Logical Database Design...

John Garmany Author
Jeff Walker Author
(2005)

Malicious Bots

Ken Dunham Author
Jim Melnick Author
(2008)

Securing and Controlling...

Peter T. Davis Author
(2002)

The Internet of Things

Lu Yan Editor
Yan Zhang Editor
(2008)

Mastering the Rules of...

Norton Paley Author
(2007)

Using the Common Criteria for...

Debra S. Herrmann Author
(2002)

The ABCs of TCP/IP

Gilbert Held Author
(2002)

Enterprise Systems Integration

Judith M. Myerson Editor
(2001)

Dynamic Software Development

Timothy Wells Author
(2002)

Building Software

Nikhilesh Krishnamurthy Author
Amitabh Saran Author
(2007)

The Hacker's Handbook

Susan Young Author
Dave Aitel Author
(2003)

Network Perimeter Security

Cliff Riggs Author
(2003)

Software Specification and...

John C. Munson, Ph.D. Author
(2005)

Public Key Infrastructure

John R. Vacca Author
(2004)

The Ethical Hack

James S. Tiller Author
(2004)

Official (ISC)2 Guide to the...

Harold F. Tipton Editor
Kevin Henry Editor
(2006)

Software Engineering Handbook

Jessica Keyes Author
(2002)

Building a Project Work...

Dennis P. Miller Author
(2008)

The Intimate Supply Chain

David Frederick Ross Author
(2008)

Handbook of Mobile Broadcasting

Borko Furht Editor
Syed A. Ahson Editor
(2008)

Managing Global Development Risk

James M. Hussey Author
Steven E. Hall Author
(2007)

Building A Wireless Office

Gilbert Held Author
(2002)

Ad Hoc Mobile Wireless Networks

Subir Kumar Sarkar Author
T.G. Basavaraju Author
(2007)

Integrating ERP, CRM, Supply...

Dimitris N. Chorafas Author
(2001)

Assessing and Managing...

John McCumber Author
(2004)

Building and Maintaining a...

Fon Silvers Author
(2008)

Oracle Identity Management

Marlin B. Pohlman Author
(2008)

Mobile Telemedicine

Yang Xiao Editor
Hui Chen Editor
(2008)

Broadband Mobile Multimedia

Yan Zhang Editor
Shiwen Mao Editor
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2008)

Interpreting the CMMI (R)

Margaret K. Kulpa Author
Kent A. Johnson Author
(2008)

Design Science Research...

Vijay K. Vaishnavi Author
William Kuechler Jr. Author
(2007)

Server Management

Gilbert Held Editor
(2000)

A Technical Guide to IPSec...

James S. Tiller Author
(2000)

Managing Global Supply Chains

Thomas A. Cook Author
(2008)

Integral Logistics Management

Paul Schönsleben Author
(2007)

Optical Wireless Communications

Roberto Ramirez-Iniguez Author
Sevia M. Idrus Author
(2008)

The Business Value of IT

Michael D. S. Harris Author
David Herron Author
(2008)

The Complete Project...

Gerard M. Hill Author
(2007)

Information Security Policies...

Thomas R. Peltier Author
(2001)

802.1X Port-Based Authentication

Edwin Lyle Brown Author
(2006)

Investigator's Guide to...

Gregory Kipper Author
(2003)

A Practical Guide to Security...

Sudhanshu Kairab Author
(2004)

Investigations in the Workplace

Eugene F. Ferraro, CPP, CFE, PCI Author
(2005)

Outsourcing Software...

Tandy Gold Author
(2004)

Maximizing ROI on Software...

Vijay Sikka Author
(2004)

Information Security...

Thomas R. Peltier Author
Justin Peltier Author
(2004)

Manage Software Testing

Peter Farrell-Vinay Author
(2008)

Carrier Ethernet

Gilbert Held Author
(2008)

A Standard for Enterprise...

Michael S. Zambruski Author
(2008)