Logical Database Design...

John Garmany Author
Jeff Walker Author
(2005)

Artificial Intelligence with...

Deyi Li Author
Yi Du Author
(2007)

What Every Engineer Should...

Kim R. Fowler Author
(2007)

Software Engineering Handbook

Jessica Keyes Author
(2002)

Server Management

Gilbert Held Editor
(2000)

Securing and Controlling...

Peter T. Davis Author
(2002)

Information Security...

Harold F. Tipton Editor
Micki Krause Editor
(2004)

Automated Data Analysis Using...

Brian D. Bissett Author
(2007)

Handbook of Mobile Broadcasting

Borko Furht Editor
Syed A. Ahson Editor
(2008)

The Business Value of IT

Michael D. S. Harris Author
David Herron Author
(2008)

Using the Common Criteria for...

Debra S. Herrmann Author
(2002)

Enterprise Systems Integration

Judith M. Myerson Editor
(2001)

Dynamic Software Development

Timothy Wells Author
(2002)

Building Software

Nikhilesh Krishnamurthy Author
Amitabh Saran Author
(2007)

Java Programming for Engineers

Julio Sanchez Author
Maria P. Canton Author
(2002)

Investigator's Guide to...

Gregory Kipper Author
(2003)

Assessing and Managing...

John McCumber Author
(2004)

Software Specification and...

John C. Munson, Ph.D. Author
(2005)

Maximizing ROI on Software...

Vijay Sikka Author
(2004)

Manage Software Testing

Peter Farrell-Vinay Author
(2008)

Building and Maintaining a...

Fon Silvers Author
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2008)

Information Security...

Harold F. Tipton Author
Micki Krause Author
(2007)

Official (ISC)2 Guide to the...

Harold F. Tipton Editor
Kevin Henry Editor
(2006)

A Technical Guide to IPSec...

James S. Tiller Author
(2000)

Building an Effective...

Sandy Bacik Author
(2008)

Building A Wireless Office

Gilbert Held Author
(2002)

802.1X Port-Based Authentication

Edwin Lyle Brown Author
(2006)

Adversarial Reasoning

Alexander Kott Editor
William M. McEneaney Editor
(2006)

Public Key Infrastructure

John R. Vacca Author
(2004)

Oracle Identity Management

Marlin B. Pohlman Author
(2008)

Malicious Bots

Ken Dunham Author
Jim Melnick Author
(2008)

Design Science Research...

Vijay K. Vaishnavi Author
William Kuechler Jr. Author
(2007)

Handbook of Wireless Local...

Mohammad Ilyas Editor
Syed A. Ahson Editor
(2005)

The ABCs of TCP/IP

Gilbert Held Author
(2002)

Introduction to Microsoft...

Raj Rajagopal Author
(1999)

Integrating ERP, CRM, Supply...

Dimitris N. Chorafas Author
(2001)

Information Security Policies...

Thomas R. Peltier Author
(2001)

The Hacker's Handbook

Susan Young Author
Dave Aitel Author
(2003)

What Every Engineer Should...

Philip A. Laplante Author
(2007)

Oracle 11i E-Business Suite...

April J. Wells Author
(2003)

Network Perimeter Security

Cliff Riggs Author
(2003)

A Practical Guide to Security...

Sudhanshu Kairab Author
(2004)

Outsourcing Software...

Tandy Gold Author
(2004)

Information Security...

Thomas R. Peltier Author
Justin Peltier Author
(2004)

The Ethical Hack

James S. Tiller Author
(2004)

Interpreting the CMMI (R)

Margaret K. Kulpa Author
Kent A. Johnson Author
(2008)

Global Information Warfare

Andy Jones Author
Gerald L. Kovacich Author
(2002)

Building A Global Information...

Raymond J Curts Author
Douglas E. Campbell Author
(2002)

Designing a Total Data Solution

Roxanne Burkey Editor
Charles V. Breakfield Editor
(2000)