| 1 |
See MIPS Run |
Dominic Sweetman |
| 2 |
Multimedia over IP and Wireless Networks |
Mihaela van der Schaar, Philip A Chou |
| 3 |
X3D |
Don Brutzman, Leonard Daly |
| 4 |
Fault-Tolerant Systems |
Israel Koren, C. Mani Krishna |
| 5 |
Effective Prototyping for Software Makers |
Jonathan Arnowitz, Michael Arent, Nevin Berger |
| 6 |
Network Routing |
Deepankar Medhi, Karthikeyan Ramasamy |
| 7 |
Physical Database Design |
Sam S. Lightstone, Toby J. Teorey, Tom Nadeau |
| 8 |
Geometric Algebra for Computer Science |
Leo Dorst, Daniel Fontijne, Stephen Mann |
| 9 |
High-Performance Embedded Computing |
Wayne Wolf |
| 10 |
Letting Go of the Words |
Janice (Ginny) Redish |
| 11 |
FastSOA |
Frank Cohen |
| 12 |
Customizable Embedded Processors |
Paolo Ienne, Rainer Leupers |
| 13 |
Java Data Mining: Strategy, Standard, and Practice |
Mark F. Hornick, Erik Marcadé, Sunil Venkayala |
| 14 |
Probabilistic Methods for Financial and Marketing Informatics |
Richard E Neapolitan, Xia Jiang |
| 15 |
IPv6 Advanced Protocols Implementation |
Qing Li, Jinmei Tatuya, Keiichi Shima |
| 16 |
Network Analysis, Architecture, and Design |
James D. McCabe |
| 17 |
IT Manager's Handbook |
Bill Holtsnider, Brian D. Jaffe |
| 18 |
Digital Design and Computer Architecture |
David Harris, Sarah Harris |
| 19 |
Deploying IP and MPLS QoS for Multiservice Networks |
John William Evans, Clarence Filsfils |
| 20 |
Real-Life MDA |
Michael Guttman, John Parodi |
| 21 |
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children |
Charles T. Betz |
| 22 |
Visualization in Medicine |
Bernhard Preim, Dirk Bartz |
| 23 |
Point-Based Graphics |
Markus Gross, Hanspeter Pfister |
| 24 |
User-Centered Design Stories |
Carol Righi, Janice James |
| 25 |
Web Dragons |
Ian H. Witten, Marco Gori, Teresa Numerico |
| 26 |
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks |
Gerald R. Ash |
| 27 |
Strategic Security Management |
Karim Vellani |
| 28 |
The Profit Impact of Business Intelligence |
Steve Williams, Nancy Williams |
| 29 |
Practical Model-Based Testing |
Mark Utting, Bruno Legeard |
| 30 |
Groovy Programming |
Kenneth Barclay, John Savage |
| 31 |
ESL Design and Verification |
Grant Martin, Brian Bailey, Andrew Piziali |
| 32 |
Data Preparation for Data Mining Using SAS |
Mamdouh Refaat |
| 33 |
Wireless Communications & Networking |
Vijay Garg |
| 34 |
UML 2 Certification Guide |
Tim Weilkiens, Bernd Oestereich |
| 35 |
Text Entry Systems |
I. Scott MacKenzie, Kumiko Tanaka-Ishii |
| 36 |
Joe Celko's SQL Puzzles and Answers |
Joe Celko |
| 37 |
Ethernet Networking for the Small Office and Professional Home Office |
Jan L. Harrington |
| 38 |
Sketching User Experiences: Getting the Design Right and the Right Design |
Bill Buxton |
| 39 |
Business Process Change |
Paul Harmon |
| 40 |
IPv6 Core Protocols Implementation |
Qing Li, Tatuya Jinmei, Keiichi Shima |
| 41 |
The History of Information Security |
Karl Maria Michael de Leeuw |
| 42 |
Parallel Computational Fluid Dynamics 2005: Theory and Applications |
A. Deane, Gunther Brenner, A. Ecer, David Emerson, James McDonough, J. Periaux, N. Satofuka, Damien Tromeur-Dervout |
| 43 |
Parallel Computational Fluid Dynamics 2006 |
Jang-Hyuk Kwon, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox |
| 44 |
Wireless Networking Technology |
Steve Rackley |
| 45 |
CCTV Surveillance |
Herman Kruegle |
| 46 |
Data Mining and Predictive Analysis |
Colleen McCue |
| 47 |
Security Operations Management, 2nd ed. |
Robert McCrie |
| 48 |
Integrated Security Systems Design |
Thomas L. Norman, CPP, PSP, CSC |
| 49 |
Systems Thinking |
Gharajedaghi, Jamshid |
| 50 |
The Art of War for Security Managers |
Scott Watson |
| 51 |
Electronic Security Systems |
Robert Pearson |
| 52 |
Secure Roaming in 802.11 Networks |
Raymond Greenlaw, Paul Goransson |
| 53 |
Security Convergence |
Dave Tyson |
| 54 |
Microsoft® Exchange Server 2003 Scalability with SP1 and SP2 |
Pierre Bijaoui |
| 55 |
Developing Practical Wireless Applications |
Dean A. Gratton |
| 56 |
Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook |
Ken England, Gavin JT Powell |
| 57 |
Oracle 10g Developing Media Rich Applications |
Lynne Dunckley, Larry Guros |
| 58 |
Microsoft Windows Security Fundamentals |
Jan De Clercq, Guido Grillenmeier |
| 59 |
Oracle Performance Tuning for 10gR2 |
Gavin JT Powell |
| 60 |
Microsoft Outlook 2007 Programming |
Sue Mosher |
| 61 |
Microsoft Exchange 2007: Tony Redmond's Guide to Successful Implementation |
Tony Redmond |
| 62 |
Computational Intelligence |
Russell C. Eberhart, Yuhui Shi |
| 63 |
System Level Design with Rosetta |
Perry Alexander |
| 64 |
Google Talking |
Joshua Brashars, Johnny Long |
| 65 |
Syngress Force Emerging Threat Analysis |
Robert Graham |
| 66 |
Scripting VMware Power Tools: Automating Virtual Infrastructure Administration |
Al Muller |
| 67 |
Developer's Guide to Web Application Security |
Michael Cross |
| 68 |
Wireshark & Ethereal Network Protocol Analyzer Toolkit |
Angela Orebaugh, Gilbert Ramirez, Jay Beale |
| 69 |
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research |
James Foster, David Maynor |
| 70 |
Stealing the Network |
Johnny Long, Timothy Mullen, Ryan Russell |
| 71 |
Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders |
Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson |
| 72 |
Snort Intrusion Detection and Prevention Toolkit |
Brian Caswell, Jay Beale, Andrew Baker |
| 73 |
Designing and Building Enterprise DMZs |
Hal Flynn |
| 74 |
Network Security Assessment |
Steve Manzuik, Ken Pfeil, Andrew Gold |
| 75 |
Cryptography for Developers |
Tom St Denis |
| 76 |
How to Cheat at Windows System Administration Using Command Line Scripts |
Pawan K Bhardwaj |
| 77 |
Virtualization with Microsoft Virtual Server 2005 |
Andy Jones, Rogier Dittner, David Rule, Ken Majors, Matthijs ten Seldam, Twan Grotenhuis, Geoffrey Green |
| 78 |
Hack the Stack |
Michael Gregg |
| 79 |
WarDriving and Wireless Penetration Testing |
Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker |
| 80 |
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security |
T. Bradley |
| 81 |
FISMA Certification and Accreditation Handbook |
L. Taylor |
| 82 |
Configuring Juniper Networks NetScreen & SSG Firewalls |
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin |
| 83 |
Secure Your Network for Free |
Eric Seagren |
| 84 |
CD and DVD Forensics |
Paul Crowley |
| 85 |
Enemy at the Water Cooler |
Brian T Contos |
| 86 |
Cyber Crime Investigations |
Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel |
| 87 |
RFID+ Study Guide and Practice Exams |
Paul Sanghera |
| 88 |
Botnets |
Craig Schiller, Jim Binkley |
| 89 |
How to Cheat at Configuring Exchange Server 2007 |
Henrik Walther |
| 90 |
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators |
Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood |
| 91 |
Microsoft Vista for IT Security Professionals |
Tony Piltzecker |
| 92 |
Asterisk Hacking |
Joshua Brashars |
| 93 |
Building Robots with LEGO Mindstorms NXT |
Mario Ferrari, Guilio Ferrari, David Astolfo |
| 94 |
Security+ Study Guide |
Ido Dubrawsky, Jeremy Faircloth |
| 95 |
Cross Site Scripting Attacks |
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager |
| 96 |
How to Cheat at IIS 7 Server Administration |
Chris Adams, Brian Frederick |
| 97 |
Windows Forensic Analysis DVD Toolkit |
Harlan Carvey |
| 98 |
Alternate Data Storage Forensics |
Amber Schroader, Tyler Cohen |
| 99 |
PCI Compliance |
Tony Bradley, Anton Chuvakin, Anatoly Elberg, Brian J. Koerner |
| 100 |
Linksys WRT54G Ultimate Hacking |
Paul Asadoorian, Larry Pesce |
| 101 |
Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress |
David E. Williams |
| 102 |
Zen and the Art of Information Security |
Ira Winkler |
| 103 |
How to Cheat at VoIP Security |
Thomas Porter, Michael Gough |
| 104 |
How to Cheat at Configuring Open Source Security Tools |
Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty |
| 105 |
Business Continuity and Disaster Recovery for IT Professionals |
Susan Snedaker |
| 106 |
Perl Scripting for Windows Security |
Harlan Carvey |
| 107 |
How to Cheat at Microsoft Vista Administration |
Jan Kanclirz |
| 108 |
How to Cheat at Configuring VmWare ESX Server |
David Rule |
| 109 |
Open Source Fuzzing Tools |
Noam Rathaus, Gadi Evron |
| 110 |
How to Cheat at Securing SQL Server 2005 |
Mark Horninger |
| 111 |
The Official CHFI Study Guide (Exam 312-49) |
Dave Kleiman |
| 112 |
Practical Oracle Security |
Josh Shaul, Aaron Ingram |
| 113 |
Dr. Tom Shinder's ISA Server 2006 Migration Guide |
Thomas W Shinder |
| 114 |
Juniper(r) Networks Secure Access SSL VPN Configuration Guide |
Rob Cameron, Neil R. Wyler |
| 115 |
The Designer's Guide to VHDL |
Peter J. Ashenden |
| 116 |
Digital Modeling of Material Appearance |
Julie Dorsey, Holly Rushmeier, François Sillion |
| 117 |
Architecture Design for Soft Errors |
Shubu Mukherjee |
| 118 |
Reconfigurable Computing |
Scott Hauck, André DeHon |
| 119 |
Verification Techniques for System-Level Design |
Masahiro Fujita, Indradeep Ghosh, Mukul Prasad |
| 120 |
GUI Bloopers 2.0 |
Jeff Johnson |
| 121 |
Keeping Found Things Found: The Study and Practice of Personal Information Management |
William Jones |
| 122 |
Visual Thinking |
Colin Ware |
| 123 |
Annotated C# Standard |
Jon Jagger, Nigel Perry, Peter Sestoft |
| 124 |
Image Fusion |
Tania Stathaki |
| 125 |
Wireless Sensor and Actuator Networks |
Roberto Verdone, Davide Dardari, Gianluca Mazzini, Andrea Conti |
| 126 |
Microscope Image Processing |
Qiang Wu, Fatima Merchant, Kenneth Castleman |
| 127 |
Digital Watermarking and Steganography |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker |
| 128 |
Semantic Web for the Working Ontologist |
Dean Allemang, James Hendler |
| 129 |
Measuring the User Experience |
Thomas Tullis, William Albert |
| 130 |
Information Assurance |
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi |
| 131 |
Information Modeling and Relational Databases |
Terry Halpin, Tony Morgan |
| 132 |
Microsoft SharePoint 2007 Technologies |
Kevin Laahs, Emer McKenna, Veli-Matti Vanamo |
| 133 |
Business Metadata: Capturing Enterprise Knowledge |
William H. Inmon, Bonnie O'Neil, Lowell Fryman |
| 134 |
On-Chip Communication Architectures |
Sudeep Pasricha, Nikil Dutt |
| 135 |
Moderating Usability Tests: Principles and Practices for Interacting |
Joseph S. Dumas, Beth A. Loring |
| 136 |
System-on-Chip Test Architectures |
Laung-Terng Wang, Charles E. Stroud, Nur A. Touba |
| 137 |
HCI Beyond the GUI |
Philip Kortum |
| 138 |
Unleashing Web 2.0 |
Gottfried Vossen, Stephan Hagemann |
| 139 |
Evaluating Children's Interactive Products |
Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi |
| 140 |
Embedded DSP Processor Design |
Dake Liu |
| 141 |
Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL |
Joe Celko |
| 142 |
Aspect-Oriented Programming with the e Verification Language |
David Robinson |
| 143 |
VHDL-2008 |
Peter J. Ashenden, Jim Lewis |
| 144 |
Wireless Networking |
Anurag Kumar, D. Manjunath, Joy Kuri |
| 145 |
TCP/IP Sockets in Java |
Kenneth L. Calvert, Michael J. Donahoo |
| 146 |
Systems Engineering with SysML/UML |
Tim Weilkiens |
| 147 |
Processor Description Languages |
Prabhat Mishra, Nikil Dutt |
| 148 |
Internet Multimedia Communications Using SIP |
Rogelio Martinez Perea |
| 149 |
DW 2.0: The Architecture for the Next Generation of Data Warehousing |
William H. Inmon, Derek Strauss, Genia Neushloss |
| 150 |
Bluetooth Application Programming with the Java APIs Essentials Edition |
Timothy J. Thompson, C Bala Kumar, Paul Kline |
| 151 |
Executing Data Quality Projects |
Danette McGilvray |
| 152 |
Practical Guide to SysML |
Sanford Friedenthal, Rick Steiner, Alan Moore |
| 153 |
MPLS: Next Steps |
Bruce S. Davie, Adrian Farrel |
| 154 |
Network Security: Know It All |
James Joshi |
| 155 |
Digital Signal Processing System Design |
Nasser Kehtarnavaz |
| 156 |
Memory Systems |
Bruce Jacob, Spencer Ng, David Wang |
| 157 |
Handbook of Knowledge Representation |
Frank van Harmelen, Vladimir Lifschitz, Bruce Porter |
| 158 |
Information Flow and Knowledge Sharing |
Flavio Soares Correa da Silva, Jaume Agusti-Cullell, Frank van Harmelen |
| 159 |
Introduction to CDMA Wireless Communications |
Mosa Ali Abu-Rgheff |
| 160 |
Designing Storage for Exchange 2007 SP1 |
Pierre Bijaoui, Juergen Hasslauer |
| 161 |
Microsoft Exchange Server 2007 with SP1 |
Tony Redmond |
| 162 |
Joe Grand's Best of Hardware, Wireless, and Game Console Hacking |
Joe Grand, Frank Thornton, Albert Yarusso, Lee Barken, Tom Owad, Ryan Russell, Bobby Kinstle, Marcus R Brown, Job de Haas, Deborah Kaplan |
| 163 |
Kismet Hacking |
Frank Thornton |
| 164 |
Physical and Logical Security Convergence: Powered By Enterprise Security Management |
William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole |
| 165 |
AVIEN Malware Defense Guide for the Enterprise |
David Harley |
| 166 |
Google Hacking for Penetration Testers |
Johnny Long |
| 167 |
SonicWALL Secure Wireless Network Integrated Solutions Guide |
Khai Tran, Joe Levy, Lauren Pederson |
| 168 |
How to Cheat at Securing Linux |
James Stanger |
| 169 |
Nessus Network Auditing |
Russ Rogers |
| 170 |
Web Application Vulnerabilities |
Steven Palmer |
| 171 |
How to Cheat at Administering Office Communications Server 2007 |
Anthony Piltzecker |
| 172 |
No Tech Hacking |
Johnny Long, Kevin D. Mitnick |
| 173 |
Sarbanes-Oxley IT Compliance Using Open Source Tools |
Christian B Lahti, Roderick Peterson |
| 174 |
The Best Damn Server Virtualization Book Period |
Rogier Dittner, David Rule |
| 175 |
The Best Damn Firewall Book Period |
Thomas W Shinder |
| 176 |
The Best Damn Exchange, SQL and IIS Book Period |
Henrik Walther, Mark Horninger, Chris Adams |
| 177 |
TechnoSecurity's Guide to E-Discovery and Digital Forensics |
Jack Wiles |
| 178 |
InfoSecurity 2008 Threat Analysis |
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg |
| 179 |
The Best Damn IT Security Management Book Period |
Susan Snedaker, Robert McCrie, Karim Vellani |
| 180 |
The Best Damn Cybercrime and Digital Forensics Book Period |
Jack Wiles, Anthony Reyes |
| 181 |
How to Cheat at Deploying and Securing RFID |
Frank Thornton, Paul Sanghera |
| 182 |
How to Cheat at Securing Your Network |
Ido Dubrawsky |
| 183 |
Reverse Engineering Code with IDA Pro |
Chris Paget, Walter Pearce, Damon Cortesi |
| 184 |
Managing Catastrophic Loss of Sensitive Data |
Constantine Photopoulos |
| 185 |
OSSEC Host-Based Intrusion Detection Guide |
Rory Bray, Daniel Cid, Andrew Hay |
| 186 |
Nmap in the Enterprise |
Angela Orebaugh, Becky Pinkard |
| 187 |
Microsoft Forefront Security Administration Guide |
Jesse Varsalone |
| 188 |
Check Point NGX R65 Security Administration |
Ralph Bonnell |
| 189 |
OS X Exploits and Defense |
David Harley |
| 190 |
Secrets Stolen, Fortunes Lost |
Christopher Burgess, Richard Power |
| 191 |
The IT Digital Legal Companion |
Gene K. Landy, Amy J. Mastrobattista |
| 192 |
Netcat Power Tools |
Giovanni Giacobbi |
| 193 |
The IT Regulatory and Standards Compliance Handbook: |
Craig S. Wright |
| 194 |
Nagios 3 Enterprise Network Monitoring |
Max Schubert, Derrick Bennett, Andreas Ericsson |
| 195 |
Malware Forensics |
Cameron H. Malin, Eoghan Casey, James M. Aquilina |
| 196 |
The Best Damn Windows Server 2008 Book Period |
Anthony Piltzecker, Susan Snedaker |
| 197 |
Integrating ISA Server 2006 with Microsoft Exchange 2007 |
Fergus Strachan |
| 198 |
Scene of the Cybercrime |
Debra Littlejohn Shinder, Michael Cross |
| 199 |
Programming Lego Mindstorms NXT |
Owen Bishop |
| 200 |
Securing Windows Server 2008 |
Aaron Tiensivu |
| 201 |
Securing Citrix Presentation Server in the Enterprise |
Tariq Azad |
| 202 |
Techno Security's Guide to Securing SCADA |
Jack Wiles |
| 203 |
Effective Prototyping with Excel |
Jonathan Arnowitz, Michael Arent, Nevin Berger, Fred Sampson |
| 204 |
Probabilistic Methods for Bioinformatics |
Richard E Neapolitan, Xia Jiang |
| 205 |
Building Intelligent Interactive Tutors |
Beverly Park Woolf |
| 206 |
Technical, Commercial and Regulatory Challenges of QoS |
XiPeng Xiao |
| 207 |
Business Modeling |
David M. Bridgeland, Ron Zahavi |
| 208 |
Partial-Update Adaptive Signal Processing |
Kutluyil Dogancay |
| 209 |
P2P Networking and Applications |
John Buford, Heather Yu, Eng Keong Lua |
| 210 |
Master Data Management |
David Loshin |
| 211 |
Web Application Design Patterns |
Pawan Vora |
| 212 |
Three-dimensional Integrated Circuit Design |
Vasilis F. Pavlidis, Eby G. Friedman |
| 213 |
Computer and Information Security Handbook |
John R. Vacca |
| 214 |
Broadband Cable Access Networks |
David Large, James Farmer |
| 215 |
Networked Graphics |
Steed, Anthony |
| 216 |
Low-Power Design of Nanometer FPGAs |
Mohab Anis, Hassan Hassan |
| 217 |
Building the Agile Enterprise |
Cummins, Fred |
| 218 |
Deploying QoS for Cisco IP and Next Generation Networks |
Vinod Joseph, Tony Jeffress, Brett Chapman |
| 219 |
Disappearing Cryptography |
Peter Wayner |
| 220 |
Why Programs Fail |
Andreas Zeller |
| 221 |
TCP/IP Sockets in C |
Michael J. Donahoo, Kenneth L. Calvert |
| 222 |
The Illustrated Network |
Walter Goralski |
| 223 |
Database Archiving |
Jack E. Olson |
| 224 |
Joe Celko's Data, Measurements and Standards in SQL |
Celko, Joe |
| 225 |
Relational Database Design and Implementation |
Harrington, Jan |
| 226 |
Handbook of Global User Research |
Schumacher, Robert |
| 227 |
How to Build a Digital Library |
Witten, Ian |
| 228 |
SOA and Web Services Interface Design |
Bean, James |
| 229 |
Mobile Technology for Children |
Druin, Allison |
| 230 |
Geometric Algebra for Computer Science (Revised Edition) |
Dorst, Leo |
| 231 |
Developing Virtual Reality Applications |
Craig, Alan |
| 232 |
Principles of Computer System Design |
Saltzer, Jerome |
| 233 |
Semiconductors and the Information Revolution |
Orton, John |
| 234 |
RF and Digital Signal Processing for Software-Defined Radio |
Tony J. Rouphael |
| 235 |
Embedded Linux Development Using Eclipse |
Doug Abbott |
| 236 |
Principles of Transaction Processing |
Philip A. Bernstein, Eric Newcomer |
| 237 |
Forms that Work |
Caroline Jarrett, Gerry Gaffney |
| 238 |
Next Generation SSH2 Implementation |
Justin Peltier |
| 239 |
SAP Security Configuration and Deployment |
Joey Hirao |
| 240 |
GFI Network Security and PCI Compliance Power Tools |
Brien Posey |
| 241 |
Nokia Firewall, VPN, and IPSO Configuration Guide |
Andrew Hay, Keli Hay, Peter Giannoulis |
| 242 |
E-discovery: Creating and Managing an Enterprisewide Program |
Karen A. Schuler |
| 243 |
Mobile Malware Attacks and Defense |
Ken Dunham |
| 244 |
Virtualization for Security |
John Hoopes |
| 245 |
Cisco Router and Switch Forensics |
Liu, Dale |
| 246 |
SQL Injection Attacks and Defense |
Clarke, Justin |
| 247 |
Professional Penetration Testing |
Wilhelm, Thomas |
| 248 |
Eleventh Hour Security+ |
Dubrawsky, Ido |
| 249 |
Eleventh Hour Network+ |
Alpern, Naomi |
| 250 |
Bebop to the Boolean Boogie |
Clive Maxfield |
| 251 |
The Practitioner's Guide to Data Quality Improvement |
Loshin, David |
| 252 |
Optical Networks |
Ramaswami, Rajiv |
| 253 |
Handbook of Digital Forensics and Investigation |
Casey, Eoghan |
| 254 |
Electronic Design Automation |
Wang, Laung-Terng |
| 255 |
Beyond the Usability Lab |
Albert, William |
| 256 |
Smart Things: Ubiquitous Computing User Experience Design |
Kuniavsky, Mike |
| 257 |
Information Systems Transformation |
Ulrich, William |
| 258 |
Design to Thrive |
Howard, Tharon |
| 259 |
Designing with the Mind in Mind |
Johnson, Jeff |
| 260 |
Managing Time in Relational Databases |
Johnston, Tom |
| 261 |
Physically Based Rendering |
Pharr, Matt |
| 262 |
Usability Testing Essentials |
Barnum, Carol |
| 263 |
Light and Skin Interactions |
Baranoski, Gladimir |
| 264 |
User Experience Re-Mastered |
Wilson, Chauncey |
| 265 |
Interconnecting Smart Objects with IP |
Vasseur, Jean-Philippe |
| 266 |
Making Enterprise Information Management (EIM) Work for Business |
Ladley, John |
| 267 |
SQL Clearly Explained |
Harrington, Jan |
| 268 |
Thoughts on Interaction Design |
Kolko, Jon |
| 269 |
ON THE DEVELOPMENT OF CHINA ’S INFORMATION TECHNOLOGY INDUSTRY |
Jiang, Zemin |
| 270 |
System Assurance |
Mansourov, Nikolai |
| 271 |
The Essential Persona Lifecycle: Your Guide to Building and Using Personas |
Adlin, Tamara |
| 272 |
Understanding Motion Capture for Computer Animation |
Menache, Alberto |
| 273 |
Agile Development and Business Goals |
Holtsnider, Bill |
| 274 |
No Code Required |
Cypher, Allen |
| 275 |
Entity Resolution and Information Quality |
Talburt, John |
| 276 |
Joe Celko's SQL for Smarties |
Celko, Joe |
| 277 |
Analyzing Social Media Networks with Microsoft NodeXL |
Hansen, Derek |
| 278 |
Cyber Attacks |
Amoroso, Edward |
| 279 |
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit |
Liu, Dale |
| 280 |
Microsoft Virtualization |
Olzak, Thomas |
| 281 |
A Guide to Kernel Exploitation |
Perla, Enrico |
| 282 |
Eleventh Hour Linux+ |
Speake, Graham |
| 283 |
PCI Compliance |
Chuvakin, Anton |
| 284 |
Digital Forensics for Network, Internet, and Cloud Computing |
Garrison, Clint |
| 285 |
Seven Deadliest Wireless Technologies Attacks |
Haines, Brad |
| 286 |
Seven Deadliest Web Application Attacks |
Shema, Mike |
| 287 |
Seven Deadliest Social Network Attacks |
Timm, Carl |
| 288 |
Seven Deadliest Unified Communications Attacks |
York, Dan |
| 289 |
Seven Deadliest Network Attacks |
Prowell, Stacy |
| 290 |
Seven Deadliest Microsoft Attacks |
Kraus, Rob |
| 291 |
Seven Deadliest USB Attacks |
Anderson, Brian |
| 292 |
Virtualization and Forensics |
Barrett, Diane |
| 293 |
Microsoft Windows 7 Administrator's Reference |
Orchilles, Jorge |
| 294 |
CISSP Study Guide |
Conrad, Eric |
| 295 |
Eleventh Hour CISSP |
Conrad, Eric |
| 296 |
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition |
Street, Jayson |
| 297 |
Securing the Smart Grid |
Flick, Tony |
| 298 |
Managed Code Rootkits |
Metula, Erez |
| 299 |
Microsoft Windows Server 2008 R2 Administrator's Reference |
Hannifin, Dustin |
| 300 |
Citrix XenDesktop Implementation.. |
James, Gareth R. |
| 301 |
Ninja Hacking |
Wilhelm, Thomas |
| 302 |
Security for Microsoft Windows System Administrators |
Rountree, Derrick |
| 303 |
Digital Video Surveillance and Security |
Caputo, Anthony |
| 304 |
Metrics and Methods for Security Risk Management |
Young, Carl |
| 305 |
Heuristic Search |
Edelkamp, Stefan |
| 306 |
Architecture of Network Systems |
Serpanos, Dimitrios |
| 307 |
Data Mining: Practical Machine Learning Tools and Techniques |
Witten, Ian |
| 308 |
Developing High Quality Data Models |
West, Matthew |
| 309 |
Global UX |
Sherman, Paul |
| 310 |
Thoughts on Interaction Design |
Kolko, Jon |
| 311 |
Data Mining |
Han, Jiawei |
| 312 |
Effective Security Management |
Sennewald, Charles |
| 313 |
Database Modeling and Design |
Teorey, Toby |
| 314 |
Electronic Access Control |
Little, Karen |
| 315 |
Pervasive Information Architecture |
Resmini, Andrea |
| 316 |
Brave NUI World |
Wigdor, Dennis |
| 317 |
Private Cloud Computing |
Smoot, Stephen |
| 318 |
Deploying Next Generation Multicast-enabled Applications |
Joseph, Vinod |
| 319 |
GPU Computing Gems Emerald Edition |
|
| 320 |
API Design for C++ |
Reddy, Martin |
| 321 |
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children |
Betz, Charles |
| 322 |
Data Architecture |
Tupper, Charles |
| 323 |
A Practical Guide to SysML |
Friedenthal, Sanford |
| 324 |
3C Vision |
Levialdi |
| 325 |
Design Research through Practice |
Koskinen, Ilpo |
| 326 |
Systems Thinking |
Gharajedaghi, Jamshid |
| 327 |
GPU Computing Gems Jade Edition |
|
| 328 |
Semantic Web for the Working Ontologist |
Allemang, Dean |
| 329 |
Private Security and the Law |
Nemeth, Charles |
| 330 |
OCEB Certification Guide |
Weilkiens, Tim |
| 331 |
Heterogeneous Computing with OpenCL |
Gaster, Benedict |
| 332 |
CUDA Application Design and Development |
Farber, Rob |
| 333 |
Thor's Microsoft Security Bible |
Mullen, Timothy |
| 334 |
Securing the Cloud |
Winkler, J.R. ("Vic") |
| 335 |
Web Application Obfuscation |
Heiderich, Mario |
| 336 |
Security Risk Management |
Wheeler, Evan |
| 337 |
Securing SQL Server |
Cherry, Denny |
| 338 |
Digital Forensics for Legal Professionals |
Daniel, Larry |
| 339 |
Industrial Network Security |
Knapp, Eric |
| 340 |
Migrating to the Cloud |
Laszewski, Tom |
| 341 |
The Basics of Information Security |
Andress, Jason |
| 342 |
The Basics of Hacking and Penetration Testing |
Engebretson, Patrick |
| 343 |
iPhone and iOS Forensics |
Hoog, Andrew |
| 344 |
Low Tech Hacking |
Wiles, Jack |
| 345 |
Moving To The Cloud |
Dinkar, Sitaram |
| 346 |
Coding for Penetration Testers |
Andress, Jason |
| 347 |
Information Visualization |
Ware, Colin |
| 348 |
Sketching User Experiences: The Workbook |
Greenberg, Saul |
| 349 |
Risk Analysis and the Security Survey |
Broder, James F. |
| 350 |
Tcl/Tk |
Flynt, Clif |
| 351 |
Observing the User Experience |
Kuniavsky, Mike |
| 352 |
Quantifying the User Experience |
Sauro, Jeff |
| 353 |
Writing Effective Business Rules |
Witt, Graham |
| 354 |
It's Our Research |
Sharon, Tomer |
| 355 |
User Experience Management |
Lund, Arnie |
| 356 |
Business Intelligence |
Loshin, David |
| 357 |
Letting Go of the Words |
Redish, Janice (Ginny) |
| 358 |
Grounded Innovation |
Holmquist, Lars Erik |
| 359 |
Design for Emotion |
van Gorp, Trevor |
| 360 |
Joe Celko's Trees and Hierarchies in SQL for Smarties |
Celko, Joe |
| 361 |
Data Insights |
Whitney, Hunter |
| 362 |
User Experience in the Age of Sustainability |
Kramer, Kem-Laurin |
| 363 |
Intersection |
Guenther, Milan |
| 364 |
Usability in Government Systems |
Buie, Elizabeth |
| 365 |
Content Strategy at Work |
Bloomstein, Margot |
| 366 |
Digital Video and HD |
Poynton, Charles |
| 367 |
Data Virtualization for Business Intelligence Systems |
van der Lans, Rick |
| 368 |
Agile Data Warehousing Project Management |
Hughes, Ralph |
| 369 |
Designing the Search Experience |
Russell-Rose, Tony |
| 370 |
Temporal QOS Management in Scientific Cloud Workflow Systems |
Liu, Xiao |
| 371 |
Security Consulting |
Sennewald, Charles |
| 372 |
Synchronous Precharge Logic |
Smoszna, Marek |
| 373 |
The Basics of Cyber Warfare |
Winterfeld, Steve |
| 374 |
Federated Identity Primer |
Rountree, Derrick |
| 375 |
Introduction to Data Compression |
Sayood, Khalid |
| 376 |
Homeland Security |
Bullock, Jane |
| 377 |
Using Open Source Platforms for Business Intelligence |
Wise, Lyndsay |
| 378 |
Handbook on Securing Cyber-Physical Critical Infrastructure |
Das, Sajal |
| 379 |
Data Governance |
Ladley, John |
| 380 |
Computer Animation |
Parent, Rick |
| 381 |
Effective Physical Security |
Fennelly, Lawrence |
| 382 |
CUDA Programming |
Cook, Shane |
| 383 |
Collaborative Enterprise Architecture |
Bente, Stefan |
| 384 |
IT Manager's Handbook |
Holtsnider, Bill |
| 385 |
Agile User Experience Design |
Brown, Diana |
| 386 |
Structured Parallel Programming |
McCool, Michael |
| 387 |
Cargo Theft, Loss Prevention, and Supply Chain Security |
Burges, Dan |
| 388 |
Principles of Data Integration |
Halevy, Alon |
| 389 |
Malware Forensic Field Guide for Windows Systems |
Malin, Cameron |
| 390 |
Client-Side Attacks and Defense |
Oriyano, Sean-Philip |
| 391 |
Logging and Log Management |
Chuvakin, Anton |
| 392 |
FISMA and the Risk Management Framework |
Gantz, Stephen |
| 393 |
Wireless Reconnaissance in Penetration Testing |
Neely, Matthew |
| 394 |
Augmented Reality |
Kipper, Greg |
| 395 |
Information Security Risk Assessment Toolkit |
Talabis, Mark |
| 396 |
Federal Cloud Computing |
Metheny, Matthew |
| 397 |
Blackhatonomics |
Gragido, Will |
| 398 |
Data Hiding |
Raggo, Michael |
| 399 |
UTM Security with Fortinet |
Tam, Kenneth |
| 400 |
Securing SQL Server |
Cherry, Denny |
| 401 |
PCI Compliance |
Chuvakin, Anton |
| 402 |
Advanced Persistent Threat |
Cole, Eric |
| 403 |
The Hacker's Guide to OS X |
Ghassemlouei, Alijohn |
| 404 |
Hacking Web Apps |
Shema, Mike |
| 405 |
Violent Python |
O'Connor, TJ |
| 406 |
CISSP Study Guide |
Conrad, Eric |
| 407 |
Network Intrusion Analysis |
Fichera, Joe |
| 408 |
SQL Injection Attacks and Defense |
Clarke, Justin |
| 409 |
Keys to the Kingdom |
Ollam, Deviant |
| 410 |
Practical Lock Picking |
Ollam, Deviant |
| 411 |
Beyond CISSP |
Wheeler, Evan |
| 412 |
Customer Interviewing |
Alvarez, Cindy |
| 413 |
Cyber Security and IT Infrastructure Protection |
Vacca, John |
| 414 |
Going Parallel with C++ |
Hummel, Joe |
| 415 |
Insights in Computer Science 1 |
Doe, John |
| 416 |
Insights in Computer Science 2 |
Doe, John |
| 417 |
Managing Information Security |
Vacca, John |
| 418 |
Network and System Security |
Vacca, John |
| 419 |
Programming with CUDA and OpenACC |
Farber, Rob |
| 420 |
UI Inspection Methods |
TBD |
| 421 |
Computer and Information Security Handbook |
Vacca, John |
| 422 |
Learning Processing |
Shiffman, Daniel |
| 423 |
Writing for Interaction |
Newman Lior, Linda |
| 424 |
Data Modeling Essentials |
Simsion, Graeme |
| 425 |
UI is Communication |
McKay, Everett |
| 426 |
Measuring Data Quality for Ongoing Improvement |
Sebastian-Coleman, Laura |
| 427 |
Managing Data in Motion |
Reeve, April |
| 428 |
Social Data Analytics |
Rogers, Shawn |
| 429 |
Network Convergence |
Joseph, Vinod |
| 430 |
Web Services, Service-Oriented Architectures, and Cloud Computing |
Barry, Douglas K. |
| 431 |
Visual Usability |
Levinson, Deborah |
| 432 |
Application Administrators Handbook |
Bourne, Kelly |
| 433 |
Implementing Analytics |
Sheikh, Nauman |
| 434 |
Principles of Big Data |
Berman, Jules |
| 435 |
Combinatorial Topology and Distributed Computing |
Herlihy, Maurice |
| 436 |
Practical Web Analytics for User Experience |
Beasley, Michael |
| 437 |
Cloud Computing |
Marinescu, Dan |
| 438 |
Moderating One-on-One User Research |
Tedesco, Donna |
| 439 |
DIGITAL OUTCASTS |
Smith, Kel |
| 440 |
Hacking the Scene |
Cohen, Tyler |
| 441 |
Enterprise Data Services |
Sarkar, Pushpak |
| 442 |
Analyzing the Social Web |
Golbeck, Jennifer |
| 443 |
Total Information Risk Management |
Borek, Alexander |
| 444 |
Human-Computer Interaction |
MacKenzie, I. Scott |
| 445 |
FISMA Compliance Handbook |
Taylor, Laura |
| 446 |
A Practical Guide to Business Analytics |
Fitzgerald, Jaime |
| 447 |
Data Warehousing in the Age of Big Data |
Krishnan, Krish |
| 448 |
Heterogeneous Computing with OpenCL |
Gaster, Benedict |
| 449 |
The Basics of Cloud Computing |
Rountree, Derrick |
| 450 |
Brainstorming and Beyond |
Wilson, Chauncey |
| 451 |
Joe Celko’s Complete Guide to NoSQL |
Celko, Joe |
| 452 |
The Digital Crown |
Leibtag, Ahava |
| 453 |
High Performance Deformable Image Registration Algorithms for Manycore Processors |
Shackleford, James |
| 454 |
Penetration Testing with Backtrack 5 |
Broad, James |
| 455 |
Computation and Storage in the Cloud |
Yuan, Dong |
| 456 |
Software Engineering |
Schmidt, Richard |
| 457 |
Agile Software Architect |
Babar, Muhammad Ali |
| 458 |
Enterprise Application Administration |
Faircloth, Jeremy |
| 459 |
Introduction to Cyber-Warfare |
Shakarian, Paulo |
| 460 |
Investigating Internet Crimes |
Shipley, Todd |
| 461 |
Accelerating Matlab with GPU |
Suh, Jung |
| 462 |
Mobile User Experience Archetypes |
Mendoza, Adrian |
| 463 |
Assessing Vendors |
More, Josh |
| 464 |
User Interface Inspection Methods |
Wilson, Chauncey |
| 465 |
Credible Checklists and Quality Questionnaires |
Wilson, Chauncey |
| 466 |
Interview Techniques for UX Practitioners |
Wilson, Chauncey |
| 467 |
Practical Anonymity |
Loshin, Pete |
| 468 |
The Wireshark Field Guide |
Shimonski, Robert |
| 469 |
Intel Xeon Phi Coprocessor High Performance Programming |
Jeffers, Jim |
| 470 |
Thor's OS Xodus |
Mullen, Timothy "Thor" |
| 471 |
Business Continuity and Disaster Recovery Planning for IT Professionals |
Snedaker, Susan |
| 472 |
Analytical Approaches for Customer Centricity |
Loshin, David |
| 473 |
Using Information to Develop a Culture of Customer Centricity |
Loshin, David |
| 474 |
Mastering Cloud Computing |
Buyya, Rajkumar |
| 475 |
The Case for the Top Data Job |
Aiken, Peter |
| 476 |
Emerging Trends in ICT Security |
Akhgar, Babak |
| 477 |
Mastering Private Cloud with Windows Server 2012 |
Chou, Yung |
| 478 |
Simple Steps to Data Encryption: |
Loshin, Pete |
| 479 |
Measuring the User Experience |
Tullis, Thomas |
| 480 |
Visualization in Medicine |
Preim, Bernhard |
| 481 |
Understanding Augmented Reality |
Craig, Alan B. |
| 482 |
Malware Forensics Field Guide for Linux Systems |
Malin, Cameron |
| 483 |
When Botnets Attack |
Zachry, Josh |
| 484 |
Digital Forensics Processing and Procedures |
Watson, David |
| 485 |
Windows 2012 Server Network Security |
Rountree, Derrick |
| 486 |
IT Audit |
Tuuri, Dan |
| 487 |
Hacking .NET |
Simon, Robert |
| 488 |
Windows Server 2012 Security from End to Edge and Beyond |
Shinder, Thomas W |
| 489 |
Social Media Security |
Etue, David |
| 490 |
Professional Penetration Testing |
Wilhelm, Thomas |
| 491 |
Risk Management Framework |
Broad, James |
| 492 |
Computer Incident Response and Forensics Team Management |
Johnson, Leighton |
| 493 |
Applied Cyber Security and the Smart Grid |
Knapp, Eric |
| 494 |
Time Frequency Analysis |
Boualem Boashash |
| 495 |
Network Simulation Experiments Manual |
Emad Aboelela |
| 496 |
XML in Data Management: Understanding and Applying Them Together |
Peter Aiken, M. David Allen |
| 497 |
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types |
Tim Monroe |
| 498 |
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types |
Tim Monroe |
| 499 |
GMPLS: Architecture and Applications |
Adrian Farrel, Igor Bryskin |
| 500 |
Face Processing: Advanced Modeling and Methods |
Wenyi Zhao, Rama Chellappa |
| 501 |
Proceedings 2004 VLDB Conference: The 30th International Conference on Very Large Databases (VLDB) |
VLDB |
| 502 |
Network Processor Design: Issues and Practices, Volume 3 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
| 503 |
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices |
George Varghese |
| 504 |
Complete Maya Programming Volume II: An In-depth Guide to 3D Fundamentals, Geometry, and Modeling |
David Gould |
| 505 |
An Introduction to Programming with IDL |
Kenneth Bowman |
| 506 |
Smart Phone and Next Generation Mobile Computing |
Pei Zheng, Lionel Ni |
| 507 |
MEL Scripting for Maya Animators |
Mark R. Wilkins, Chris Kazmier |
| 508 |
Joe Celko's SQL Programming Style |
Joe Celko |
| 509 |
Data Model Patterns: A Metadata Map |
David C. Hay |
| 510 |
Moving Objects Databases |
Ralf Hartmut Güting, Markus Schneider |
| 511 |
Cost-Justifying Usability: An Update for the Internet Age |
Randolph G. Bias, Deborah J. Mayhew |
| 512 |
Practical Time-Frequency Analysis |
Rene Carmona, WenLiang Hwang, Bruno Torresani |
| 513 |
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization |
Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper |
| 514 |
C# 2.0: Practical Guide for Programmers |
Michel de Champlain, Brian G. Patrick |
| 515 |
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration |
Earl Cox |
| 516 |
Network Processor Design: Issues and Practices, Volume 2 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
| 517 |
Multiscale Wavelet Methods for Partial Differential Equations |
Wolfgang Dahmen, Andrew Kurdila, Peter Oswald |
| 518 |
Machine Vision: Theory, Algorithms, Practicalities |
E. R. Davies |
| 519 |
SQL: Practical Guide for Developers |
Michael J. Donahoo, Gregory D. Speegle |
| 520 |
Mac OSX Developer Guide |
Jesse Feiler |
| 521 |
Time-Frequency/Time-Scale Analysis |
Patrick Flandrin |
| 522 |
Visual Effects in A Digital World: A Comprehensive Glossary of over 7000 Visual Effects Terms |
Karen Goulekas |
| 523 |
Network Security: A Practical Approach |
Jan L. Harrington |
| 524 |
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design |
Karen Holtzblatt, Jessamyn Burns Wendell, Shelley Wood |
| 525 |
Joe Celko's SQL for Smarties: Advanced SQL Programming |
Joe Celko |
| 526 |
Commonsense Reasoning |
Erik T. Mueller |
| 527 |
Spine Technology Handbook |
Steven M. Kurtz, Avram Edidin |
| 528 |
Globus® Toolkit 4: Programming Java Services |
Borja Sotomayor, Lisa Childers |
| 529 |
Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G |
Luis M. Correia |
| 530 |
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control |
Giorgio Franceschetti, Sabatino Stornelli |
| 531 |
Programming with Quartz: 2D and PDF Graphics in Mac OS X |
David Gelphman, Bunny Laden |
| 532 |
Joe Celko's Analytics and OLAP in SQL |
Joe Celko |
| 533 |
Networks on Chips: Technology and Tools |
Giovanni De Micheli, Luca Benini, Luca Benini |
| 534 |
VLSI Test Principles and Architectures: Design for Testability |
Laung-Terng Wang, Cheng-Wen Wu, Xiaoqing Wen |
| 535 |
Designing SOCs with Configured Cores: Unleashing the Tensilica Xtensa and Diamond Cores |
Steve Leibson |
| 536 |
Multiprocessor Systems-on-Chips |
Ahmed Jerraya, Wayne Wolf |
| 537 |
Communication Networking: An Analytical Approach |
Anurag Kumar, D. Manjunath, Joy Kuri |
| 538 |
VHDL: Coding and Logic Synthesis with SYNOPSYS |
Weng Fook Lee |
| 539 |
Fuzzy Theory Systems |
Cornelius Leondes |
| 540 |
Knowledge-Based Systems |
Cornelius Leondes |
| 541 |
Expert Systems |
Cornelius Leondes |
| 542 |
Database and Data Communication Network Systems |
Cornelius Leondes |
| 543 |
Enterprise Knowledge Management: The Data Quality Approach |
David Loshin |
| 544 |
TCP/IP Sockets in C#: Practical Guide for Programmers |
David Makofske, Michael J. Donahoo, Kenneth L. Calvert |
| 545 |
ASIC and FPGA Verification: A Guide to Component Modeling |
Richard Munden |
| 546 |
Physically Based Rendering: From Theory to Implementation |
Matt Pharr, Greg Humphreys |
| 547 |
Routing, Flow, and Capacity Design in Communication and Computer Networks |
Michal Pióro, Deepankar Medhi |
| 548 |
The Persona Lifecycle: Keeping People in Mind Throughout Product Design |
John Pruitt, Tamara Adlin |
| 549 |
High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting |
Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec |
| 550 |
Nonlinear Computer Modeling of Chemical and Biochemical Data |
James Rusling / Thomas Kumosinski |
| 551 |
Introduction to Data Compression |
Sayood |
| 552 |
JSTL: Practical Guide for JSP Programmers |
Sue Spielman |
| 553 |
Multirate and Wavelet Signal Processing |
Bruce Suter |
| 554 |
Database Modeling and Design: Logical Design |
Toby J. Teorey, Sam S. Lightstone, Tom Nadeau |
| 555 |
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS |
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester |
| 556 |
Proceedings 2003 VLDB Conference: 29th International Conference on Very Large Databases (VLDB) |
VLDB |
| 557 |
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers |
David Wall |
| 558 |
Grid Computing |
Pawel Plaszczak, Richard Wellner, Jr. |
| 559 |
Java Cryptography Extensions: Practical Guide for Programmers |
Jason Weiss |
| 560 |
QuickTime for .NET and COM Developers |
John Cromie |
| 561 |
Signal and Image Representation in Combined Spaces |
Yehoshua Zeevi, Ronald Coifman |
| 562 |
Chaos and Fractals |
C.A. Pickover |
| 563 |
Neuromimetic Semantics |
Harry Howard |
| 564 |
SDL '99: The Next Millennium |
R. Dssouli/G.V. Bochmann/Y. Lahav |
| 565 |
Kohonen Maps |
Oja, E. / Kaski, S. |
| 566 |
Charging Communication Networks |
D.J. Songhurst |
| 567 |
A Computational Framework for Segmentation and Grouping |
Medioni, G. / Lee, Mi-Suen / Tang, Chi-Keung |
| 568 |
CAFE: An Industrial-Strength Algebraic Formal Method |
Futatsugi, K. / Nakagawa, A.T. / Tamai, T. |
| 569 |
Parallel Computational Fluid Dynamics 2001: Practice and Theory |
P. Wilders, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
| 570 |
Parallel Computational Fluid Dynamics 2000: Trends and Applications |
C.B. Jenssen, T. Kvamdal, H.I. Andersson, B. Pettersen, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
| 571 |
Parallel Computational Fluid Dynamics 2002: New Frontiers and Multi-Disciplinary Applications |
K. Matsuno, A. Ecer, P Fox, J. Periaux, N. Satofuka |
| 572 |
Handbook of Automated Reasoning |
Alan Robinson / Andrei Voronkov |
| 573 |
Handbook of Computer Aided Geometric Design |
G. Farin / J. Hoschek / M.-S. Kim |
| 574 |
Intelligent Systems for Information Processing |
B. Bouchon-Meunier / L. Foulloy / R.R. Yager |
| 575 |
Handbook of Temporal Reasoning in Artificial Intelligence |
Michael Fisher, Dov M. Gabbav, Lluis Vila |
| 576 |
Parallel Computational Fluid Dynamics 2003: Advanced Numerical Methods, Software and Applications |
Boris Chetverushkin, A. Ecer, Jacques Periaux, N. Satofuka |
| 577 |
Parallel Computing: Software Technology, Algorithms, Architectures & Applications |
Gerhard Joubert, Wolfgang Nagel, Frans Peters, Wolfgang Walter |
| 578 |
Fuzzy Logic and the Semantic Web |
Elie Sanchez |
| 579 |
Grid Computing: The New Frontier of High Performance Computing |
Lucio Grandinetti |
| 580 |
Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications |
Gabriel Winter, A. Ecer, Jacques Periaux, N. Satofuka, Pat Fox |
| 581 |
Reaction-Diffusion Computers |
Andrew Adamatzky/Benjamin De Lacy Costello/Tetsuya Asai |
| 582 |
Modern Information Processing |
Bernadette Bouchon-Meunier / Giulianella Coletti / Ronald Yager |
| 583 |
Handbook of Constraint Programming |
Francesca Rossi, Peter van Beek, Toby Walsh |
| 584 |
The Economics of Open Source Software Development |
Jürgen Bitzer / Philipp Schröder |
| 585 |
Recent Research Towards Advanced Man-Machine Interface Through Spoken Language |
H. Fujisaki |
| 586 |
Principles of Logic and Logic Programming |
G. Metakides, A. Nerode |
| 587 |
Symbiosis of Human and Artifact |
Yuichiro Anzai, Katsuhiko Ogawa, Hirohiko Mori |
| 588 |
Handbook of Human-Computer Interaction |
Helander, M.G. / Landauer, T.K. / Prabhu, P.V. |
| 589 |
Parallel Computational Fluid Dynamics 1993: New Trends and Advances |
Akin Ecer, J. Hauser, P. Leca, J. Periaux |
| 590 |
Algorithms and Parallel VLSI Architectures III |
M. Moonen / F. Catthoor |
| 591 |
SVD and Signal Processing III |
Marc Moonen, Bart De Moor |
| 592 |
High Performance Computing: Technology, Methods and Applications |
Dongarra, J.J. |
| 593 |
Problem Solving: Methods, Programming and Future Concepts |
O.V. German, D.V. Ofitserov |
| 594 |
Intelligent Robots and Systems |
Volker Graefe |
| 595 |
Time-Varying Image Processing and Moving Object Recognition, 4 |
V. Cappellini |
| 596 |
Parallel Computational Fluid Dynamics 1995: Implementations and Results Using Parallel Computers |
A. Ecer, J. Periaux, N. Satofuka, S. Taylor |
| 597 |
Parallel Computational Fluid Dynamics 1996: Algorithms and Results Using Advanced Computers |
P. Schiano, A. Ecer, J. Periaux, N. Satofuka |
| 598 |
Intelligent Environments |
Droege, P. |
| 599 |
Statistical Optimization for Geometric Computation: Theory and Practice |
K. Kanatani |
| 600 |
Parallel Processing for Artificial Intelligence 3 |
J. Geller, H. Kitano, C.B. Suttner |
| 601 |
Proceedings IWISP '96 |
B.G. Mertzios, P. Liatsis |
| 602 |
SDL '97: Time for Testing |
A. Cavalli/A. Sarma |
| 603 |
Handbook of Process Algebra |
J.A. Bergstra / A. Ponse / S.A. Smolka |
| 604 |
Parallel Computational Fluid Dynamics 1997: Recent Developments and Advances Using Parallel Computers |
D. Emerson, A. Ecer, P. Fox, J. Periaux, N. Satofuka |
| 605 |
Parallel Computational Fluid Dynamics 1998: Development and Applications of Parallel Technology |
C.A. Lin, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
| 606 |
Parallel Computational Fluid Dynamics 1999: Towards Teraflops, Optimization and Novel Formulations |
D. Keyes, A. Ecer, J. Periaux, N. Satofuka, P. Fox |
| 607 |
Parallel Computing: Fundamentals, Applications and New Directions |
D'Hollander, E.H. |
| 608 |
Topological Algorithms for Digital Image Processing |
T. Yung Kong, Azriel Rosenfeld |
| 609 |
Sewers: Replacement and New Construction |
Geoffrey F Read |
| 610 |
Newnes Data Communications Pocket Book |
Steve Winder, Mike Tooley |
| 611 |
Newnes Radio and RF Engineering Pocket Book |
Steve Winder, Joseph Carr |
| 612 |
Applying UML: Advanced Applications |
Rob Pooley, Pauline Wilcox |
| 613 |
Newnes PC Troubleshooting Pocket Book |
Howard Anderson, Mike Tooley |
| 614 |
Software Design Methodology: From Principles to Architectural Styles |
Hong Zhu |
| 615 |
Introduction to Web Matrix: ASP.NET Development for Beginners |
Colin Hardy, Simon Stobart |
| 616 |
Object-Oriented Design with UML and Java |
Kenneth Barclay, John Savage |
| 617 |
A Student Guide to Object-Oriented Development |
Carol Britton, Jill Doake |
| 618 |
Student's Essential Guide to .NET |
Tony Grimer |
| 619 |
Value Creation from E-Business Models |
Wendy Currie |
| 620 |
Fundamental Data Compression |
Ida Mengyi Pu |
| 621 |
Strategies for Growth in SMEs: The Role of Information and Information Sytems |
Margi Levy, Philip Powell |
| 622 |
Understanding Mobile Human-Computer Interaction |
Steve Love |
| 623 |
Real-Time Systems Development |
Rob Williams |
| 624 |
Advanced Systems Design with Java, UML and MDA |
Kevin Lano |
| 625 |
Ultra Wideband Systems: Technologies and Applications |
Roberto Aiello, Ph.D., Anuj Batra, Ph.D. |
| 626 |
Digital Signal Processing System-Level Design Using LabVIEW |
Nasser Kehtarnavaz, Namjin Kim |
| 627 |
High-Technology Crime Investigator’s Handbook |
Gerald L. Kovacich, Andy Jones |
| 628 |
Modeling and Verification Using UML Statecharts: A Working Guide to Reactive System Design, Runtime Monitoring and Execution-based Model Checking |
Doron Drusinsky |
| 629 |
Embedded Software: The Works |
Colin Walls |
| 630 |
Voice Over IPv6: Architectures for Next Generation VoIP Networks |
Daniel Minoli |
| 631 |
OpenVMS Alpha Internals and Data Structures: Memory Management |
Ruth Goldenberg |
| 632 |
High Performance Data Network Design: Design Techniques and Tools |
Tony Kenyon |
| 633 |
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management |
Barry de Ville |
| 634 |
OpenVMS System Management Guide |
Lawrence Baldwin, Steve Hoffman, David Miller |
| 635 |
Networking Explained |
Michael Gallo, William M. Hancock, PhD, CISSP, CI |
| 636 |
Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle |
Charles Breakfield, Roxanne Burkey |
| 637 |
TruCluster Server Handbook |
Scott Fafrak, Jim Lola, Dennis O'Brien, Gregory Yates, Brad Nichols |
| 638 |
Computer Systems Performance Evaluation and Prediction |
Paul Fortier, Howard Michel |
| 639 |
CRM: Redefining Customer Relationship Management |
Jeffrey Peel |
| 640 |
OpenVMS with Apache, WASD, and OSU: The Nonstop Webserver |
Alan Winston |
| 641 |
Understanding WMI Scripting: Exploiting Microsoft's Windows Management Instrumentation in Mission-Critical Computing Infrastructures |
Alain Lissoir |
| 642 |
Linux and OpenVMS Interoperability: Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems |
John Robert Wisniewski |
| 643 |
Data Networks: Routing, Security, and Performance Optimization |
Tony Kenyon |
| 644 |
Linux and the Unix Philosophy |
Mike Gancarz |
| 645 |
Tru64 UNIX Troubleshooting: Diagnosing and Correcting System Problems |
Martin Moore, Steven Hancock |
| 646 |
UNIX for OpenVMS Users |
Philip Bourne, Richard Holstein, Joseph McMullen |
| 647 |
Call Center Operation: Design, Operation, and Maintenance |
Duane Sharp |
| 648 |
Getting Started with OpenVMS: A Guide for New Users |
Michael D Duffy |
| 649 |
Corporate Portals Empowered with XML and Web Services |
Anura Guruge |
| 650 |
Getting Started with OpenVMS System Management |
David Miller |
| 651 |
Web Services: Theory and Practice |
Anura Guruge |
| 652 |
Windows Server 2003 Security Infrastructures: Core Security Features |
Jan De Clercq |
| 653 |
Microsoft Outlook Programming: Jumpstart for Administrators, Developers, and Power Users |
Sue Mosher |
| 654 |
RAPID Value Management for the Business Cost of Ownership: Readiness, Architecture, Process, Integration, Deployment |
Andrew Wigodsky |
| 655 |
Socially Responsible IT Management |
Michael Erbschloe |
| 656 |
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers |
Jerry Cochran |
| 657 |
Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices |
William Wheeler |
| 658 |
Firewalls: Jumpstart for Network and Systems Administrators |
John R. Vacca, Scott Ellis |
| 659 |
Internet Security: A Jumpstart for Systems Administrators and IT Managers |
Tim Speed, Juanita Ellis |
| 660 |
Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems |
Alain Lissoir |
| 661 |
Microsoft SharePoint Technologies: Planning, Design and Implementation |
Kevin Laahs, Emer McKenna, Veli-Matti Vanamo |
| 662 |
Monitoring and Managing Microsoft Exchange Server 2003 |
Mike Daugherty |
| 663 |
Cybersecurity Operations Handbook |
John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CI |
| 664 |
Debugging by Thinking: A Multidisciplinary Approach |
Robert Charles Metzger |
| 665 |
Resilient Storage Networks: Designing Flexible Scalable Data Infrastructures |
Greg Schulz |
| 666 |
Implementing Homeland Security for Enterprise IT |
Michael Erbschloe |
| 667 |
Managing Software Deliverables: A Software Development Management Methodology |
John Rittinghouse, PhD, CISM |
| 668 |
HP NonStop Server Security: A Practical Handbook |
XYPRO Technology Corp |
| 669 |
Network programming in .NET: C# & Visual Basic .NET |
Fiach Reid |
| 670 |
Microsoft® Exchange Server 2003 Deployment and Migration |
Kieran McCorry |
| 671 |
Wireless Operational Security |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
| 672 |
IPv6 Network Programming |
Jun-ichiro itojun Hagino |
| 673 |
Open Source Software: Implementation and Management |
Paul Kavanagh |
| 674 |
Oracle 10g RAC Grid, Services & Clustering |
Murali Vallath |
| 675 |
Oracle 10g Data Warehousing |
Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith |
| 676 |
Oracle SQL: Jumpstart with Examples |
Gavin JT Powell, Carol McCullough-Dieter |
| 677 |
Physical Security for IT |
Michael Erbschloe |
| 678 |
Deploying LINUX on the Desktop |
Edward Haletky |
| 679 |
Oracle Database Programming using Java and Web Services |
Kuassi Mensah |
| 680 |
Tony Redmond's Microsoft Exchange Server 2003: with SP1 |
Tony Redmond |
| 681 |
Voice over Internet Protocol (VoIP) Security |
James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM |
| 682 |
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions |
René J. Chevance |
| 683 |
Implementing Database Security and Auditing |
Ron Ben Natan |
| 684 |
Oracle Data Warehouse Tuning for 10g |
Gavin JT Powell |
| 685 |
Managing Microsoft's Remote Installation Services |
Soren Rasmussen, Michael Iversen |
| 686 |
IM Instant Messaging Security |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
| 687 |
Business Continuity and Disaster Recovery for InfoSec Managers |
John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP |
| 688 |
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL |
XYPRO Technology Corp |
| 689 |
Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 |
Kieran McCorry |
| 690 |
Understanding Virtual Reality: Interface, Application, and Design |
William R. Sherman, Alan Craig |
| 691 |
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling |
Ron Goldman |
| 692 |
Subdivision Methods for Geometric Design: A Constructive Approac |
Joe Warren, Henrik Weimer |
| 693 |
SQL: 1999 - Understanding Relational Language Components |
Jim Melton, Alan R. Simon |
| 694 |
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery |
Gerhard Weikum, Gottfried Vossen |
| 695 |
Telecommunications Law in the Internet Age |
Sharon K. Black |
| 696 |
Computer Animation: Algorithms and Techniques |
Richard Parent |
| 697 |
Spatial Databases: With Application to GIS |
Philippe Rigaux, Michel Scholl, Agnès Voisard |
| 698 |
Geometric Tools for Computer Graphics |
Philip Schneider, David H. Eberly |
| 699 |
Swarm Intelligence |
Russell C. Eberhart, Yuhui Shi, James Kennedy |
| 700 |
Internet QoS: Architectures and Mechanisms for Quality of Service |
Zheng Wang |
| 701 |
Skew-Tolerant Circuit Design |
David Harris |
| 702 |
Illustrating Evolutionary Computation with Mathematica |
Christian Jacob |
| 703 |
Object-Oriented Reengineering Patterns |
Serge Demeyer, Stéphane Ducasse, Oscar Nierstrasz |
| 704 |
Component Database Systems |
Klaus R. Dittrich, Andreas Geppert |
| 705 |
Persuasive Technology: Using Computers to Change What We Think and Do |
B.J. Fogg |
| 706 |
Distributed Systems Architecture: A Middleware Approach |
Arno Puder, Kay Römer, Frank Pilhofer |
| 707 |
Readings in Multimedia Computing and Networking |
Kevin Jeffay, Hong Jiang Zhang |
| 708 |
Business Modeling and Data Mining |
Dorian Pyle |
| 709 |
Optical Networks: A Practical Perspective |
Rajiv Ramaswami, Kumar Sivarajan |
| 710 |
Usability for the Web: Designing Web Sites that Work |
Tom Brinck, Darren Gergle, Scott D. Wood |
| 711 |
Advanced Graphics Programming Using OpenGL |
Tom McReynolds, David Blythe |
| 712 |
An Introduction to NURBS: With Historical Perspective |
David F. Rogers |
| 713 |
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design |
Terry Halpin |
| 714 |
Creative Evolutionary Systems |
David W. Corne, Peter J. Bentley |
| 715 |
The Designer's Guide to VHDL |
Peter J. Ashenden |
| 716 |
Advanced SQL:1999: Understanding Object-Relational and Other Advanced Features |
Jim Melton |
| 717 |
Data Warehousing: Using the Wal-Mart Model |
Paul Westerman |
| 718 |
TCP/IP Sockets in Java: Practical Guide for Programmers |
Kenneth L. Calvert, Michael J. Donahoo |
| 719 |
Object-Oriented Construction Handbook: Developing Application-Oriented Software with the Tools & Materials Approach |
Heinz Züllighoven |
| 720 |
Your Wish is My Command: Programming By Example |
Henry Lieberman |
| 721 |
Practical IDL Programming |
Liam E. Gumley |
| 722 |
Higher-Order Perl: Transforming Programs with Programs |
Mark Jason Dominus |
| 723 |
Readings in Hardware/Software Co-Design |
Giovanni De Micheli, Rolf Ernst, Wayne Wolf |
| 724 |
Querying XML: XQuery, XPath, and SQL/XML in context |
Jim Melton, Stephen Buxton |
| 725 |
Usability Engineering: Scenario-Based Development of Human-Computer Interaction |
Mary Beth Rosson, John M. Carroll |
| 726 |
Data Warehousing And Business Intelligence For e-Commerce |
Alan R. Simon, Steven L. Shaffer |
| 727 |
Digital Watermarking |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller |
| 728 |
Foundations of Genetic Algorithms 2001 (FOGA 6) |
William Spears, Worthy N. Martin, Worth Martin |
| 729 |
JDBC: Practical Guide for Java Programmers |
Gregory D. Speegle |
| 730 |
Curves and Surfaces for CAGD: A Practical Guide |
Gerald Farin |
| 731 |
System Architecture with XML |
Berthold Daum, Udo Merten |
| 732 |
Interactive QuickTime: Authoring Wired Media |
Matthew R. Peterson |
| 733 |
The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling |
Peter J. Ashenden, Gregory D. Peterson, Darrell A. Teegarden |
| 734 |
MPLS Network Management: MIBs, Tools, and Techniques |
Thomas D. Nadeau |
| 735 |
Web Application Design Handbook: Best Practices for Web-Based Software |
Susan Fowler, Victor Stanwick |
| 736 |
Database Tuning: Principles, Experiments, and Troubleshooting Techniques |
Dennis Shasha, Philippe Bonnet |
| 737 |
Mining the Web: Discovering Knowledge from Hypertext Data |
Soumen Chakrabarti |
| 738 |
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML |
R. J. Wieringa |
| 739 |
Applying Knowledge Management: Techniques for Building Corporate Memories |
Ian Watson |
| 740 |
Embedded Computing: A VLIW Approach to Architecture, Compilers and Tools |
Joseph A. Fisher, Paolo Faraboschi, Cliff Young |
| 741 |
Voice Interaction Design:Crafting the New Conversational Speech Systems |
Randy Allen Harris |
| 742 |
Disappearing Cryptography: Information Hiding: Steganography & Watermarking |
Peter Wayner |
| 743 |
Developing IP-Based Services: Solutions for Service Providers and Vendors |
Monique Morrow, Kateel Vijayananda |
| 744 |
TCP/IP Clearly Explained |
Pete Loshin |
| 745 |
Blondie24: Playing at the Edge of AI |
David B. Fogel |
| 746 |
Non-Photorealistic Computer Graphics: Modeling, Rendering, and Animation |
Thomas Strothotte, Stefan Schlechtweg |
| 747 |
How to Build a Digital Library |
Ian H. Witten, David Bainbridge |
| 748 |
Digital Video and HDTV: Algorithms and Interfaces |
Charles Poynton |
| 749 |
Evolutionary Computation in Bioinformatics |
Gary B. Fogel, David W. Corne |
| 750 |
Digital Arithmetic |
Miloš D. Ercegovac, Tomás Lang |
| 751 |
Tcl/Tk: A Developer's Guide |
Clif Flynt |
| 752 |
HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science |
John M. Carroll |
| 753 |
IPv6: Theory, Protocol, and Practice |
Pete Loshin |
| 754 |
Modeling Business Objects with XML Schema |
Berthold Daum |
| 755 |
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit |
Peter Braun, Wilhelm R. Rossak |
| 756 |
Information Visualization: Perception for Design |
Colin Ware |
| 757 |
Relational Database Design Clearly Explained |
Jan L. Harrington |
| 758 |
From COBOL to OOP |
Markus Knasmüller |
| 759 |
TCP/IP Sockets in C: Practical Guide for Programmers |
Michael J. Donahoo, Kenneth L. Calvert |
| 760 |
Modern Cable Television Technology |
Walter Ciciora, James Farmer, David Large, Michael Adams |
| 761 |
Bioinformatics: Managing Scientific Data |
Zoé Lacroix, Terence Critchlow |
| 762 |
Maintaining and Evolving Successful Commercial Web Sites: Managing Change, Content, Customer Relationships, and Site Measurement |
Ashley Friedlein |
| 763 |
Interaction Design for Complex Problem Solving: Developing Useful and Usable Software |
Barbara Mirel |
| 764 |
Content Networking: Architecture, Protocols, and Practice |
Markus Hofmann, Leland R. Beaumont |
| 765 |
Complete Maya Programming: An Extensive Guide to MEL and C++ API |
David Gould |
| 766 |
JSP: Practical Guide for Programmers |
Robert Brunner |
| 767 |
Level of Detail for 3D Graphics |
David Luebke, Martin Reddy, Jonathan D. Cohen, Amitabh Varshney, Benjamin Watson, Robert Huebner |
| 768 |
Web Bloopers: 60 Common Web Design Mistakes, and How to Avoid Them |
Jeff Johnson |
| 769 |
Designing Data-Intensive Web Applications |
Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera |
| 770 |
Multicast Sockets: Practical Guide for Programmers |
David Makofske, Kevin Almeroth |
| 771 |
Texturing and Modeling: A Procedural Approach |
David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, Steven Worley |
| 772 |
Interconnection Networks |
Jose Duato, Sudhakar Yalamanchili, Lionel Ni |
| 773 |
Real-Time Shader Programming |
Ron Fosner |
| 774 |
Temporal Data & the Relational Model |
C.J. Date, Hugh Darwen, Nikos Lorentzos |
| 775 |
Automated Planning: Theory & Practice |
Malik Ghallab, Dana Nau, Paolo Traverso |
| 776 |
Policy-Based Network Management: Solutions for the Next Generation |
John Strassner |
| 777 |
Jim Blinn's Corner: Notation, Notation, Notation |
Jim Blinn |
| 778 |
Digital Geometry: Geometric Methods for Digital Picture Analysis |
Reinhard Klette, Azriel Rosenfeld |
| 779 |
The Struts Framework: Practical Guide for Java Programmers |
Sue Spielman |
| 780 |
Why Programs Fail: A Guide to Systematic Debugging |
Andreas Zeller |
| 781 |
Unit Testing in Java: How Tests Drive the Code |
Johannes Link |
| 782 |
VLDB '02: Proceedings of the 28th International Conference on Very Large Databases |
VLDB |
| 783 |
Paper Prototyping: The Fast and Easy Way to Design and Refine User Interfaces |
Carolyn Snyder |
| 784 |
Stochastic Local Search: Foundations & Applications |
Holger H. Hoos, Thomas Stützle |
| 785 |
ARM System Developer's Guide: Designing and Optimizing System Software |
Andrew Sloss, Dominic Symes, Chris Wright |
| 786 |
Network Processor Design: Issues and Practices, Volume 1 |
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk |
| 787 |
SQL Clearly Explained |
Jan L. Harrington |
| 788 |
Innovation Happens Elsewhere: Open Source as Business Strategy |
Ron Goldman, Richard P. Gabriel |
| 789 |
Constraint Processing |
Rina Dechter |
| 790 |
Data Quality: The Accuracy Dimension |
Jack E. Olson |
| 791 |
Engineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions |
James Bean |
| 792 |
Java Web Services Architecture |
James McGovern, Sameer Tyagi, Michael Stevens, Sunil Mathew |
| 793 |
Web Services and Service-Oriented Architectures |
Douglas K. Barry |
| 794 |
XML for Data Architects: Designing for Reuse and Integration |
James Bean |
| 795 |
Java: Practical Guide for Programmers |
Michael Sikora |
| 796 |
Virtual Machines: Versatile Platforms for Systems and Processes |
Jim Smith, Ravi Nair |
| 797 |
The Internet and Its Protocols: A Comparative Approach |
Adrian Farrel |
| 798 |
Wireless Sensor Networks: An Information Processing Approach |
Feng Zhao, Leonidas Guibas |
| 799 |
The Craft of Information Visualization: Readings and Reflections |
Benjamin B. Bederson, Ben Shneiderman |
| 800 |
Business Intelligence |
David Loshin |
| 801 |
Semantics in Business Systems |
Dave McComb |
| 802 |
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering |
Malcolm Chisholm |
| 803 |
Database Modeling with Microsoft® Visio for Enterprise Architects |
Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean |
| 804 |
Joe Celko's Trees and Hierarchies in SQL for Smarties |
Joe Celko |
| 805 |
Observing the User Experience: A Practitioner's Guide to User Research |
Mike Kuniavsky |
| 806 |
Understanding Digital Libraries |
Michael Lesk |
| 807 |
Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation |
Axel Jantsch |
| 808 |
Location-Based Services |
Jochen Schiller, Agnès Voisard |
| 809 |
Knowledge Representation and Reasoning |
Ronald Brachman, Hector Levesque |
| 810 |
The Grid 2: Blueprint for a New Computing Infrastructure |
Ian Foster, Carl Kesselman |
| 811 |
Bluetooth Application Programming with the Java APIs |
C Bala Kumar, Paul Kline, Tim Thompson |
| 812 |
Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques |
Catherine Courage, Kathy Baxter |
| 813 |
The Mobile Connection: The Cell Phone's Impact on Society |
Rich Ling |
| 814 |
Cisco PIX Firewalls |
Umer Khan |
| 815 |
Sockets, Shellcode, Porting, & Coding |
James Foster |
| 816 |
Stealing the Network |
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch |
| 817 |
InfoSec Career Hacking |
Chris Hurley, Johnny Long, Aaron Bayles, Ed Brindley |
| 818 |
Securing IM and P2P Applications for the Enterprise |
Marcus Sachs, Paul Piccard |
| 819 |
Host Integrity Monitoring Using Osiris and Samhain |
Brian Wotring |
| 820 |
Virtualization with VMware ESX Server |
Al Muller, Seburn Wilson |
| 821 |
Nessus, Snort, & Ethereal Power Tools |
Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus |
| 822 |
Penetration Tester's Open Source Toolkit |
Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore |
| 823 |
How to Cheat at Managing Windows Server Update Services |
B. Barber |
| 824 |
Phishing Exposed |
Lance James |
| 825 |
Configuring Check Point NGX VPN-1/Firewall-1 |
Barry Stiefel, Simon Desmeules |
| 826 |
Skype Me! |
Markus Daehne |
| 827 |
Network Security Evaluation |
Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham |
| 828 |
Sarbanes-Oxley Compliance Using COBIT and Open Source Tools |
Christian Lahti, Roderick Peterson |
| 829 |
How to Cheat at IT Project Management |
Susan Snedaker |
| 830 |
OS X for Hackers at Heart |
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers |
| 831 |
Perfect Password |
Mark Burnett |
| 832 |
Security Log Management |
Jacob Babbin |
| 833 |
RFID Security |
Frank Thornton, Chris Lanthem |
| 834 |
Insider Threat |
Eric Cole, Sandra Ring |
| 835 |
How to Cheat at Configuring ISA Server 2004 |
Thomas Shinder, Debra Littlejohn Shinder |
| 836 |
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure |
B. Barber, Melissa Craft, Michael Cross, Hal Kurz |
| 837 |
Practical VoIP Security |
Thomas Porter |
| 838 |
Video Conferencing over IP |
Michael Gough |
| 839 |
Combating Spyware in the Enterprise |
Paul Piccard |
| 840 |
Syngress IT Security Project Management Handbook |
Susan Snedaker |
| 841 |
Building a VoIP Network with Nortel’s Multimedia Communication Server 5100 |
Larry Chaffin |
| 842 |
Winternals |
Dave Kleiman, Laura Hunter |
| 843 |
How to Cheat at Securing a Wireless Network |
Chris Hurley, Lee Barken |
| 844 |
Firewall Policies and VPN Configurations |
Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, jennifer Davis |
| 845 |
How to Cheat at Managing Information Security |
Mark Osborne |
| 846 |
BigNum Math |
Tom St Denis |
| 847 |
How to Cheat at Designing Security for a Windows Server 2003 Network |
Chris Ruston, Chris Peiris |
| 848 |
Configuring SonicWALL Firewalls |
Chris Lathem |
| 849 |
How to Cheat at Managing Microsoft Operations Manager 2005 |
Tony Piltzecker |
| 850 |
Writing Security Tools and Exploits |
James Foster |
| 851 |
The Enterprise Architecture IT Project: The Urbanisation Paradigm |
Christophe Longépé |
| 852 |
IP Addressing & Subnetting INC IPV6: Including IPv6 |
J D Wegner, Robert Rockell, Syngress Media |
| 853 |
DBAs Guide to Databases Under Linux |
David Egan, Paul Zikopoulos, Chris Rogers |
| 854 |
Managing Windows 2000 Network Services |
Dr. Thomas W. Shinder, Debra Littlejohn Shinder, Thomas W. Shinder, Syngress |
| 855 |
Windows 2000 Configuration Wizards |
Syngress Media, Brian M. Collins, Paul Shields |
| 856 |
Windows 2000 Server System Administration Handbook |
Paul Shields, Ralph W Crump, Martin Weiss |
| 857 |
Troubleshooting Windows 2000 TCP/IP |
Syngress Media Inc, Debra Littlejohn Shinder, Thomas W Shinder, Syngress |
| 858 |
Building Cisco Remote Access Networks |
Wayne Lawson |
| 859 |
Configuring Cisco AVVID |
Syngress Publishing, Erik Rozell, Sandy C. Kronenberg, Wayne Lawson |
| 860 |
Mission Critical Windows 2000 Server Administration |
Robin Walshaw, Syngress Publishing |
| 861 |
Configuring Citrix MetaFrame for Windows 2000 Terminal Services |
Melissa Craft, Allen V. Keele, et. al |
| 862 |
Designing SQL Server 2000 Databases |
Travis Laird, Robert Patton, and Jennifer Ogle |
| 863 |
E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks |
Syngress Media Inc, Brian Bagnall, Syngress Publishing, James Stanger |
| 864 |
Configuring Exchange Server 2000 |
James Stagner |
| 865 |
ASP Configuration Handbook |
John Gunson, Dale Booth, Sean Thurston |
| 866 |
Hack Proofing Your E-Commerce Site - The only way to stop a hacker is to think like one |
Ryan Russell |
| 867 |
Configuring ISA Server 2000 |
Thomas W. Shinder, Inc. Syngress Media |
| 868 |
Hack Proofing Your Web Applications - The Only Way to stop a hacker is to think like one |
Ryan Russell, Inc. Syngress Media, Syngress Media |
| 869 |
Palm OS Web Application Developer's Guide - Including PQA and Web Clipping |
Ben Coombe, R. Eric Lyons, David C. Matthews, Rory Lysaght |
| 870 |
Hack Proofing Linux |
James Stanger, Patrick T. Lane |
| 871 |
BizTalk Server 2000 Developer's Guide |
Scott Roberts, Milton Todd, Chris Farmer, Robert Shimonski |
| 872 |
Bluetooth Application Developer's Guide |
Jennifer Bray, Brian Senese, Gordon McNutt, Bill Munday |
| 873 |
Hack Proofing Sun Solaris 8 |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F Williams Lynch |
| 874 |
Designing A Wireless Network |
Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely |
| 875 |
Webmaster's Guide to the Wireless Internet |
Ryan Fife, Wei Meng Lee, Dan A. Olsen |
| 876 |
XML .NET Developer's Guide |
Henk-Evert Sonder, Jonothon Ortiz, Adam Sills |
| 877 |
VB.net Developer's Guide |
Cameron Wakefield, Henk-Evert Sonder, Wei Meng Lee |
| 878 |
C#.Net Developer's Guide |
Saurabh Nandu, dotthatcom.com, Greg Hack, Adrian Turtschi |
| 879 |
ASP .NET Web Developer's Guide |
Jonothon Ortiz, Mesbah Ahmed, Chris Garrett, Jeremy Faircloth, Wei Meng Lee, Adam Sills, Chris Payne |
| 880 |
Configuring Windows 2000 without Active Directory |
Carol Bailey, Tom Shinder, Dr Thomas W Shinder, Thomas Shinder MD |
| 881 |
.NET Mobile Web Developers Guide |
Steve Milroy, Ken Cox, DotThatCom.com, Amit Kalani |
| 882 |
Building A Cisco Wireless LAN |
Ron Fuller, Tim Blankenship |
| 883 |
Hackproofing Your Wireless Network |
Tony Bautts, Erif Ouellet, Eric Ouellet, Neal O'Farrell |
| 884 |
Windows 2000 Active Directory 2E |
Melissa Craft |
| 885 |
Ruby Developers Guide |
Michael Neumann, Robert Feldt, Lyle Johnson |
| 886 |
Building Robots With Lego Mindstorms |
Mario Ferrari, Giulio Ferrari, Ralph Hempel |
| 887 |
Hack Proofing Your Network |
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh |
| 888 |
Hack Proofing ColdFusion |
Steve Casco, Rob Rusher, Greg Meyer, Sarge |
| 889 |
Configuring and Troubleshooting Windows XP Professional |
Martin Grasdal, Brian Barber, Chad Todd, Norris L. Johnson Jr. |
| 890 |
Developing .Net Web Services With Xml |
David Jorgensen |
| 891 |
Cisco AVVID and IP Telephony Design & Implementation |
Robert Padjen, Larry Keefer, Sean Thurston, Jeff Bankston |
| 892 |
Configuring IPv6 For Cisco IOS |
Edgar, Jr. Parenti, Eric Knipp, Brian Browne |
| 893 |
Developing Web Services with Java APIs for XML (JAX Pack) |
Robert Hablutzel |
| 894 |
Hacking a Terror Network: The Silent Threat of Covert Channels |
Russ Rogers, Matthew Devost |
| 895 |
Security Sage's Guide to Hardening the Network Infrastructure |
Steven Andres, Brian Kenyon, Erik Pack Birkholz |
| 896 |
Wardriving: Drive, Detect, Defend: A Guide to Wireless Security |
Chris Hurley |
| 897 |
Snort 2.1 Intrusion Detection |
Brian Caswell, Jay Beale |
| 898 |
Stealing the Network: How to Own a Continent |
Ryan Russell, Joe Grand, Tom Craig |
| 899 |
Nessus Network Auditing: Jay Beale Open Source Security Series |
Jay Beale, Haroon Meer, Charl van der Walt, Renaud Deraison |
| 900 |
Zero-Day Exploit:: Countdown to Darkness |
Rob Shein, Marcus Sachs |
| 901 |
Cyber Adversary Characterization: Auditing the Hacker Mind |
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz |
| 902 |
The Best Damn Windows Server 2003 Book Period |
Debra Littlejohn Shinder, Thomas Shinder |
| 903 |
Dr. Tom Shinder's Configuring ISA Server 2004 |
Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal |
| 904 |
Aggressive Network Self-Defense |
Neil Wyler |
| 905 |
Richard Thieme's Islands in the Clickstream |
Richard Thieme |
| 906 |
CYA Securing Exchange Server 2003 |
Mark Fugatt, Henrik Walther, Pattrick Santry |
| 907 |
CYA Securing IIS 6.0 |
Chris Peiris, Bernard Cheah, Ken Schaefer |
| 908 |
Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari, & Sega |
Joe Grand, Albert Yarusso |
| 909 |
Google Hacking for Penetration Testers |
Johnny Long |
| 910 |
Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! |
Lee Barken |
| 911 |
Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover |
David Allen |
| 912 |
Apple I Replica Creation: Back to the Garage |
Tom Owad |
| 913 |
Cyber Spying |
Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole |
| 914 |
Network+ Study Guide & Practice Exams |
Robert Shimonski, Laura Hunter, Norris Johnson |
| 915 |
Hack Proofing Windows 2000 Server |
Chad Todd, Norris L., Jr. Johnson |
| 916 |
Hack Proofing XML |
Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis Jr Franklin |
| 917 |
Hack Proofing Your Identity |
Teri Bidwell |
| 918 |
Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1 |
Melissa Craft |
| 919 |
C# For Java Programmers |
Harold Cabrera, Jeremy Faircloth, Stephen Goldberg |
| 920 |
Managing Cisco Network Security |
Sean Thurston |
| 921 |
Sniffer Pro Network Optimization and Troubleshooting Handbook |
Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko |
| 922 |
Cisco Security Specialists Guide to PIX Firewall |
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver |
| 923 |
Configuring Cisco Voice Over IP |
Jason Sinclair, Paul Fong, Scott M. Harris, Martin Walshaw |
| 924 |
Scene of the Cybercrime |
Debra Littlejohn Shinder, Ed Tittel |
| 925 |
Dr Tom Shinder's ISA Server and Beyond |
Thomas W. Shinder, Martin Grasdal, Debra Littlejohn Shinder |
| 926 |
Special Ops |
Erik Pace Birkholz, Stuart McClure |
| 927 |
Nokia Network Security Solutions Handbook |
Doug Maxwell |
| 928 |
Snort Intrusion Detection 2.0 |
Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth |
| 929 |
SSCP Study Guide and DVD Training System |
Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth |
| 930 |
Configuring Symantec AntiVirus Enterprise Edition |
Laura E Hunter, Athar A Khan, James Stanger, Jay Cee Taylor |
| 931 |
MCSE/MCSA (Exam 70-214) Study Guide |
Will Schmied, Thomas W. Shinder |
| 932 |
Stealing The Network: How to Own the Box |
Ryan Russell, Ido Dubrawsky, FX, Joe Grand |
| 933 |
Building DMZs For Enterprise Networks |
Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder |
| 934 |
The Best Damn Firewall Book Period |
Cherie Amon, Thomas W. Shinder, Anne Carasik-Henmi |
| 935 |
The Best Damn Cisco Internetworking Book Period |
Charles Riley |
| 936 |
MCSA/MCSE (Exam 70-291) Study Guide |
Dr Thomas W. Shinder, Thomas W. Shinder, Debra Littlejohn Shinder |
| 937 |
MCSE (Exam 70-293) Study Guide |
Dr Thomas W Shinder, Thomas W Shinder, Debra Littlejohn Shinder, Martin Grasdal |
| 938 |
MCSE (Exam 70-294) Study Guide |
Michael Cross, Todd Walls, Jeffery A Martin, Martin Grasdal |
| 939 |
CheckPoint NG VPN 1/Firewall 1 |
Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble |
| 940 |
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks |
Rick Gallaher |
| 941 |
Configuring NetScreen Firewalls |
Cameron, Rob |
| 942 |
Intrusion Prevention and Active Response: Deploying Network and Host IPS |
Michael Rash, Angela Orebaugh, Graham Clark |
| 943 |
Deploying Citrix MetaFrame Presentation Server 3.0 |
Melissa Craft, Connie S. Wilson, Chris Broomes |
| 944 |
Microsoft Log Parser Toolkit |
Gabriele Giuseppini, Mark Burnett |
| 945 |
MCSE (Exam 70-297) Study Guide |
Neil Ruston, Laura E. Hunter |
| 946 |
MCSE (Exam 70-298) Study Guide |
Neil Ruston |
| 947 |
MCSA/MCSE (Exam 70-292) Study Guide |
Will Schmied, Robert J. Shimonski |
| 948 |
MCSE (Exam 70-296) Study Guide |
Anthony Piltzecker, Laura E Hunter, Melissa Craft, Brian Barber |
| 949 |
MCSA/MCSE (Exam 70-290) Study Guide |
Thomas W. Shinder, Debra Littlejohn Shinder, Syngress Publishing, Chris Peiris |
| 950 |
Hacking the Code |
Mark Burnett |
| 951 |
Buffer Overflow Attacks |
James C. Foster, Vitaly Osipov, Nish Bhalla |
| 952 |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems |
Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky |
| 953 |
Programmer's Ultimate Security DeskRef |
James Foster |
| 954 |
How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King |
Susan Snedaker |
| 955 |
Black Hat Physical Device Security: Exploiting Hardware and Software |
Drew Miller |
| 956 |
Ethereal Packet Sniffing |
Angela D Orebaugh, Greg Morris, Ed Warnicke, Gilbert Ramirez |
| 957 |
Hardware Hacking |
Joe Grand, Kevin Mitnick, Ryan Russell |
| 958 |
Inside the SPAM Cartel |
Spammer-X, Jeffrey Posluns |
| 959 |
Check Point Next Generation with Application Intelligence Security Administration |
Chris Tobkin, Daniel Kligerman |
| 960 |
Managing and Securing a Cisco SWAN |
David Wall, Jeremy Faircloth, Joel Barrett, Jan Kanclirz Jr |
| 961 |
Security Assessment |
Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra |
| 962 |
Software Piracy Exposed |
Paul Craig, Mark Burnet |
| 963 |
Mathematical Programming: Theory and Methods |
S. M. Sinha |