Looking for a library? Show libraries matching your search.

Logical Database Design...

John Garmany Author
Jeff Walker Author
(2005)

Malicious Bots

Ken Dunham Author
Jim Melnick Author
(2008)

Securing and Controlling...

Peter T. Davis Author
(2002)

Automated Data Analysis Using...

Brian D. Bissett Author
(2007)

Handbook of Wireless Local...

Mohammad Ilyas Editor
Syed A. Ahson Editor
(2005)

Using the Common Criteria for...

Debra S. Herrmann Author
(2002)

The ABCs of TCP/IP

Gilbert Held Author
(2002)

Enterprise Systems Integration

Judith M. Myerson Editor
(2001)

Dynamic Software Development

Timothy Wells Author
(2002)

Building Software

Nikhilesh Krishnamurthy Author
Amitabh Saran Author
(2007)

The Hacker's Handbook

Susan Young Author
Dave Aitel Author
(2003)

Java Programming for Engineers

Julio Sanchez Author
Maria P. Canton Author
(2002)

Oracle 11i E-Business Suite...

April J. Wells Author
(2003)

Network Perimeter Security

Cliff Riggs Author
(2003)

Software Specification and...

John C. Munson, Ph.D. Author
(2005)

Public Key Infrastructure

John R. Vacca Author
(2004)

The Ethical Hack

James S. Tiller Author
(2004)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2007)

Design Science Research...

Vijay K. Vaishnavi Author
William Kuechler Jr. Author
(2007)

Server Management

Gilbert Held Editor
(2000)

A Technical Guide to IPSec...

James S. Tiller Author
(2000)

The Business Value of IT

Michael D. S. Harris Author
David Herron Author
(2008)

Information Security Policies...

Thomas R. Peltier Author
(2001)

802.1X Port-Based Authentication

Edwin Lyle Brown Author
(2006)

What Every Engineer Should...

Philip A. Laplante Author
(2007)

Investigator's Guide to...

Gregory Kipper Author
(2003)

A Practical Guide to Security...

Sudhanshu Kairab Author
(2004)

Outsourcing Software...

Tandy Gold Author
(2004)

Maximizing ROI on Software...

Vijay Sikka Author
(2004)

Information Security...

Thomas R. Peltier Author
Justin Peltier Author
(2004)

Manage Software Testing

Peter Farrell-Vinay Author
(2008)

Global Information Warfare

Andy Jones Author
Gerald L. Kovacich Author
(2002)

Official (ISC)2 Guide to the...

Harold F. Tipton Editor
Kevin Henry Editor
(2006)

Artificial Intelligence with...

Deyi Li Author
Yi Du Author
(2007)

What Every Engineer Should...

Kim R. Fowler Author
(2007)

Software Engineering Handbook

Jessica Keyes Author
(2002)

Information Security...

Harold F. Tipton Editor
Micki Krause Editor
(2004)

Building an Effective...

Sandy Bacik Author
(2008)

Handbook of Mobile Broadcasting

Borko Furht Editor
Syed A. Ahson Editor
(2008)

Introduction to Microsoft...

Raj Rajagopal Author
(1999)

Building A Wireless Office

Gilbert Held Author
(2002)

Integrating ERP, CRM, Supply...

Dimitris N. Chorafas Author
(2001)

Adversarial Reasoning

Alexander Kott Editor
William M. McEneaney Editor
(2006)

Assessing and Managing...

John McCumber Author
(2004)

Building and Maintaining a...

Fon Silvers Author
(2008)

Oracle Identity Management

Marlin B. Pohlman Author
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2008)

Interpreting the CMMI (R)

Margaret K. Kulpa Author
Kent A. Johnson Author
(2008)