Skip to content
Find a Library
Browse Collections
Apps
Libby Blog
Search by title or author
Browse Collections
Apps
Libby Blog
Find a Library
Publishers
Taylor and Francis
Taylor and Francis
Sort
Title
Release date
Popularity
Filter
Subjects
Nonfiction
96
Computer Technology
70
Business
17
Management
12
Engineering
9
Technology
8
Sociology
1
Creators
Gilbert Held
4
Debra S. Herrmann
3
Thomas R. Peltier
3
Dimitris N. Chorafas
2
Gregory Kipper
2
Harold F. Tipton
2
James S. Tiller
2
Jessica Keyes
2
John C. Munson, Ph.D.
2
Laurence T. Yang
2
Sanjiv Purba
2
Yan Zhang
2
Alan Mayne
1
Amitabh Saran
1
Amol Lad
1
Andy Jones
1
Anita Cassidy
1
Avi Soni
1
Benjamin A. Lieberman
1
Bob Cartwright
1
Borko Furht
1
C. Puttamadappa
1
C. Ravindranath Pandian
1
Carol V. Brown
1
Charles V. Breakfield
1
Format
Adobe PDF eBook
96
OverDrive READ
96
Imprint
Auerbach Publications
96
Page 1 of 2
Showing 1 - 50 of 96
Next
IS Management Handbook
Carol V. Brown
Author
Heikki Topi
Author
(2003)
Network Perimeter Security
Cliff Riggs
Author
(2003)
Software Specification and...
John C. Munson, Ph.D.
Author
(2005)
Public Key Infrastructure
John R. Vacca
Author
(2004)
The Ethical Hack
James S. Tiller
Author
(2004)
Investigator's Guide to...
Gregory Kipper
Author
(2003)
A Practical Guide to Security...
Sudhanshu Kairab
Author
(2004)
Investigations in the Workplace
Eugene F. Ferraro, CPP, CFE, PCI
Author
(2005)
Outsourcing Software...
Tandy Gold
Author
(2004)
Maximizing ROI on Software...
Vijay Sikka
Author
(2004)
Information Security...
Thomas R. Peltier
Author
Justin Peltier
Author
(2004)
Manage Software Testing
Peter Farrell-Vinay
Author
(2008)
Carrier Ethernet
Gilbert Held
Author
(2008)
A Standard for Enterprise...
Michael S. Zambruski
Author
(2008)
Assessing and Managing...
John McCumber
Author
(2004)
Building and Maintaining a...
Fon Silvers
Author
(2008)
Oracle Identity Management
Marlin B. Pohlman
Author
(2008)
Mobile Telemedicine
Yang Xiao
Editor
Hui Chen
Editor
(2008)
Broadband Mobile Multimedia
Yan Zhang
Editor
Shiwen Mao
Editor
(2008)
Information Security...
Harold F. Tipton
Author
Micki Krause
Author
(2008)
Interpreting the CMMI (R)
Margaret K. Kulpa
Author
Kent A. Johnson
Author
(2008)
Embedded Linux System Design...
P. Raghavan
Author
Amol Lad
Author
(2005)
Programming Language...
D.E. Stevenson
Author
(2006)
Wireless Crime and Forensic...
Gregory Kipper
Author
(2007)
Effective Software...
Stanislaw Jarzabek
Author
(2007)
X Internet
Jessica Keyes
Author
(2007)
Testing Code Security
Maura A. van der Linden
Author
(2007)
Mechanics of User...
Dobromir Todorov
Author
(2007)
Software Engineering Measurement
John C. Munson, Ph.D.
Author
(2003)
Strategic Information Security
John Wylder
Author
(2003)
The Real-Time Enterprise
Dimitris N. Chorafas
Author
(2004)
A Practical Guide to Security...
Debra S. Herrmann
Author
(2001)
Architectures for E-Business...
Sanjiv Purba
Editor
(2001)
Building an Information...
Mark B. Desman
Author
(2001)
Complete Book of Remote Access
Victor Kasacavage
Editor
(2002)
Customer Relationship...
Duane E. Sharp
Author
(2002)
New Directions in Internet...
Sanjiv Purba
Editor
(2001)
New Directions in Project...
Paul C. Tinnirello
Editor
(2001)
Securing E-Business...
Jonathan S. Held
Author
John Bowers
Author
(2001)
The Total CISSP Exam Prep Book
Thomas R. Peltier
Author
Patrick D. Howard
Author
(2002)
Performance Improvement
Darryl D. Enos
Author
(2007)
Business Continuity Planning
Ken Doughty
Editor
(2000)
Determining Project Requirements
Hans Jonasson
Author
(2007)
Practical Guide to Project...
Ricardo Viana Vargas
Author
(2007)
The Strategic Project Leader
Jack Ferraro
Author
(2007)
Asset Protection and Security...
James Walsh
Editor
(2002)
Building A Global Information...
Raymond J Curts
Author
Douglas E. Campbell
Author
(2002)
Designing a Total Data Solution
Roxanne Burkey
Editor
Charles V. Breakfield
Editor
(2000)
Global Information Warfare
Andy Jones
Author
Gerald L. Kovacich
Author
(2002)
Global Engineering Project...
M. Kemal Atesmen
Author
(2008)
Page 1 of 2
Showing 1 - 50 of 96
Next