Skip to content
Find a Library
Browse Collections
Apps
Libby Blog
Search by title or author
Browse Collections
Apps
Libby Blog
Find a Library
Media
Browse the Catalog
Sort
Relevance
Title
Release date
Popularity
Filter
Release date
Previous releases
0
Previous releases
573
Past year
4
Recent releases
1
Publisher
Taylor and Francis
573
Format
OverDrive READ
573
Adobe EPUB eBook
471
Adobe PDF eBook
98
Kindle Book
59
Open EPUB eBook
13
Subjects
Computer Technology
573
Nonfiction
573
Education
183
Business
94
Sociology
65
Language Arts
53
Law
30
Politics
26
Psychology
18
History
14
Technology
14
Medical
8
Games
6
Research
5
Science
5
Engineering
5
Art
4
Grammar & Language Usage
4
Performing Arts
4
Military
4
Architecture
3
Health & Fitness
3
Photography
3
Music
2
Nature
2
Creators
Harold F. Tipton
4
Bennet Lientz
3
Cindy E. Hmelo-Silver
3
Cleborne D Maddux
3
David H. Jonassen
3
Debra S. Herrmann
3
Gilbert Held
3
J. Michael Spector
3
Kathryn Rea
3
Linda S Katz
3
Andrew Dillon
2
Angela M. O'Donnell
2
Brian D. Loader
2
Christian Fuchs
2
D Lamont Johnson
2
Dimitris N. Chorafas
2
Dorothy E Leidner
2
Gary W Ives
2
Gerard Goggin
2
Gregory Kipper
2
Harold F. O'Neil
2
Helen Crompton
2
James A. Inman
2
James S. Tiller
2
Jay Liebowitz
2
Looking for a library? Show libraries matching your search.
Page 1 of 12
Showing 1 - 48 of 573
Next
Adversarial Reasoning
Alexander Kott
Editor
William M. McEneaney
Editor
(2006)
The Ethical Hack
James S. Tiller
Author
(2004)
Handbook of Wireless Local...
Mohammad Ilyas
Editor
Syed A. Ahson
Editor
(2005)
Information Security...
Thomas R. Peltier
Author
Justin Peltier
Author
(2004)
Logical Database Design...
John Garmany
Author
Jeff Walker
Author
(2005)
Maximizing ROI on Software...
Vijay Sikka
Author
(2004)
Outsourcing Software...
Tandy Gold
Author
(2004)
Public Key Infrastructure
John R. Vacca
Author
(2004)
Software Specification and...
John C. Munson, Ph.D.
Author
(2005)
Assessing and Managing...
John McCumber
Author
(2004)
A Practical Guide to Security...
Sudhanshu Kairab
Author
(2004)
Investigator's Guide to...
Gregory Kipper
Author
(2003)
Network Perimeter Security
Cliff Riggs
Author
(2003)
Oracle 11i E-Business Suite...
April J. Wells
Author
(2003)
Java Programming for Engineers
Julio Sanchez
Author
Maria P. Canton
Author
(2002)
What Every Engineer Should...
Philip A. Laplante
Author
(2007)
802.1X Port-Based Authentication
Edwin Lyle Brown
Author
(2006)
Official (ISC)2 Guide to the...
Harold F. Tipton
Editor
Kevin Henry
Editor
(2006)
Information Security...
Harold F. Tipton
Author
Micki Krause
Author
(2007)
Automated Data Analysis Using...
Brian D. Bissett
Author
(2007)
The Hacker's Handbook
Susan Young
Author
Dave Aitel
Author
(2003)
Information Security Policies...
Thomas R. Peltier
Author
(2001)
Building Software
Nikhilesh Krishnamurthy
Author
Amitabh Saran
Author
(2007)
Integrating ERP, CRM, Supply...
Dimitris N. Chorafas
Author
(2001)
A Technical Guide to IPSec...
James S. Tiller
Author
(2000)
Building A Wireless Office
Gilbert Held
Author
(2002)
Dynamic Software Development
Timothy Wells
Author
(2002)
Enterprise Systems Integration
Judith M. Myerson
Editor
(2001)
Global Information Warfare
Andy Jones
Author
Gerald L. Kovacich
Author
(2002)
Information Security...
Harold F. Tipton
Editor
Micki Krause
Editor
(2004)
Introduction to Microsoft...
Raj Rajagopal
Author
(1999)
Securing and Controlling...
Peter T. Davis
Author
(2002)
Server Management
Gilbert Held
Editor
(2000)
Software Engineering Handbook
Jessica Keyes
Author
(2002)
The ABCs of TCP/IP
Gilbert Held
Author
(2002)
Using the Common Criteria for...
Debra S. Herrmann
Author
(2002)
What Every Engineer Should...
Kim R. Fowler
Author
(2007)
Design Science Research...
Vijay K. Vaishnavi
Author
William Kuechler Jr.
Author
(2007)
Artificial Intelligence with...
Deyi Li
Author
Yi Du
Author
(2007)
Interpreting the CMMI (R)
Margaret K. Kulpa
Author
Kent A. Johnson
Author
(2008)
Information Security...
Harold F. Tipton
Author
Micki Krause
Author
(2008)
The Business Value of IT
Michael D. S. Harris
Author
David Herron
Author
(2008)
Handbook of Mobile Broadcasting
Borko Furht
Editor
Syed A. Ahson
Editor
(2008)
Building an Effective...
Sandy Bacik
Author
(2008)
Oracle Identity Management
Marlin B. Pohlman
Author
(2008)
Building and Maintaining a...
Fon Silvers
Author
(2008)
Malicious Bots
Ken Dunham
Author
Jim Melnick
Author
(2008)
Manage Software Testing
Peter Farrell-Vinay
Author
(2008)