Looking for a library? Show libraries matching your search.

Automated Data Analysis Using...

Brian D. Bissett Author
(2007)

Handbook of Mobile Broadcasting

Borko Furht Editor
Syed A. Ahson Editor
(2008)

The Business Value of IT

Michael D. S. Harris Author
David Herron Author
(2008)

Using the Common Criteria for...

Debra S. Herrmann Author
(2002)

Enterprise Systems Integration

Judith M. Myerson Editor
(2001)

Dynamic Software Development

Timothy Wells Author
(2002)

Building an Effective...

Sandy Bacik Author
(2008)

Building A Wireless Office

Gilbert Held Author
(2002)

Public Key Infrastructure

John R. Vacca Author
(2004)

Handbook of Wireless Local...

Mohammad Ilyas Editor
Syed A. Ahson Editor
(2005)

The ABCs of TCP/IP

Gilbert Held Author
(2002)

Introduction to Microsoft...

Raj Rajagopal Author
(1999)

The Ethical Hack

James S. Tiller Author
(2004)

Information Security...

Thomas R. Peltier Author
Justin Peltier Author
(2004)

Logical Database Design...

John Garmany Author
Jeff Walker Author
(2005)

Maximizing ROI on Software...

Vijay Sikka Author
(2004)

Outsourcing Software...

Tandy Gold Author
(2004)

Software Specification and...

John C. Munson, Ph.D. Author
(2005)

Assessing and Managing...

John McCumber Author
(2004)

A Practical Guide to Security...

Sudhanshu Kairab Author
(2004)

Investigator's Guide to...

Gregory Kipper Author
(2003)

Network Perimeter Security

Cliff Riggs Author
(2003)

Oracle 11i E-Business Suite...

April J. Wells Author
(2003)

Adversarial Reasoning

Alexander Kott Editor
William M. McEneaney Editor
(2006)

Java Programming for Engineers

Julio Sanchez Author
Maria P. Canton Author
(2002)

What Every Engineer Should...

Philip A. Laplante Author
(2007)

802.1X Port-Based Authentication

Edwin Lyle Brown Author
(2006)

Official (ISC)2 Guide to the...

Harold F. Tipton Editor
Kevin Henry Editor
(2006)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2007)

The Hacker's Handbook

Susan Young Author
Dave Aitel Author
(2003)

Information Security Policies...

Thomas R. Peltier Author
(2001)

Building Software

Nikhilesh Krishnamurthy Author
Amitabh Saran Author
(2007)

Integrating ERP, CRM, Supply...

Dimitris N. Chorafas Author
(2001)

A Technical Guide to IPSec...

James S. Tiller Author
(2000)

Global Information Warfare

Andy Jones Author
Gerald L. Kovacich Author
(2002)

Information Security...

Harold F. Tipton Editor
Micki Krause Editor
(2004)

Securing and Controlling...

Peter T. Davis Author
(2002)

Server Management

Gilbert Held Editor
(2000)

Software Engineering Handbook

Jessica Keyes Author
(2002)

What Every Engineer Should...

Kim R. Fowler Author
(2007)

Design Science Research...

Vijay K. Vaishnavi Author
William Kuechler Jr. Author
(2007)

Artificial Intelligence with...

Deyi Li Author
Yi Du Author
(2007)

Interpreting the CMMI (R)

Margaret K. Kulpa Author
Kent A. Johnson Author
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2008)

Oracle Identity Management

Marlin B. Pohlman Author
(2008)

Building and Maintaining a...

Fon Silvers Author
(2008)

Malicious Bots

Ken Dunham Author
Jim Melnick Author
(2008)

Manage Software Testing

Peter Farrell-Vinay Author
(2008)