dynamics 2003: Advanced Numerical Methods, Software and Applications

Boris Chetverushkin, A. Ecer, Jacques Periaux, N. Satofuka

Parallel Computing: Software Technology, Algorithms, Architectures & Applications

Gerhard Joubert, Wolfgang Nagel, Frans Peters, Wolfgang Walter

Fuzzy Logic and the Semantic Web

Elie Sanchez

Grid Computing: The New Frontier of High Performance Computing

Lucio Grandinetti

Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications

Gabriel Winter, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox

Reaction-Diffusion Computers

Andrew Adamatzky/Benjamin De Lacy Costello/Tetsuya Asai

Modern Information Processing

Bernadette Bouchon-Meunier / Giulianella Coletti / Ronald Yager

Handbook of Constraint Programming

Francesca Rossi, Peter van Beek, Toby Walsh

The Economics of Open Source Software Development

Jürgen Bitzer / Philipp Schröder

Recent Research Towards Advanced Man-Machine Interface Through Spoken Language

H. Fujisaki

Principles of Logic and Logic Programming

G. Metakides, A. Nerode

Symbiosis of Human and Artifact

Yuichiro Anzai, Katsuhiko Ogawa, Hirohiko Mori

Handbook of Human-Computer Interaction

Helander, M.G. / Landauer, T.K. / Prabhu, P.V.

Parallel Computational Fluid Dynamics 1993: New Trends and Advances

Akin Ecer, J. Hauser, P. Leca, J. Periaux

Algorithms and Parallel VLSI Architectures III

M. Moonen / F. Catthoor

SVD and Signal Processing III

Marc Moonen, Bart De Moor

High Performance Computing: Technology, Methods and Applications

Dongarra, J.J.

Problem Solving: Methods, Programming and Future Concepts

O.V. German, D.V. Ofitserov

Intelligent Robots and Systems

Volker Graefe

Time-Varying Image Processing and Moving Object Recognition, 4

V. Cappellini

Parallel Computational Fluid Dynamics 1995: Implementations and Results Using Parallel Computers

A. Ecer, J. Periaux, N. Satofuka, S. Taylor

Parallel Computational Fluid Dynamics 1996: Algorithms and Results Using Advanced Computers

P. Schiano, A. Ecer, J. Periaux, N. Satofuka

Intelligent Environments

Droege, P.

Statistical Optimization for Geometric Computation: Theory and Practice

K. Kanatani

Parallel Processing for Artificial Intelligence 3

J. Geller, H. Kitano, C.B. Suttner

Proceedings IWISP '96

B.G. Mertzios, P. Liatsis

SDL '97: Time for Testing

A. Cavalli/A. Sarma

Handbook of Process Algebra

J.A. Bergstra / A. Ponse / S.A. Smolka

Parallel Computational Fluid Dynamics 1997: Recent Developments and Advances Using Parallel Computers

D. Emerson, A. Ecer, P. Fox, J. Periaux, N. Satofuka

Parallel Computational Fluid Dynamics 1998: Development and Applications of Parallel Technology

C.A. Lin, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computational Fluid Dynamics 1999: Towards Teraflops, Optimization and Novel Formulations

D. Keyes, A. Ecer, J. Periaux, N. Satofuka, P. Fox

Parallel Computing: Fundamentals, Applications and New Directions

D'Hollander, E.H.

Topological Algorithms for Digital Image Processing

T. Yung Kong, Azriel Rosenfeld

Sewers: Replacement and New Construction

Geoffrey F Read

Newnes Data Communications Pocket Book

Steve Winder, Mike Tooley

Newnes Radio and RF Engineering Pocket Book

Steve Winder, Joseph Carr

Applying UML: Advanced Applications

Rob Pooley, Pauline Wilcox

Newnes PC Troubleshooting Pocket Book

Howard Anderson, Mike Tooley

Software Design Methodology: From Principles to Architectural Styles

Hong Zhu

Introduction to Web Matrix: ASP.NET Development for Beginners

Colin Hardy, Simon Stobart

Object-Oriented Design with UML and Java

Kenneth Barclay, John Savage

A Student Guide to Object-Oriented Development

Carol Britton, Jill Doake

Student's Essential Guide to .NET

Tony Grimer

Value Creation from E-Business Models

Wendy Currie

Fundamental Data Compression

Ida Mengyi Pu

Strategies for Growth in SMEs: The Role of Information and Information Sytems

Margi Levy, Philip Powell

Understanding Mobile Human-Computer Interaction

Steve Love

Real-Time Systems Development

Rob Williams

Advanced Systems Design with Java, UML and MDA

Kevin Lano

Ultra Wideband Systems: Technologies and Applications

Roberto Aiello, Ph.D., Anuj Batra, Ph.D.

Digital Signal Processing System-Level Design Using LabVIEW

Nasser Kehtarnavaz, Namjin Kim

High-Technology Crime Investigator’s Handbook

Gerald L. Kovacich, Andy Jones

Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking

Doron Drusinsky

Embedded Software: The Works

Colin Walls

Voice Over IPv6: Architectures for Next Generation VoIP Networks

Daniel Minoli

OpenVMS Alpha Internals and Data Structures: Memory Management

Ruth Goldenberg

High Performance Data Network Design: Design Techniques and Tools

Tony Kenyon

Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management

Barry de Ville

OpenVMS System Management Guide

Lawrence Baldwin, Steve Hoffman, David Miller

Networking Explained

Michael Gallo, William M. Hancock, PhD, CISSP, CI

Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle

Charles Breakfield, Roxanne Burkey

TruCluster Server Handbook

Scott Fafrak, Jim Lola, Dennis O'Brien, Gregory Yates, Brad Nichols

Computer Systems Performance Evaluation and Prediction

Paul Fortier, Howard Michel

CRM: Redefining Customer Relationship Management

Jeffrey Peel

OpenVMS with Apache, WASD, and OSU: The Nonstop Webserver

Alan Winston

Understanding WMI Scripting: Exploiting Microsoft's Windows Management Instrumentation in Mission-Critical Computing Infrastructures

Alain Lissoir

Linux and OpenVMS Interoperability: Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems

John Robert Wisniewski

Data Networks: Routing, Security, and Performance Optimization

Tony Kenyon

Linux and the Unix Philosophy

Mike Gancarz

Tru64 UNIX Troubleshooting: Diagnosing and Correcting System Problems

Martin Moore, Steven Hancock

UNIX for OpenVMS Users

Philip Bourne, Richard Holstein, Joseph McMullen

Call Center Operation: Design, Operation, and Maintenance

Duane Sharp

Getting Started with OpenVMS: A Guide for New Users

Michael D Duffy

Corporate Portals Empowered with XML and Web Services

Anura Guruge

Getting Started with OpenVMS System Management

David Miller

Web Services: Theory and Practice

Anura Guruge

Windows Server 2003 Security Infrastructures: Core Security Features

Jan De Clercq

Microsoft Outlook Programming: Jumpstart for Administrators, Developers, and Power Users

Sue Mosher

RAPID Value Management for the Business Cost of Ownership: Readiness, Architecture, Process, Integration, Deployment

Andrew Wigodsky

Socially Responsible IT Management

Michael Erbschloe

Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers

Jerry Cochran

Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices

William Wheeler

Firewalls: Jumpstart for Network and Systems Administrators

John R. Vacca, Scott Ellis

Internet Security: A Jumpstart for Systems Administrators and IT Managers

Tim Speed, Juanita Ellis

Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems

Alain Lissoir

Microsoft SharePoint Technologies: Planning, Design and Implementation

Kevin Laahs, Emer McKenna, Veli-Matti Vanamo

Monitoring and Managing Microsoft Exchange Server 2003

Mike Daugherty

Cybersecurity Operations Handbook

John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CI

Debugging by Thinking: A Multidisciplinary Approach

Robert Charles Metzger

Resilient Storage Networks: Designing Flexible Scalable Data Infrastructures

Greg Schulz

Implementing Homeland Security for Enterprise IT

Michael Erbschloe

Managing Software Deliverables: A Software Development Management Methodology

John Rittinghouse, PhD, CISM

HP NonStop Server Security: A Practical Handbook

XYPRO Technology Corp

Network programming in .NET: C# & Visual Basic .NET

Fiach Reid

Microsoft® Exchange Server 2003 Deployment and Migration

Kieran McCorry

Wireless Operational Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

IPv6 Network Programming

Jun-ichiro itojun Hagino

Open Source Software: Implementation and Management

Paul Kavanagh

Oracle 10g RAC Grid, Services & Clustering

Murali Vallath

Oracle 10g Data Warehousing

Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith

Oracle SQL: Jumpstart with Examples

Gavin JT Powell, Carol McCullough-Dieter

Physical Security for IT

Michael Erbschloe

Deploying LINUX on the Desktop

Edward Haletky

Oracle Database Programming using Java and Web Services

Kuassi Mensah

Tony Redmond's Microsoft Exchange Server 2003: with SP1

Tony Redmond

Voice over Internet Protocol (VoIP) Security

James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM

Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions

René J. Chevance

Implementing Database Security and Auditing

Ron Ben Natan

Oracle Data Warehouse Tuning for 10g

Gavin JT Powell

Managing Microsoft's Remote Installation Services

Soren Rasmussen, Michael Iversen

IM Instant Messaging Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

Business Continuity and Disaster Recovery for InfoSec Managers

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL

XYPRO Technology Corp

Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2

Kieran McCorry

Understanding Virtual Reality: Interface, Application, and Design

William R. Sherman, Alan Craig

Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

Ron Goldman

Subdivision Methods for Geometric Design: A Constructive Approac

Joe Warren, Henrik Weimer

SQL: 1999 - Understanding Relational Language Components

Jim Melton, Alan R. Simon

Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery

Gerhard Weikum, Gottfried Vossen

Telecommunications Law in the Internet Age

Sharon K. Black

Computer Animation: Algorithms and Techniques

Richard Parent

Spatial Databases: With Application to GIS

Philippe Rigaux, Michel Scholl, Agnès Voisard

Geometric Tools for Computer Graphics

Philip Schneider, David H. Eberly

Swarm Intelligence

Russell C. Eberhart, Yuhui Shi, James Kennedy

Internet QoS: Architectures and Mechanisms for Quality of Service

Zheng Wang

Skew-Tolerant Circuit Design

David Harris

Illustrating Evolutionary Computation with Mathematica

Christian Jacob

Object-Oriented Reengineering Patterns

Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz

Component Database Systems

Klaus R. Dittrich, Andreas Geppert

Persuasive Technology: Using Computers to Change What We Think and Do

B.J. Fogg

Distributed Systems Architecture: A Middleware Approach

Arno Puder, Kay Römer, Frank Pilhofer

Readings in Multimedia Computing and Networking

Kevin Jeffay, Hong Jiang Zhang

Business Modeling and Data Mining

Dorian Pyle

Optical Networks: A Practical Perspective

Rajiv Ramaswami, Kumar Sivarajan

Usability for the Web: Designing Web Sites that Work

Tom Brinck, Darren Gergle, Scott D. Wood

Advanced Graphics Programming Using OpenGL

Tom McReynolds, David Blythe

An Introduction to NURBS: With Historical Perspective

David F. Rogers

Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design

Terry Halpin

Creative Evolutionary Systems

David W. Corne, Peter J. Bentley

The Designer's Guide to VHDL

Peter J. Ashenden

Advanced SQL:1999: Understanding Object-Relational and Other Advanced Features

Jim Melton

Data Warehousing: Using the Wal-Mart Model

Paul Westerman

TCP/IP Sockets in Java: Practical Guide for Programmers

Kenneth L. Calvert, Michael J. Donahoo

Object-Oriented Construction Handbook: Developing Application-Oriented Software with the Tools & Materials Approach

Heinz Züllighoven

Your Wish is My Command: Programming By Example

Henry Lieberman

Practical IDL Programming

Liam E. Gumley

Higher-Order Perl: Transforming Programs with Programs

Mark Jason Dominus

Readings in Hardware/Software Co-Design

Giovanni De Micheli, Rolf Ernst, Wayne Wolf

Querying XML: XQuery, XPath, and SQL/XML in context

Jim Melton, Stephen Buxton

Usability Engineering: Scenario-Based Development of Human-Computer Interaction

Mary Beth Rosson, John M. Carroll

Data Warehousing And Business Intelligence For e-Commerce

Alan R. Simon, Steven L. Shaffer

Digital Watermarking

Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller

Foundations of Genetic Algorithms 2001 (FOGA 6)

William Spears, Worthy N. Martin, Worth Martin

JDBC: Practical Guide for Java Programmers

Gregory D. Speegle

Curves and Surfaces for CAGD: A Practical Guide

Gerald Farin

System Architecture with XML

Berthold Daum, Udo Merten

Interactive QuickTime: Authoring Wired Media

Matthew R. Peterson

The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling

Peter J. Ashenden, Gregory D. Peterson, Darrell A. Teegarden

MPLS Network Management: MIBs, Tools, and Techniques

Thomas D. Nadeau

Web Application Design Handbook: Best Practices for Web-Based Software

Susan Fowler, Victor Stanwick

Database Tuning: Principles, Experiments, and Troubleshooting Techniques

Dennis Shasha, Philippe Bonnet

Mining the Web: Discovering Knowledge from Hypertext Data

Soumen Chakrabarti

Design Methods for Reactive Systems: Yourdon, Statemate, and the UML

R. J. Wieringa

Applying Knowledge Management: Techniques for Building Corporate Memories

Ian Watson

Embedded Computing: A VLIW Approach to Architecture, Compilers and Tools

Joseph A. Fisher, Paolo Faraboschi, Cliff Young

Voice Interaction Design:Crafting the New Conversational Speech Systems

Randy Allen Harris

Disappearing Cryptography: Information Hiding: Steganography & Watermarking

Peter Wayner

Developing IP-Based Services: Solutions for Service Providers and Vendors

Monique Morrow, Kateel Vijayananda

TCP/IP Clearly Explained

Pete Loshin

Blondie24: Playing at the Edge of AI

David B. Fogel

Non-Photorealistic Computer Graphics: Modeling, Rendering, and Animation

Thomas Strothotte, Stefan Schlechtweg

How to Build a Digital Library

Ian H. Witten, David Bainbridge

Digital Video and HDTV: Algorithms and Interfaces

Charles Poynton

Evolutionary Computation in Bioinformatics

Gary B. Fogel, David W. Corne

Digital Arithmetic

Miloš D. Ercegovac, Tomás Lang

Tcl/Tk: A Developer's Guide

Clif Flynt

HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science

John M. Carroll

IPv6: Theory, Protocol, and Practice

Pete Loshin

Modeling Business Objects with XML Schema

Berthold Daum

Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit

Peter Braun, Wilhelm R. Rossak

Information Visualization: Perception for Design

Colin Ware

Relational Database Design Clearly Explained

Jan L. Harrington


Markus Knasmüller

TCP/IP Sockets in C: Practical Guide for Programmers

Michael J. Donahoo, Kenneth L. Calvert

Modern Cable Television Technology

Walter Ciciora, James Farmer, David Large, Michael Adams

Bioinformatics: Managing Scientific Data

Zoé Lacroix, Terence Critchlow

Maintaining and Evolving Successful Commercial Web Sites: Managing Change, Content, Customer Relationships, and Site Measurement

Ashley Friedlein

Interaction Design for Complex Problem Solving: Developing Useful and Usable Software

Barbara Mirel

Content Networking: Architecture, Protocols, and Practice

Markus Hofmann, Leland R. Beaumont

Complete Maya Programming: An Extensive Guide to MEL and C++ API

David Gould

JSP: Practical Guide for Programmers

Robert Brunner

Level of Detail for 3D Graphics

David Luebke, Martin Reddy, Jonathan D. Cohen, Amitabh Varshney, Benjamin Watson, Robert Huebner

Web Bloopers: 60 Common Web Design Mistakes, and How to Avoid Them

Jeff Johnson

Designing Data-Intensive Web Applications

Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera

Multicast Sockets: Practical Guide for Programmers

David Makofske, Kevin Almeroth

Texturing and Modeling: A Procedural Approach

David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, Steven Worley

Interconnection Networks

Jose Duato, Sudhakar Yalamanchili, Lionel Ni

Real-Time Shader Programming

Ron Fosner

Temporal Data & the Relational Model

C.J. Date, Hugh Darwen, Nikos Lorentzos

Automated Planning: Theory & Practice

Malik Ghallab, Dana Nau, Paolo Traverso

Policy-Based Network Management: Solutions for the Next Generation

John Strassner

Jim Blinn's Corner: Notation, Notation, Notation

Jim Blinn

Digital Geometry: Geometric Methods for Digital Picture Analysis

Reinhard Klette, Azriel Rosenfeld

The Struts Framework: Practical Guide for Java Programmers

Sue Spielman

Why Programs Fail: A Guide to Systematic Debugging

Andreas Zeller

Unit Testing in Java: How Tests Drive the Code

Johannes Link

VLDB '02: Proceedings of the 28th International Conference on Very Large Databases


Paper Prototyping: The Fast and Easy Way to Design and Refine User Interfaces

Carolyn Snyder

Stochastic Local Search: Foundations & Applications

Holger H. Hoos, Thomas Stützle

ARM System Developer's Guide: Designing and Optimizing System Software

Andrew Sloss, Dominic Symes, Chris Wright

Network Processor Design: Issues and Practices, Volume 1

Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk

SQL Clearly Explained

Jan L. Harrington

Innovation Happens Elsewhere: Open Source as Business Strategy

Ron Goldman, Richard P. Gabriel

Constraint Processing

Rina Dechter

Data Quality: The Accuracy Dimension

Jack E. Olson

Engineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions

James Bean

Java Web Services Architecture

James McGovern, Sameer Tyagi, Michael Stevens, Sunil Mathew

Web Services and Service-Oriented Architectures

Douglas K. Barry

XML for Data Architects: Designing for Reuse and Integration

James Bean

Java: Practical Guide for Programmers

Michael Sikora

Virtual Machines: Versatile Platforms for Systems and Processes

Jim Smith, Ravi Nair

The Internet and Its Protocols: A Comparative Approach

Adrian Farrel

Wireless Sensor Networks: An Information Processing Approach

Feng Zhao, Leonidas Guibas

The Craft of Information Visualization: Readings and Reflections

Benjamin B. Bederson, Ben Shneiderman

Business Intelligence

David Loshin

Semantics in Business Systems

Dave McComb

How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering

Malcolm Chisholm

Database Modeling with Microsoft® Visio for Enterprise Architects

Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean

Joe Celko's Trees and Hierarchies in SQL for Smarties

Joe Celko

Observing the User Experience: A Practitioner's Guide to User Research

Mike Kuniavsky

Understanding Digital Libraries

Michael Lesk

Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation

Axel Jantsch

Location-Based Services

Jochen Schiller, Agnès Voisard

Knowledge Representation and Reasoning

Ronald Brachman, Hector Levesque

The Grid 2: Blueprint for a New Computing Infrastructure

Ian Foster, Carl Kesselman

Bluetooth Application Programming with the Java APIs

C Bala Kumar, Paul Kline, Tim Thompson

Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques

Catherine Courage, Kathy Baxter

The Mobile Connection: The Cell Phone's Impact on Society

Rich Ling

Cisco PIX Firewalls

Umer Khan

Sockets, Shellcode, Porting, & Coding

James Foster

Stealing the Network

Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch

InfoSec Career Hacking

Chris Hurley, Johnny Long, Aaron Bayles, Ed Brindley

Securing IM and P2P Applications for the Enterprise

Marcus Sachs, Paul Piccard

Host Integrity Monitoring Using Osiris and Samhain

Brian Wotring

Virtualization with VMware ESX Server

Al Muller, Seburn Wilson

Nessus, Snort, & Ethereal Power Tools

Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus

Penetration Tester's Open Source Toolkit

Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore

How to Cheat at Managing Windows Server Update Services

B. Barber

Phishing Exposed

Lance James

Configuring Check Point NGX VPN-1/Firewall-1

Barry Stiefel, Simon Desmeules

Skype Me!

Markus Daehne

Network Security Evaluation

Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

Christian Lahti, Roderick Peterson

How to Cheat at IT Project Management

Susan Snedaker

OS X for Hackers at Heart

Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers

Perfect Password

Mark Burnett

Security Log Management

Jacob Babbin

RFID Security

Frank Thornton, Chris Lanthem

Insider Threat

Eric Cole, Sandra Ring

How to Cheat at Configuring ISA Server 2004

Thomas Shinder, Debra Littlejohn Shinder

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure

B. Barber, Melissa Craft, Michael Cross, Hal Kurz

Practical VoIP Security

Thomas Porter

Video Conferencing over IP

Michael Gough

Combating Spyware in the Enterprise

Paul Piccard

Syngress IT Security Project Management Handbook

Susan Snedaker

Building a VoIP Network with Nortel’s Multimedia Communication Server 5100

Larry Chaffin


Dave Kleiman, Laura Hunter

How to Cheat at Securing a Wireless Network

Chris Hurley, Lee Barken

Firewall Policies and VPN Configurations

Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, jennifer Davis

How to Cheat at Managing Information Security

Mark Osborne

BigNum Math

Tom St Denis

How to Cheat at Designing Security for a Windows Server 2003 Network

Chris Ruston, Chris Peiris

Configuring SonicWALL Firewalls

Chris Lathem

How to Cheat at Managing Microsoft Operations Manager 2005

Tony Piltzecker

Writing Security Tools and Exploits

James Foster

The Enterprise Architecture IT Project: The Urbanisation Paradigm

Christophe Longépé

IP Addressing & Subnetting INC IPV6: Including IPv6

J D Wegner, Robert Rockell, Syngress Media

DBAs Guide to Databases Under Linux

David Egan, Paul Zikopoulos, Chris Rogers

Managing Windows 2000 Network Services

Dr. Thomas W. Shinder, Debra Littlejohn Shinder, Thomas W. Shinder, Syngress

Windows 2000 Configuration Wizards

Syngress Media, Brian M. Collins, Paul Shields

Windows 2000 Server System Administration Handbook

Paul Shields, Ralph W Crump, Martin Weiss

Troubleshooting Windows 2000 TCP/IP

Syngress Media Inc, Debra Littlejohn Shinder, Thomas W Shinder, Syngress

Building Cisco Remote Access Networks

Wayne Lawson

Configuring Cisco AVVID

Syngress Publishing, Erik Rozell, Sandy C. Kronenberg, Wayne Lawson

Mission Critical Windows 2000 Server Administration

Robin Walshaw, Syngress Publishing

Configuring Citrix MetaFrame for Windows 2000 Terminal Services

Melissa Craft, Allen V. Keele, et. al

Designing SQL Server 2000 Databases

Travis Laird, Robert Patton, and Jennifer Ogle

E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

Syngress Media Inc, Brian Bagnall, Syngress Publishing, James Stanger

Configuring Exchange Server 2000

James Stagner

ASP Configuration Handbook

John Gunson, Dale Booth, Sean Thurston

Hack Proofing Your E-Commerce Site - The only way to stop a hacker is to think like one

Ryan Russell

Configuring ISA Server 2000

Thomas W. Shinder, Inc. Syngress Media

Hack Proofing Your Web Applications - The Only Way to stop a hacker is to think like one

Ryan Russell, Inc. Syngress Media, Syngress Media

Palm OS Web Application Developer's Guide - Including PQA and Web Clipping

Ben Coombe, R. Eric Lyons, David C. Matthews, Rory Lysaght

Hack Proofing Linux

James Stanger, Patrick T. Lane

BizTalk Server 2000 Developer's Guide

Scott Roberts, Milton Todd, Chris Farmer, Robert Shimonski

Bluetooth Application Developer's Guide

Jennifer Bray, Brian Senese, Gordon McNutt, Bill Munday

Hack Proofing Sun Solaris 8

Ed Mitchell, Ido Dubrawsky, Wyman Miles, F Williams Lynch

Designing A Wireless Network

Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely

Webmaster's Guide to the Wireless Internet

Ryan Fife, Wei Meng Lee, Dan A. Olsen

XML .NET Developer's Guide

Henk-Evert Sonder, Jonothon Ortiz, Adam Sills Developer's Guide

Cameron Wakefield, Henk-Evert Sonder, Wei Meng Lee

C#.Net Developer's Guide

Saurabh Nandu,, Greg Hack, Adrian Turtschi

ASP .NET Web Developer's Guide

Jonothon Ortiz, Mesbah Ahmed, Chris Garrett, Jeremy Faircloth, Wei Meng Lee, Adam Sills, Chris Payne

Configuring Windows 2000 without Active Directory

Carol Bailey, Tom Shinder, Dr Thomas W Shinder, Thomas Shinder MD

.NET Mobile Web Developers Guide

Steve Milroy, Ken Cox,, Amit Kalani

Building A Cisco Wireless LAN

Ron Fuller, Tim Blankenship

Hackproofing Your Wireless Network

Tony Bautts, Erif Ouellet, Eric Ouellet, Neal O'Farrell

Windows 2000 Active Directory 2E

Melissa Craft

Ruby Developers Guide

Michael Neumann, Robert Feldt, Lyle Johnson

Building Robots With Lego Mindstorms

Mario Ferrari, Giulio Ferrari, Ralph Hempel

Hack Proofing Your Network

Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh

Hack Proofing ColdFusion

Steve Casco, Rob Rusher, Greg Meyer, Sarge

Configuring and Troubleshooting Windows XP Professional

Martin Grasdal, Brian Barber, Chad Todd, Norris L. Johnson Jr.

Developing .Net Web Services With Xml

David Jorgensen

Cisco AVVID and IP Telephony Design & Implementation

Robert Padjen, Larry Keefer, Sean Thurston, Jeff Bankston

Configuring IPv6 For Cisco IOS

Edgar, Jr. Parenti, Eric Knipp, Brian Browne

Developing Web Services with Java APIs for XML (JAX Pack)

Robert Hablutzel

Hacking a Terror Network: The Silent Threat of Covert Channels

Russ Rogers, Matthew Devost

Security Sage's Guide to Hardening the Network Infrastructure

Steven Andres, Brian Kenyon, Erik Pack Birkholz

Wardriving: Drive, Detect, Defend: A Guide to Wireless Security

Chris Hurley

Snort 2.1 Intrusion Detection

Brian Caswell, Jay Beale

Stealing the Network: How to Own a Continent

Ryan Russell, Joe Grand, Tom Craig

Nessus Network Auditing: Jay Beale Open Source Security Series

Jay Beale, Haroon Meer, Charl van der Walt, Renaud Deraison

Zero-Day Exploit:: Countdown to Darkness

Rob Shein, Marcus Sachs

Cyber Adversary Characterization: Auditing the Hacker Mind

Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz

The Best Damn Windows Server 2003 Book Period

Debra Littlejohn Shinder, Thomas Shinder

Dr. Tom Shinder's Configuring ISA Server 2004

Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal

Aggressive Network Self-Defense

Neil Wyler

Richard Thieme's Islands in the Clickstream

Richard Thieme

CYA Securing Exchange Server 2003

Mark Fugatt, Henrik Walther, Pattrick Santry

CYA Securing IIS 6.0

Chris Peiris, Bernard Cheah, Ken Schaefer

Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari, & Sega

Joe Grand, Albert Yarusso

Google Hacking for Penetration Testers

Johnny Long

Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

Lee Barken

Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover

David Allen

Apple I Replica Creation: Back to the Garage

Tom Owad

Cyber Spying

Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole

Network+ Study Guide & Practice Exams

Robert Shimonski, Laura Hunter, Norris Johnson

Hack Proofing Windows 2000 Server

Chad Todd, Norris L., Jr. Johnson

Hack Proofing XML

Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis Jr Franklin

Hack Proofing Your Identity

Teri Bidwell

Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1

Melissa Craft

C# For Java Programmers

Harold Cabrera, Jeremy Faircloth, Stephen Goldberg

Managing Cisco Network Security

Sean Thurston

Sniffer Pro Network Optimization and Troubleshooting Handbook

Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko

Cisco Security Specialists Guide to PIX Firewall

Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver

Configuring Cisco Voice Over IP

Jason Sinclair, Paul Fong, Scott M. Harris, Martin Walshaw

Scene of the Cybercrime

Debra Littlejohn Shinder, Ed Tittel

Dr Tom Shinder's ISA Server and Beyond

Thomas W. Shinder, Martin Grasdal, Debra Littlejohn Shinder

Special Ops

Erik Pace Birkholz, Stuart McClure

Nokia Network Security Solutions Handbook

Doug Maxwell

Snort Intrusion Detection 2.0

Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth

SSCP Study Guide and DVD Training System

Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth

Configuring Symantec AntiVirus Enterprise Edition

Laura E Hunter, Athar A Khan, James Stanger, Jay Cee Taylor

MCSE/MCSA (Exam 70-214) Study Guide

Will Schmied, Thomas W. Shinder

Stealing The Network: How to Own the Box

Ryan Russell, Ido Dubrawsky, FX, Joe Grand

Building DMZs For Enterprise Networks

Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder

The Best Damn Firewall Book Period

Cherie Amon, Thomas W. Shinder, Anne Carasik-Henmi

The Best Damn Cisco Internetworking Book Period

Charles Riley

MCSA/MCSE (Exam 70-291) Study Guide

Dr Thomas W. Shinder, Thomas W. Shinder, Debra Littlejohn Shinder

MCSE (Exam 70-293) Study Guide

Dr Thomas W Shinder, Thomas W Shinder, Debra Littlejohn Shinder, Martin Grasdal

MCSE (Exam 70-294) Study Guide

Michael Cross, Todd Walls, Jeffery A Martin, Martin Grasdal

CheckPoint NG VPN 1/Firewall 1

Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble

Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

Rick Gallaher

Configuring NetScreen Firewalls

Cameron, Rob

Intrusion Prevention and Active Response: Deploying Network and Host IPS

Michael Rash, Angela Orebaugh, Graham Clark

Deploying Citrix MetaFrame Presentation Server 3.0

Melissa Craft, Connie S. Wilson, Chris Broomes

Microsoft Log Parser Toolkit

Gabriele Giuseppini, Mark Burnett

MCSE (Exam 70-297) Study Guide

Neil Ruston, Laura E. Hunter

MCSE (Exam 70-298) Study Guide

Neil Ruston

MCSA/MCSE (Exam 70-292) Study Guide

Will Schmied, Robert J. Shimonski

MCSE (Exam 70-296) Study Guide

Anthony Piltzecker, Laura E Hunter, Melissa Craft, Brian Barber

MCSA/MCSE (Exam 70-290) Study Guide

Thomas W. Shinder, Debra Littlejohn Shinder, Syngress Publishing, Chris Peiris

Hacking the Code

Mark Burnett

Buffer Overflow Attacks

James C. Foster, Vitaly Osipov, Nish Bhalla

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky

Programmer's Ultimate Security DeskRef

James Foster

How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King

Susan Snedaker

Black Hat Physical Device Security: Exploiting Hardware and Software

Drew Miller

Ethereal Packet Sniffing

Angela D Orebaugh, Greg Morris, Ed Warnicke, Gilbert Ramirez

Hardware Hacking

Joe Grand, Kevin Mitnick, Ryan Russell

Inside the SPAM Cartel

Spammer-X, Jeffrey Posluns

Check Point Next Generation with Application Intelligence Security Administration

Chris Tobkin, Daniel Kligerman

Managing and Securing a Cisco SWAN

David Wall, Jeremy Faircloth, Joel Barrett, Jan Kanclirz Jr

Security Assessment

Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra

Software Piracy Exposed

Paul Craig, Mark Burnet

Mathematical Programming: Theory and Methods

S. M. Sinha

Wiley E-Books

Codecharts: Roadmaps and Blueprints for Object-Oriented Programs


Algorithms and Parallel Computing


Model-based Visual Tracking: the OpenTL Framework


Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition


Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems


Compiler Construction Using Java, JavaCC, and Yacc

Dos Reis

Enterprise Software Architecture and Design: Entities, Services, and Resources


Advanced Internet Protocols, Services, and Applications


Cyber Security Policy Guidebook


Practical Database Programming with Visual Basic.N ET, Second Edition


Convert! Designing Web Sites to Increase Traffic and Conversion


Java For Dummies(R), 5th Edition


The Death of the Internet


Energy-Efficient Distributed Computing Systems


Information Overload: An International Challengefor Professional Engineers and Technical Communicators


Reliability and Availability of Cloud Computing


Model-Driven and Software Product Line Engineering


Digital Color Imaging


Assembly Language Programming: ARM Cortex-M3


Digital Holography


Digital Color: Acquisition, Perception, Coding and Rendering


Program Specialization Engineering


Computer Architecture


Memory Allocation Problems in Embedded Systems / Optimization Methods


Advanced Transport Protocols


Computer Science and Ambient Intelligence