Looking for a library? Show libraries matching your search.

The Ethical Hack

James S. Tiller Author
(2004)

Handbook of Wireless Local...

Mohammad Ilyas Editor
Syed A. Ahson Editor
(2005)

Information Security...

Thomas R. Peltier Author
Justin Peltier Author
(2004)

Logical Database Design...

John Garmany Author
Jeff Walker Author
(2005)

Maximizing ROI on Software...

Vijay Sikka Author
(2004)

Outsourcing Software...

Tandy Gold Author
(2004)

Public Key Infrastructure

John R. Vacca Author
(2004)

Software Specification and...

John C. Munson, Ph.D. Author
(2005)

Assessing and Managing...

John McCumber Author
(2004)

A Practical Guide to Security...

Sudhanshu Kairab Author
(2004)

Investigator's Guide to...

Gregory Kipper Author
(2003)

Network Perimeter Security

Cliff Riggs Author
(2003)

Oracle 11i E-Business Suite...

April J. Wells Author
(2003)

Adversarial Reasoning

Alexander Kott Editor
William M. McEneaney Editor
(2006)

Java Programming for Engineers

Julio Sanchez Author
Maria P. Canton Author
(2002)

What Every Engineer Should...

Philip A. Laplante Author
(2007)

802.1X Port-Based Authentication

Edwin Lyle Brown Author
(2006)

Official (ISC)2 Guide to the...

Harold F. Tipton Editor
Kevin Henry Editor
(2006)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2007)

Automated Data Analysis Using...

Brian D. Bissett Author
(2007)

The Hacker's Handbook

Susan Young Author
Dave Aitel Author
(2003)

Information Security Policies...

Thomas R. Peltier Author
(2001)

Building Software

Nikhilesh Krishnamurthy Author
Amitabh Saran Author
(2007)

Integrating ERP, CRM, Supply...

Dimitris N. Chorafas Author
(2001)

A Technical Guide to IPSec...

James S. Tiller Author
(2000)

Building A Wireless Office

Gilbert Held Author
(2002)

Dynamic Software Development

Timothy Wells Author
(2002)

Enterprise Systems Integration

Judith M. Myerson Editor
(2001)

Global Information Warfare

Andy Jones Author
Gerald L. Kovacich Author
(2002)

Information Security...

Harold F. Tipton Editor
Micki Krause Editor
(2004)

Introduction to Microsoft...

Raj Rajagopal Author
(1999)

Securing and Controlling...

Peter T. Davis Author
(2002)

Server Management

Gilbert Held Editor
(2000)

Software Engineering Handbook

Jessica Keyes Author
(2002)

The ABCs of TCP/IP

Gilbert Held Author
(2002)

Using the Common Criteria for...

Debra S. Herrmann Author
(2002)

What Every Engineer Should...

Kim R. Fowler Author
(2007)

Design Science Research...

Vijay K. Vaishnavi Author
William Kuechler Jr. Author
(2007)

Artificial Intelligence with...

Deyi Li Author
Yi Du Author
(2007)

Interpreting the CMMI (R)

Margaret K. Kulpa Author
Kent A. Johnson Author
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2008)

The Business Value of IT

Michael D. S. Harris Author
David Herron Author
(2008)

Handbook of Mobile Broadcasting

Borko Furht Editor
Syed A. Ahson Editor
(2008)

Building an Effective...

Sandy Bacik Author
(2008)

Oracle Identity Management

Marlin B. Pohlman Author
(2008)

Building and Maintaining a...

Fon Silvers Author
(2008)

Malicious Bots

Ken Dunham Author
Jim Melnick Author
(2008)

Manage Software Testing

Peter Farrell-Vinay Author
(2008)