************* *************
************* Here are New 530+ Computer IT Books Books added on February 2015 *************
************* *************
************* Here are New 530+ Computer IT Books Books added on February 2015 *************
************* *************
Get all the books on the following links ==> 530+ New IT Books
No | Book Title | Authors | Publication Year | ISBN No |
1 | Game Development with Unity, Second Edition | Michelle Menard and Bryan Wagstaff | 2015 | 9781305110540 |
2 | The Black Art of Multiplatform Game Programming | Jazon Yamamoto | 2015 | 9781305110380 |
3 | JavaServer Faces 2.0—Essential Guide for Developers | Deepak Vohra | 2015 | 9781305276185 |
4 | Beginning Game Programming, Fourth Edition | Jonathan S. Harbour | 2015 | 9781305258952 |
5 | David Busch’s Sony Alpha SLT-A58—Guide To Digital Photography | David D. Busch | 2015 | 9781305114166 |
6 | Microsoft WSH and VBScript Programming for the Absolute Beginner, Fourth Edition | Jerry Lee Ford | 2015 | 9781305260320 |
7 | Microsoft Windows PowerShell Programming for the Absolute Beginner, Third Edition | Jerry Lee Ford Jr. | 2015 | 9781305260344 |
8 | Logic Pro X Power!—The Comprehensive Guide | Kevin Anker and Orren Merton | 2015 | 9781305073500 |
9 | Learning Object-Oriented Programming in C# 5.0 | B. M. Harwani | 2015 | 9781285854564 |
10 | Sonar X3 Power!—The Comprehensive Guide | Scott R. Garrigus | 2015 | 9781305090194 |
11 | Fundamental 2D Game Programming with Java | Timothy Wright | 2015 | 9781305076532 |
12 | Enterprise Integration and Information Architecture—A Systems Perspective on Industrial Information Integration | Li Da Xu | 2015 | 9781439850244 |
13 | Ethical Hacking and Penetration Testing Guide | Rafay Baloch | 2015 | 9781482231618 |
14 | Developing Mobile Websites with HTML5 | David Karlins | 2015 | 9781305090538 |
15 | Beginning C++ Through Game Programming, Fourth Edition | Michael Dawson | 2015 | 9781305109919 |
16 | Joomla! 3 Boot Camp—30-Minute Lessons to Joomla! 3 Mastery | Robin D. Turner and Herb Boeckenhaupt | 2015 | 9781285764672 |
17 | Legal Issues in Information Security, Second Edition | Joanna Lyn Grama | 2015 | 9781284054743 |
18 | Social Media for Musicians—SoundCloud | Gary Hiebner and Simone Hiebner | 2015 | 9781305266407 |
19 | Security Policies and Implementation Issues, Second Edition | Robert Johnson | 2015 | 9781284055993 |
20 | Managing Risk in Information Systems, Second Edition | Darril Gibson | 2015 | 9781284055955 |
21 | Cyberwarfare—Information Operations in a Connected World | Mike Chapple and David Seidl | 2015 | 9781284058482 |
22 | Performing Information Governance—A Step-by-Step Guide to Making Information Governance Work | Anthony David Giordano | 2015 | 9780133385656 |
23 | Practical Game Development with Unity and Blender | Alan Thorn | 2015 | 9781305074705 |
24 | Fundamentals of Communications and Networking, Second Edition | Michael G. Solomon, David Kim and Jeffrey L. Carrell | 2015 | 9781284060140 |
25 | Professional Web Design—Techniques and Templates, Fifth Edition | Clint Eccher | 2015 | 9781305257528 |
26 | David Busch’s Mastering Digital SLR Photography, Fourth Edition | David D. Busch | 2015 | 9781305278400 |
27 | Computer Forensics—Cybercriminals, Laws, and Evidence, Second Edition | Marie-Helen Maras | 2015 | 9781449692223 |
28 | A Complete Guide to Computer Networks | Rachna Sharma and Sudipto Das | 2015 | 9789381159682 |
29 | Exploring Bioinformatics—A Project-Based Approach, Second Edition | Caroline St. Clair and Jonathan E. Visick | 2015 | 9781284034240 |
30 | The Essentials of Computer Organization and Architecture, Fourth Edition | Linda Null and Julia Lobur | 2015 | 9781284045611 |
31 | Complex Analysis—A First Course with Applications, Third Edition | Dennis G. Zill and Patrick D. Shanahan | 2015 | 9781449694616 |
32 | Java EE Applications on Oracle Java Cloud—Develop, Deploy, Monitor, and Manage Your Java Cloud Applications | Harshad Oak | 2015 | 9780071817158 |
33 | Beyond Big Data—Using Social MDM to Drive Deep Customer Insight | Martin Oberhofer, Eberhard Hechler, Ivan Milman, Scott Schumacher and Dan Wolfson | 2015 | 9780133509809 |
34 | CCFP Certified Cyber Forensics Professional All-in-One Exam Guide | Chuck Easttom | 2015 | 9780071839761 |
35 | Mobile Social Networking and Computing—A Multidisciplinary Integrated Perspective | Yufeng Wang and Jianhua Ma | 2015 | 9781466552753 |
36 | Secure Data Provenance and Inference Control with Semantic Web | Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu and Vaibhav Khadilkar | 2015 | 9781466569430 |
37 | Big Data Analytics Strategies for the Smart Grid | Carol L. Stimmel | 2015 | 9781482218282 |
38 | Medical Coding—What it is and How it Works, Second Edition | Patricia Aalseth | 2015 | 9781284054576 |
39 | Rails Crash Course—A No-Nonsense Guide to Rails Development | Anthony Lewis | 2015 | 9781593275723 |
40 | Java—A Beginner's Tutorial, Fourth Edition | Budi Kurniawan | 2015 | 9780992133047 |
41 | Guerrilla Analytics—A Practical Approach to Working with Data | Enda Ridge | 2015 | 9780128002186 |
42 | The Book of PF—A No-Nonsense Guide to the OpenBSD Firewall, 3rd Edition | Peter N.M. Hansteen | 2015 | 9781593275891 |
43 | Advances in Visual Data Compression and Communication—Meeting the Requirements of New Applications | Feng Wu | 2015 | 9781482234138 |
44 | CSA Guide to Cloud Computing—Implementing Cloud Privacy and Security | Raj Samani, Brian Honan and Jim Reavis | 2015 | 9780124201255 |
45 | Technology, Innovation, and Enterprise Transformation | Manish Wadhwa and Alan Harper (eds) | 2015 | 9781466664739 |
46 | Comptia Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401) | Wm. Arthur Conklin, Gregory White, Chuck Cothren, Roger L. Davis and Dwayne Williams | 2015 | 9780071841245 |
47 | Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition | Daniel Regalado et al. | 2015 | 9780071832380 |
48 | Microsoft SQL Server 2014 Query Tuning & Optimization | Benjamin Nevarez | 2015 | 9780071829427 |
49 | Advanced Persistent Threat Hacking—The Art and Science of Hacking Any Organization | Tyler Wrightson | 2015 | 9780071828369 |
50 | C#—A Beginner’s Guide | Pat McGee | 2015 | 9780071835831 |
51 | Java EE 7—The Big Picture | Danny Coward | 2015 | 9780071837347 |
52 | Master Competitive Analytics with Oracle Endeca Information Discovery | Helen Sun and William Smith | 2015 | 9780071833189 |
53 | Oracle Mobile Application Framework Developer Guide—Build Multiplatform Enterprise Mobile Apps | Luc Bors | 2015 | 9780071830850 |
54 | Running Applications on Oracle Exadata—Tuning Tips & Techniques | Joyjeet Banerjee | 2015 | 9780071833127 |
55 | CHFI—Computer Hacking Forensic Investigator Certification All-in-One, Exam Guide | Charles L. Brooks | 2015 | 9780071831567 |
56 | Programming Fundamentals Using Java—A Game Application Approach | William McAllister and S. Jane Fritz | 2015 | 9781938549762 |
57 | Handbook of Research on Innovations in Systems and Software Engineering | Vicente García Díaz, Juan Manuel Cueva Lovelle and B. Cristina Pelayo García-Bustelo (eds) | 2015 | 9781466663596 |
58 | Cluster Analysis and Data Mining—An Introduction | R.S. King | 2015 | 9781938549380 |
59 | Human Factors in Software Development and Design | Saqib Saeed, Imran Sarwar Bajwa and Zaigham Mahmood (eds) | 2015 | 9781466664852 |
60 | Integration of Data Mining in Business Intelligence Systems | Ana Azevedo and Manuel Filipe Santos (eds) | 2015 | 9781466664777 |
61 | Optical Transmission and Networks for Next Generation Internet Traffic Highways | Fouad Mohammed Abbou and Hiew Chee Choong (eds) | 2015 | 9781466665750 |
62 | Developing Strategic Business Models and Competitive Advantage in the Digital Sector | Nabyla Daidj (ed) | 2015 | 9781466665132 |
63 | Effects of IT on Enterprise Architecture, Governance, and Growth | José Carlos Cavalcanti (ed) | 2015 | 9781466664692 |
64 | Frameworks, Methodologies, and Tools for Developing Rich Internet Applications | Giner Alor-Hernández, Viviana Yarel Rosales-Morales and Luis Omar Colombo-Mendoza (eds) | 2015 | 9781466664371 |
65 | Knowledge Management for Competitive Advantage During Economic Crisis | Patricia Ordoñez de Pablos, Luis Jovell Turró, Robert D. Tennyson and Jingyuan Zhao (eds) | 2015 | 9781466664579 |
66 | Market Research Methodologies—Multi-Method and Qualitative Approaches | Amandeep Takhar-Lail and Ali Ghorbani (eds) | 2015 | 9781466663718 |
67 | Microsoft PowerPoint 2013 Pocket Primer | Theodor Richardson | 2015 | 9781938549908 |
68 | Microsoft Word / Excel 2013 Pocket Primer | Theodor Richardson | 2015 | 9781938549892 |
69 | Android Security Internals—An In-Depth Guide to Android's Security Architecture | Nikolay Elenkov | 2015 | 9781593275815 |
70 | The Book of CSS3—A Developer's Guide to the Future of Web Design, 2nd Edition | Peter Gasston | 2015 | 9781593275808 |
71 | Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance | Maria Manuela Cruz-Cunha and Irene Maria Portela (eds) | 2015 | 9781466663244 |
72 | Information Hiding in Speech Signals for Secure Communication | Zhijun Wu | 2015 | 9780128013281 |
73 | Software and System Development Using Virtual Platforms—Full-System Simulation with Wind River Simics | Daniel Aarno and Jakob Engblom | 2015 | 9780128007259 |
74 | Emerging Research on Swarm Intelligence and Algorithm Optimization | Yuhui Shi (ed) | 2015 | 9781466663282 |
75 | How Linux Works—What Every Superuser Should Know, 2nd Edition | Brian Ward | 2015 | 9781593275679 |
76 | Healthcare Informatics and Analytics—Emerging Issues and Trends | Madjid Tavana, Amir Hossein Ghapanchi and Amir Talaei-Khoei (eds) | 2015 | 9781466663169 |
77 | JavaScript and jQuery for Data Analysis and Visualization | Jon J. Raasch, Graham Murray, Vadim Ogievetsky and Joseph Lowery | 2015 | 9781118847060 |
78 | Python Projects | Laura Cassell and Alan Gauld | 2015 | 9781118908662 |
79 | Servlet, JSP and Spring MVC—A Tutorial, First Edition | Budi Kurniawan and Paul Deck | 2015 | 9781771970020 |
80 | Laboratory Management Information Systems—Current Requirements and Future Perspectives | Anastasius Moumtzoglou, Anastasia Kastania and Stavros Archondakis (eds) | 2015 | 9781466663206 |
81 | Secure Development for Mobile Apps—How to Design and Code Secure Mobile Applications with PHP and JavaScript | J. D. Glaser | 2015 | 9781482209037 |
82 | RFID Technology Integration for Business Performance Improvement | In Lee (ed) | 2015 | 9781466663084 |
83 | Search Engine Marketing, Inc.—Driving Search Traffic to Your Company’s Website, Third Edition | Mike Moran and Bill Hunt | 2015 | 9780133039177 |
84 | Developing Churn Models Using Data Mining Techniques and Social Network Analysis | Goran Klepac, Robert Kopal and Leo Mrsic (eds) | 2015 | 9781466662889 |
85 | Windows Performance Analysis Field Guide | Clint Huffman | 2015 | 9780124167018 |
86 | Modern Trends Surrounding Information Technology Standards and Standardization within Organizations | Kai Jakobs (ed) | 2015 | 9781466663329 |
87 | MCSA Windows Server 2012 R2 Complete Study Guide | William Panek | 2015 | 9781118859919 |
88 | Oracle Database 12c Security—Design and Manage a Secure Enterprise Database Environment | Scott Gaetjen, David Knox and William Maroulis | 2015 | 9780071824286 |
89 | Oracle Database 12c PL/SQL Advanced Programming Techniques | Michael McLaughlin and John Harper | 2015 | 9780071835145 |
90 | Handbook of Research on Securing Cloud-Based Databases with Biometric Applications | Ganesh Chandra Deka and Sambit Bakshi (eds) | 2015 | 9781466665590 |
91 | PHP, MYSQL and Apache Server | Shashi Banzal | 2015 | 9789380298986 |
92 | Principles of Computer Security Lab Manual, Fourth Edition | Vincent Nestler, Keith Harrison, Matthew Hirsch and Wm. Art Conklin | 2015 | 9780071836555 |
93 | PHP and MySQL Web Development—A Beginner’s Guide | Marty Matthews | 2015 | 9780071837309 |
94 | Quicken 2015—The Official Guide | Bobbi Sandberg | 2015 | 9780071850391 |
95 | Controls and Assurance in the Cloud—Using COBIT 5 | ISACA | 2014 | 9781604204650 |
96 | Natural Computing for Simulation and Knowledge Discovery | Leandro Nunes de Castro (ed) | 2014 | 9781466642539 |
97 | Information Governance—Concepts, Strategies and Best Practices | Robert F. Smallwood | 2014 | 9781118218303 |
98 | Xcode 5 Developer Reference | Richard Wentk | 2014 | 9781118834336 |
99 | Learn Sprite Kit for iOS Game Development | Leland Long | 2014 | 9781430264392 |
100 | JavaScript Creativity—Exploring the Modern Capabilities of JavaScript and HTML5 | Shane Hudson | 2014 | 9781430259442 |
101 | Power Query for Power BI and Excel | Chris Webb | 2014 | 9781430266914 |
102 | Global Trends in Intelligent Computing Research and Development | B.K. Tripathy and D.P. Acharjya (eds) | 2014 | 9781466649361 |
103 | Exploring Innovative and Successful Applications of Soft Computing | Antonio D. Masegosa, Pablo J. Villacorta, Carlos Cruz-Corona and M. Socorro García-Cascales (eds) | 2014 | 9781466647855 |
104 | Dart for Absolute Beginners | David Kopec | 2014 | 9781430264811 |
105 | Beginning Google Glass Development | Jeff Tang | 2014 | 9781430267881 |
106 | Assistive Technologies and Computer Access for Motor Disabilities | Georgios Kouroupetroglou (ed) | 2014 | 9781466644380 |
107 | WordPress for Dummies, 6th Edition | Lisa Sabin-Wilson | 2014 | 9781118791615 |
108 | SAS Macro Programming Made Easy, Third Edition | Michele M. Burlew | 2014 | 9781612906935 |
109 | Java for Android | Budi Kurniawan | 2014 | 9780992133030 |
110 | Handbook of Research on Patient Safety and Quality Care through Health Informatics | Vaughan Michell, Deborah J. Rosenorn-Lanng, Stephen R. Gulliver and Wendy Currie (eds) | 2014 | 9781466645462 |
111 | Handbook of Research on Novel Soft Computing Intelligent Algorithms—Theory and Practical Applications | Pandian M. Vasant (ed) | 2014 | 9781466644502 |
112 | Game Development Tool Essentials | Alessandro Ardolino et al. | 2014 | 9781430267003 |
113 | Building Dependable Distributed Systems | Wenbing Zhao | 2014 | 9781118549438 |
114 | Advanced Routing Protocols for Wireless Networks | Miguel Elias M. Campista and Marcelo G. Rubinstein | 2014 | 9781848216273 |
115 | Physics for JavaScript Games, Animation, and Simulations—with HTML5 Canvas | Dev Ramtal and Adrian Dobre | 2014 | 9781430263371 |
116 | Learn C++ for Game Development | Bruce Sutherland | 2014 | 9781430264576 |
117 | JavaFX 8—Introduction by Example, Second Edition | Carl Dea, Mark Heckler, Gerrit Grunwald, José Pereda and Sean M. Phillips | 2014 | 9781430264606 |
118 | High Impact Data Visualization with Power View, Power Map, and Power BI | Adam Aspin | 2014 | 9781430266167 |
119 | Healthcare Information Privacy and Security—Regulatory Compliance and Data Security in the Age of Electronic Health Records | Bernard Peter Robichau | 2014 | 9781430266761 |
120 | Computer Vision Metrics—Survey, Taxonomy, and Analysis | Scott Krig | 2014 | 9781430259299 |
121 | Using R for Statistics | Sarah Stowell | 2014 | 9781484201404 |
122 | Troubleshooting Oracle Performance, Second Edition | Christian Antognini | 2014 | 9781430257585 |
123 | Harness Oil and Gas Big Data with Analytics—Optimize Exploration and Production with Data-Driven Models | Keith R. Holdaway | 2014 | 9781118779316 |
124 | Expert Oracle SQL—Optimization, Deployment, and Statistics | Tony Hasler | 2014 | 9781430259770 |
125 | Confessions of a Successful CIO—How the Best CIOs Tackle Their Toughest Business Challenges | Dan Roberts and Brian P. Watson | 2014 | 9781118638224 |
126 | .NET IL Assembler | Serge Lidin | 2014 | 9781430267614 |
127 | A Practical Guide to Data Mining for Business and Industry | Andrea Ahlemeyer-Stubbe and Shirley Coleman | 2014 | 9781119977131 |
128 | Introducing Spring Framework—A Primer | Felipe Gutierrez | 2014 | 9781430265320 |
129 | The Browser Hacker's Handbook | Wade Alcorn, Christian Frichot and Michele Orrù | 2014 | 9781118662090 |
130 | Unity for Absolute Beginners | Sue Blackman | 2014 | 9781430267799 |
131 | jQuery—A Beginner's Guide | John Pollock | 2014 | 9780071817912 |
132 | Excel Data Analysis for Dummies, 2nd Edition | Stephen L. Nelson | 2014 | 9781118898093 |
133 | Advanced Level Test Manager (ISTQB)—228 Most Asked Questions—What You Need to Know | Samuel Morrison | 2014 | 9781488524622 |
134 | VMware vSphere Performance—Designing CPU, Memory, Storage, and Networking for Performance-Intensive Workloads | Matt Liebowitz, Christopher Kusek and Rynardt Spies | 2014 | 9781118008195 |
135 | Satellite Networking—Principles and Protocols, Second Edition | Zhili Sun | 2014 | 9781118351604 |
136 | Programming the BeagleBone Black—Getting Started with JavaScript and BoneScript | Simon Monk | 2014 | 9780071832120 |
137 | OCA—Oracle Database 12c Administrator Certified Associate Study Guide | Biju Thomas | 2014 | 9781118643952 |
138 | Advanced Google AdWords, Third Edition | Brad Geddes | 2014 | 9781118819562 |
139 | Pro SQL Server Internals | Dmitri Korotkevitch | 2014 | 9781430259626 |
140 | Microsoft Business Intelligence Tools for Excel Analysts | Michael Alexander, Jared Decker and Bernard Wehbe | 2014 | 9781118821527 |
141 | The Book of F#—Breaking Free with Managed Functional Programming | Dave Fancher | 2014 | 9781593275525 |
142 | Big Data, Data Mining, and Machine Learning—Value Creation for Business Leaders and Practitioners | Jared Dean | 2014 | 9781118618042 |
143 | Beginning Java 8 Fundamentals—Language Syntax, Arrays, Data Types, Objects, and Regular Expressions | Kishori Sharan | 2014 | 9781430266525 |
144 | The Principles of Object-Oriented JavaScript | Nicholas C. Zakas | 2014 | 9781593275402 |
145 | A Practical Introduction to Computer Vision with OpenCV | Kenneth Dawson-Howe | 2014 | 9781118848456 |
146 | Jump Start Bootstrap | Syed Fazle Rahman | 2014 | 9780992279431 |
147 | Windows 8.1 for Seniors—QuickSteps | Marty Matthews | 2014 | 9780071832588 |
148 | Practical Node.js—Building Real-World Scalable Web Apps | Azat Mardan | 2014 | 9781430265955 |
149 | Dashboarding and Reporting with Power Pivot and Excel | Kasper de Jonge | 2014 | 9781615470273 |
150 | The Principles of Beautiful Web Design, Third Edition | Jason Beaird and James George | 2014 | 9780992279448 |
151 | Certified Software Tester (CSTE) 191 Success Secrets—191 Most Asked Questions On Certified Software Tester (CSTE)—What You Need To Know | Shawn Elliott | 2014 | |
152 | Certified Software Quality Analyst (CSQA) 120 Success Secrets—120 Most Asked Questions On Certified Software Quality Analyst (CSQA)—What You Need To Know | Joyce Reynolds | 2014 | |
153 | Teach Yourself VISUALLY iMac, 3rd Edition | Guy Hart-Davis | 2014 | 9781118768068 |
154 | Predictive Analytics for Dummies | Anasse Bari, Mohamed Chaouchi and Tommy Jung | 2014 | 9781118728963 |
155 | Learning Python with Raspberry Pi | Alex Bradbury and Ben Everard | 2014 | 9781118717059 |
156 | Generalized Linear and Nonlinear Models for Correlated Data—Theory and Applications Using SAS | Edward F. Vonesh | 2014 | 9781599946474 |
157 | Security Management of Next Generation Telecommunications Networks and Services | Stuart Jacobs | 2014 | 9780470565131 |
158 | Excel Tables—A Complete Guide for Creating, Using and Automating Lists and Tables | Zack Barresse and Kevin Jones | 2014 | 9781615470280 |
159 | David Busch’s Canon EOS 70D—Guide to Digital SLR Photography | David D. Busch | 2014 | 9781285765266 |
160 | Broadband Access—Wireline and Wireless – Alternatives for Internet Services | Steve Gorshe, Arvind R. Raghavan, Thomas Starr and Stefano Galli | 2014 | 9780470741801 |
161 | Beginning Fedora Desktop—Fedora 20 Edition | Richard Petersen | 2014 | 9781484200681 |
162 | The Art of Linux Kernel Design—Illustrating the Operating System Design Principle and Implementation | Yang Lixiang et al. | 2014 | 9781466518032 |
163 | PowerPivot Alchemy—Patterns and Techniques for Excel | Rob Collie and Bill Jelen | 2014 | 9781615470211 |
164 | Practical Data Analysis with JMP, Second Edition | Robert H. Carver | 2014 | 9781612908236 |
165 | Migrating to Android for iOS Developers | Sean Liao | 2014 | 9781484200117 |
166 | CompTIA Security+ Review Guide, Third Edition | James Michael Stewart | 2014 | 9781118901373 |
167 | The LEGO® MINDSTORMS® EV3 Discovery Book—A Beginner’s Guide to Building and Programming Robots | Laurens Valk | 2014 | 9781593275327 |
168 | A Guide to Effective Internal Management System Audits—Implementing Internal Audits as a Risk Management Tool | Andrew W. Nichols | 2014 | 9781849285605 |
169 | Agile Governance and Audit—An Overview for Auditors and Agile Teams | Christopher Wright | 2014 | 9781849285889 |
170 | Targeted Cyber Attacks—Multi-Staged Attacks Driven by Exploits and Malware | Aditya K. Sood and Richard Enbody | 2014 | 9780128006047 |
171 | Business Intelligence and the Cloud—Strategic Implementation Guide | Michael S. Gendron | 2014 | 9781118631720 |
172 | HTML5 Games—Creating Fun with HTML5, CSS3, and WEBGL, 2nd Edition | Jacob Seidelin | 2014 | 9781118855386 |
173 | In Hindsight—A Compendium of Business Continuity Case Studies | Robert A Clark (ed) | 2014 | 9781849285926 |
174 | Competing with High Quality Data—Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality | Rajesh Jugulum | 2014 | 9781118342329 |
175 | User Interface Inspection Methods—A User-Centered Design Method | Chauncey Wilson | 2014 | 9780124103917 |
176 | Statistical Hypothesis Testing with SAS and R | Dirk Taeger and Sonja Kuhnt | 2014 | 9781119950219 |
177 | Security for Service Oriented Architectures | Walter Williams | 2014 | 9781466584020 |
178 | PCI Compliance—The Definitive Guide | Abhay Bhargav | 2014 | 9781439887400 |
179 | Data Stewardship—An Actionable Guide to Effective Data Management and Data Governance | David Plotkin | 2014 | 9780124103894 |
180 | Adobe Captivate 8—The Essentials—“Skills and Drills” Learning | Kevin Siegel | 2014 | 9781932733709 |
181 | ScalaCheck—The Definitive Guide | Rickard Nilsson | 2014 | 9780981531694 |
182 | Requirements Engineering for Software and Systems, Second Edition | Phillip A. Laplante | 2014 | 9781466560819 |
183 | Buying, Supporting, Maintaining Software and Equipment—An IT Manager's Guide to Controlling the Product Lifecycle | Gay Gordon-Byrne | 2014 | 9781482232783 |
184 | Big Data, Mining, and Analytics—Components of Strategic Decision Making | Stephan Kudyba | 2014 | 9781466568709 |
185 | Adaptive, Dynamic, and Resilient Systems | Niranjan Suri and Giacomo Cabri (eds) | 2014 | 9781439868485 |
186 | UHF RFID Technologies for Identification and Traceability | Jean-Marc Laheurte, Christian Ripoll, Dominique Paret and Christophe Loussert | 2014 | 9781848215924 |
187 | Penetration Testing—A Hands-On Introduction to Hacking | Georgia Weidman | 2014 | 9781593275648 |
188 | CompTIA Security+-Official Study Guide, Student Edition | James Pengelly (ed) | 2014 | |
189 | Security without Obscurity—A Guide to Confidentiality, Authentication, and Integrity | J. J. Stapleton | 2014 | 9781466592148 |
190 | The SAP Materials Management Handbook | Ashfaque Ahmed | 2014 | 9781466581623 |
191 | Programming in Ada 2012 | John Barnes | 2014 | 9781107424814 |
192 | The Frugal CISO—Using Innovation and Smart Approaches to Maximize Your Security Posture | Kerry Ann Anderson | 2014 | 9781482220070 |
193 | Application Administrators Handbook—Installing, Updating and Troubleshooting Software | Kelly C. Bourne | 2014 | 9780123985453 |
194 | Risk-Based Monitoring and Fraud Detection in Clinical Trials Using JMP and SAS | Richard C. Zink | 2014 | 9781612909912 |
195 | Large Scale and Big Data—Processing and Management | Sherif Sakr and Mohamed Medhat Gaber (eds) | 2014 | 9781466581500 |
196 | Conducting Network Penetration and Espionage in a Global Environment | Bruce Middleton | 2014 | 9781482206470 |
197 | Anonymous Communication Networks—Protecting Privacy on the Web | Kun Peng | 2014 | 9781439881576 |
198 | Penetration Testing Services Procurement Guide | 2014 | 9781849285803 | |
199 | Professional Team Foundation Server 2013 | Steven St. Jean, Damian Brady, Ed Blankenship, Martin Woodward and Grant Holliday | 2014 | 9781118836347 |
200 | Business Relationship Manager—Careers in IT Service Management | Ernest Brewster | 2014 | 9781780172507 |
201 | Adobe RoboHelp HTML 11—The Essentials | Kevin Siegel | 2014 | 9781932733686 |
202 | Python Pocket Primer | Oswald Campesato | 2014 | 9781938549854 |
203 | Linux Kernel and Device Driver Programming—A Simpler Approach to Linux Kernel | Mohan Lal Jangir | 2014 | 9789380298931 |
204 | Social Engineering Penetration Testing—Executing Social Engineering Pen Tests, Assessments and Defense | Gavin Watson, Andrew Mason and Richard Ackroyd | 2014 | 9780124201248 |
205 | Modeling Enterprise Architecture with TOGAF—A Practical Guide Using UML and BPMN | Philippe Desfray and Gilbert Raymond | 2014 | 9780124199842 |
206 | Mobile User Experience—Patterns to Make Sense of it All | Adrian Mendoza | 2014 | 9780124095144 |
207 | Joe Celko's Complete Guide to NoSQL—What Every SQL Professional Needs to Know about Nonrelational Databases | Joe Celko | 2014 | 9780124071926 |
208 | CUDA Fortran for Scientists and Engineers—Best Practices for Efficient CUDA Fortran Programming | Gregory Ruetsch | 2014 | 9780124169708 |
209 | The UX Five-Second Rules—Guidelines for User Experience Design's Simplest Testing Technique | Paul Doncaster | 2014 | 9780128005347 |
210 | This is Agile-Beyond the Basics. Beyond the Hype. Beyond Scrum. | Sander Hoogendoorn | 2014 | 9781937965211 |
211 | Process Modeling Style | John Long | 2014 | 9780128009598 |
212 | Pro Couchbase Server | David Ostrovsky and Yaniv Rodenski | 2014 | 9781430266136 |
213 | Mobility Protocols and Handover Optimization—Design, Evaluation and Application | Ashutosh Dutta and Henning Schulzrinne | 2014 | 9780470740583 |
214 | Emerging Trends in ICT Security | Babak Akhgar and Hamid R. Arabn | 2014 | 9780124114746 |
215 | Automation through Chef Opscode—A Hands-on Approach to Chef | Navin Sabharwal and Manak Wadhwa | 2014 | 9781430262954 |
216 | Network Convergence—Ethernet Applications and Next Generation Packet Transport Architectures | Vinod Joseph and Srinivas Mulugu | 2014 | 9780123978776 |
217 | System Forensics, Investigation, and Response, Second Edition | Chuck Easttom | 2014 | 9781284031058 |
218 | Pro iOS Continuous Integration | Romain Pouclet | 2014 | 9781484201251 |
219 | Hacker Techniques, Tools, and Incident Handling, Second Edition | Sean-Philip Oriyano | 2014 | 9781284031713 |
220 | Fundamentals of Information Systems Security, Second Edition | David Kim and Michael G. Solomon | 2014 | 9781284031621 |
221 | Beginning Java 8 Language Features—Lambda Expressions, Inner Classes, Threads, I/O, Collections, and Streams | Kishori Sharan | 2014 | 9781430266587 |
222 | Access Control, Authentication, and Public Key Infrastructure, Second Edition | Mike Chapple, Bill Ballad, Tricia Ballad and Erin K. Banks | 2014 | 9781284031591 |
223 | Practical IT Service Management—A Concise Guide for Busy Executives, Second Edition | Thejendra B.S | 2014 | 9781849285476 |
224 | Security Strategies in Windows Platforms and Applications, Second Edition | Michael G. Solomon | 2014 | 9781284031652 |
225 | Network Security, Firewalls, and VPNs, Second Edition | J. Michael Stewart | 2014 | 9781284031676 |
226 | Cloud Networking—Understanding Cloud-based Data Center Networks | Gary Lee | 2014 | 9780128007280 |
227 | Agile!—The Good, the Hype and the Ugly | Bertrand Meyer | 2014 | 9783319051543 |
228 | PIC Microcontroller Projects in C—Basic to Advanced, Second Edition | Dogan Ibrahim | 2014 | 9780080999241 |
229 | Eye Tracking in User Experience Design | Jennifer Romano Bergstrom and Andrew Jonathan Schall (eds) | 2014 | 9780124081383 |
230 | Economics-Driven Software Architecture | Ivan Mistrik, Rami Bahsoon, Rick Kazman and Yuanyuan Zhang | 2014 | 9780124104648 |
231 | Digital Video Surveillance and Security, Second Edition | Anthony C. Caputo | 2014 | 9780124200425 |
232 | Pro JavaFX 8—A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients | Johan Vos, Weiqi Gao, Stephen Chin, Dean Iverson and James Weaver | 2014 | 9781430265740 |
233 | Introduction to Web Development Using HTML 5 | Kris Jamsa | 2014 | 9781449686543 |
234 | Pro Linux High Availability Clustering | Sander van Vugt | 2014 | 9781484200803 |
235 | Expert ASP.NET Web API 2 for MVC Developers | Adam Freeman | 2014 | 9781484200865 |
236 | An Introduction to Digital Multimedia, Second Edition | T. M. Savage and K. E. Vogel | 2014 | 9781449688394 |
237 | GUI Design for Android Apps | Ryan Cohen and Tao Wang | 2014 | 9781484203835 |
238 | Cyberwar, Cyberterror, Cybercrime and Cyberactivism—An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition | Julie E. Mehan | 2014 | 9781849285728 |
239 | Platform Embedded Security Technology Revealed—Safeguarding the Future of Computing with Intel Embedded Security and Management Engine | Xiaoyu Ruan | 2014 | 9781430265719 |
240 | Service Desk and Incident Manager—Careers in IT Service Management | Peter Wheatcroft | 2014 | 9781780172330 |
241 | Pro JavaScript Development—Coding, Capabilities, and Tooling | Den Odell | 2014 | 9781430262688 |
242 | PHP for Absolute Beginners | Thomas Blom Hansen and Jason Lengstorf | 2014 | 9781430268154 |
243 | Learn Unity 3D Programming with UnityScript—Unity's JavaScript for Beginners | Janine Suvak | 2014 | 9781430265863 |
244 | ASP.NET Web API 2—Building a REST Service from Start to Finish, Second Edition | Jamie Kurtz and Brian Wortman | 2014 | 9781484201107 |
245 | Android Apps for Absolute Beginners, Third Edition | Wallace Jackson | 2014 | 9781484200209 |
246 | Advanced API Security—Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE | Prabath Siriwardena | 2014 | 9781430268185 |
247 | Trends in E-Business, E-Services, and E-Commerce—Impact of Technology on Goods, Services, and Business Transactions | In Lee (ed) | 2014 | 9781466645103 |
248 | Transportation Management with SAP TM 9.0—A Hands-On Guide to Configuring, Implementing, and Optimizing SAP TM | Jayant Daithankar and Tejkumar Pandit | 2014 | 9781430260257 |
249 | Pro TypeScript—Application-Scale JavaScript Development | Steve Fenton | 2014 | 9781430267911 |
250 | Mastering the Raspberry Pi | Warren W. Gay | 2014 | 9781484201824 |
251 | Beginning T-SQL, Third Edition | Kathi Kellenberger and Scott Shaw | 2014 | 9781484200476 |
252 | C Programming and Data Structures | K. Venkateshwara Rao, K. Srujan Raju and Bathini Ravinder | 2014 | 9789383828289 |
253 | Security Risk Assessment—Managing Physical and Operational Security | John M. White | 2014 | 9780128002216 |
254 | Multi Tenancy for Cloud-Based In-Memory Column Databases—Workload Management and Data Placement | Jan Schaffner | 2014 | 9783319004969 |
255 | Magic of Oracle ADF and ADF Faces | Shibi Panikkar | 2014 | 9789383828357 |
256 | IT Tools and Business Systems | Ramesh Bangia | 2014 | 9789380298917 |
257 | Git—Distributed Version Control – Fundamentals and Workflows | René Preißel and Bjørn Stachmann | 2014 | 9781771970006 |
258 | Cyber Crime and Cyber Terrorism Investigator's Handbook | Babak Akhgar, Andrew Staniforth and Francesca Bosco | 2014 | 9780128007433 |
259 | Cryptography and Network Security—A Practical Approach | K. Haribaskar | 2014 | 9789381159637 |
260 | Uberveillance and the Social Implications of Microchip Implants—Emerging Technologies | .G. Michael and Katina Michael | 2014 | 9781466645820 |
261 | Pervasive Cloud Computing Technologies—Future Outlooks and Interdisciplinary Perspectives | Lucio Grandinetti, Ornella Pisacane and Mehdi Sheikhalishahi (eds) | 2014 | 9781466646834 |
262 | Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing | Wen-Chen Hu (ed) | 2014 | 9781466647152 |
263 | XML and Web Technologies for Data Sciences with R | Deborah Nolan and Duncan Temple Lang | 2014 | 9781461478997 |
264 | Programming and Problem Solving with C++—Brief, Sixth Edition | Nell Dale and Chip Weems | 2014 | 9781284028645 |
265 | Techniques and Principles in Three-Dimensional Imaging—An Introductory Approach | Martin Richardson (ed) | 2014 | 9781466649323 |
266 | Statistical Analysis of Network Data with R | Eric D. Kolaczyk and Gábor Csárdi | 2014 | 9781493909827 |
267 | Serialization and Persistent Objects—Turning Data Structures into Efficient Databases | Jiri Soukup and Petr Macháèek | 2014 | 9783642393228 |
268 | Cyberpatterns—Unifying Design Patterns with Security and Attack Patterns | Clive Blackwell and Hong Zhu (eds) | 2014 | 9783319044460 |
269 | Revolutionizing Enterprise Interoperability through Scientific Foundations | Yannis Charalabidis, Fenareti Lampathaki and Ricardo Jardim-Goncalves (eds) | 2014 | 9781466651425 |
270 | Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education | Marijana Despotoviæ-Zrakiæ, Veljko Milutinoviæ and Aleksandar Beliæ (eds) | 2014 | 9781466657847 |
271 | Evaluating Websites and Web Services—Interdisciplinary Perspectives on User Satisfaction | Denis Yannacopoulos, Panagiotis Manolitzas, Nikolaos Matsatsinis and Evangelos Grigoroudis (eds) | 2014 | 9781466651296 |
272 | Emerging Methods in Predictive Analytics—Risk Management and Decision-Making | William H. Hsu (ed) | 2014 | 9781466650633 |
273 | Agile Estimation Techniques and Innovative Approaches to Software Process Improvement | Ricardo Colomo-Palacios, Jose Antonio Calvo-Manzano Villalón, Antonio de Amescua Seco and Tomás San Feliu Gilabert (eds) | 2014 | 9781466651821 |
274 | Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments | S. Srinivasan (ed) | 2014 | 9781466657885 |
275 | Practical Reverse Engineering—x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation | Bruce Dang, Alexandre Gazet and Elias Bachaalany | 2014 | 9781118787311 |
276 | Judiciary-Friendly Forensics of Software Copyright Infringement | Vinod Polpaya Bhattathiripad (ed) | 2014 | 9781466658042 |
277 | Innovative Techniques and Applications of Entity Resolution | Hongzhi Wang (ed) | 2014 | 9781466651982 |
278 | Convergence of Broadband, Broadcast, and Cellular Network Technologies | Ramona Trestian and Gabriel-Miro Muntean (eds) | 2014 | 9781466659780 |
279 | Big Data, Big Innovation—Enabling Competitive Differentiation through Business Analytics | Evan Stubbs | 2014 | 9781118724644 |
280 | Cybercrime and Cyberwarfare | Igor Bernik | 2014 | |
281 | CompTIA Mobility+ Certification All-in-One Exam Guide (Exam MB0-001) | Bobby E. Rogers | 2014 | 9780071825320 |
282 | HL7 for BizTalk | Howard Edidin and Vikas Bhardwaj | 2014 | 9781430267645 |
283 | CCNA Routing and Switching Review Guide—Exams 100-101, 200-101, and 200-120 | Todd Lammle | 2014 | 9781118789810 |
284 | Windows 8.1 Bibile | Jim Boyce, Jeffrey Shapiro and Rob Tidrow | 2014 | 9781118835319 |
285 | VCP5-DCV—VMware Certified Professional-Data Center Virtualization on vSphere 5.5 Study Guide VCP-550 | Brian Atkinson | 2014 | 9781118658444 |
286 | Professional Application Lifecycle Management with Visual Studio 2013 | Mickey Gousset, Martin Hinshelwood, Brian A. Randell, Brian Keller and Martin Woodward | 2014 | 9781118836583 |
287 | Google BigQuery Analytics | Jordan Tigani and Siddartha Naidu | 2014 | 9781118824825 |
288 | Oracle PL/SQL Performance Tuning Tips & Techniques | Michael Rosenblum and Paul Dorsey | 2014 | 9780071824828 |
289 | Carry On—Sound Advice from Schneier on Security | Bruce Schneier | 2014 | 9781118790816 |
290 | Beginning Responsive Web Design with HTML5 and CSS3 | Jonathan Fielding | 2014 | 9781430266945 |
291 | Assistive Technologies—Concepts, Methodologies, Tools, and Applications, Three Volume Set | Information Resources Management Association (IRMA) | 2014 | 9781466644229 |
292 | Architecting the Cloud—Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS) | Michael Kavis | 2014 | 9781118617618 |
293 | Pro Apache Hadoop, Second Edition | Sameer Wadkar, Jason Venner and Madhu Siddalingaiah | 2014 | 9781430248637 |
294 | Iron-Clad Java—Building Secure Web Applications | Jim Manico and August Detlefsen | 2014 | 9780071835886 |
295 | Global Issues and Ethical Considerations in Human Enhancement Technologies | Steven John Thompson (ed) | 2014 | 9781466660106 |
296 | Data-Driven Security—Analysis, Visualization and Dashboards | Jay Jacobs and Bob Rudis | 2014 | 9781118793725 |
297 | CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401) | Daniel Lachance and Glen E. Clarke | 2014 | 9780071833448 |
298 | C++ 2013 for C# Developers | Dean C. Wills | 2014 | 9781430267065 |
299 | Advanced Research and Trends in New Technologies, Software, Human–Computer Interaction, and Communicability | Francisco V. Cipolla-Ficarra (ed) | 2014 | 9781466644908 |
300 | Beginning Java 8 APIs, Extensions and Libraries—Swing, JavaFX, JavaScript, JDBC and Network Programming APIs | Kishori Sharan | 2014 | 9781430266617 |
301 | Discovering Knowledge In Data—An Introduction to Data Mining, Second Edition | Daniel T. Larose and Chantal D. Larose | 2014 | 9780470908747 |
302 | The Art of Memory Forensics—Detecting Malware and Threats in Windows, Linux, and Mac Memory | Michael Hale-Ligh, Andrew Case, Jamie Levy and AAron Walters | 2014 | 9781118825099 |
303 | The Architecture Of Computer Hardware, Systems Software, & Networking—An Information Technology Approach, Fifth Edition | Irv Englander | 2014 | 9781118322635 |
304 | Mastering JavaFX 8 Controls | Hendrik Ebbers | 2014 | 9780071833776 |
305 | CEH Certified Ethical Hacker Practice Exams, Second Edition | Matt Walker | 2014 | 9780071838733 |
306 | Feral Information Systems Development—Managerial Implications | Donald Vance Kerr, Kevin Burgess and Luke Houghton | 2014 | 9781466650275 |
307 | Versatile Routing and Services with BGP—Understanding and Implementing BGP in SR-OS | Colin Bookham | 2014 | 9781118875285 |
308 | SQL Server Query Performance Tuning, Fourth Edition | Grant Fritchey | 2014 | 9781430267430 |
309 | Social Media and Mobile Technologies for Healthcare | Mowafa Househ, Elizabeth Borycki and Andre Kushniruk (eds) | 2014 | 9781466661509 |
310 | Predictive Analytics Using Oracle Data Miner—Develop & Use Data Mining Models in Oracle Data Miner, SQL & PL/SQL | Brendan Tierney | 2014 | 9780071821674 |
311 | Mastering 3D Printing | Joan Horvath | 2014 | 9781484200261 |
312 | Interdisciplinary Mobile Media and Communications—Social, Political, and Economic Implications | Xiaoge Xu (ed) | 2014 | 9781466661660 |
313 | Information Security and IT Risk Management | Manish Agrawal, Alex Campoe and Eric Pierce | 2014 | 9781118335895 |
314 | Face Recognition in Adverse Conditions | Maria De Marsico, Michele Nappi and Massimo Tistarelli (eds) | 2014 | 9781466659667 |
315 | CSS Quick Syntax Reference | Mikael Olsson | 2014 | 9781430264903 |
316 | Computer Forensics and Digital Investigation with EnCase Forensic v7 | Suzanne Widup | 2014 | 9780071807913 |
317 | Cloud Computing Applications for Quality Health Care Delivery | Anastasius Moumtzoglou and Anastasia Kastania (eds) | 2014 | 9781466661189 |
318 | Achieving Effective Integrated E-Care beyond the Silos | Ingo Meyer, Sonja Müller and Lutz Kubitschke (eds) | 2014 | 9781466661387 |
319 | Java 8 Recipes, Second Edition | Josh Juneau | 2014 | 9781430268277 |
320 | Incident Response & Computer Forensics, Third Edition | Jason T. Luttgens and Matthew Pepe | 2014 | 9780071798686 |
321 | Big Data Bootcamp What Managers Need to Know to Profit from the Big Data Revolution | David Feinleib | 2014 | 9781484200414 |
322 | Analytics in a Big Data World—The Essential Guide to Data Science and its Applications | Bart Baesens | 2014 | 9781118892701 |
323 | OCA Oracle Database 12c Installation and Administration Exam Guide (Exam 1Z0-062) | John Watson | 2014 | 9780071829236 |
324 | The InfoSec Handbook—An Introduction to Information Security | Umesh Hodeghatta Rao and Umesha Nayak | 2014 | 9781430263821 |
325 | The Art and Style of Product Photography | J. Dennis Thomas | 2014 | 9781118721476 |
326 | OCP Upgrade to Oracle Database 12c Exam Guide (Exam 1Z0-060) | Sam R. Alapati | 2014 | 9780071819978 |
327 | Information Systems and Technology for Organizational Agility, Intelligence, and Resilience | Hakikur Rahman and Rui Dinis de Sousa (eds) | 2014 | 9781466659704 |
328 | Impact of Emerging Digital Technologies on Leadership in Global Business | Peter A.C. Smith and Tom Cockburn (eds) | 2014 | 9781466661349 |
329 | Beginning Python Visualization—Crafting Visual Transformation Scripts, Second Edition | Shai Vaingast | 2014 | 9781484200537 |
330 | Smart SOA Platforms in Cloud Computing Architectures | Ernesto Exposito and Codé Diop | 2014 | 9781848215849 |
331 | Python Algorithms—Mastering Basic Algorithms in the Python Language, Second Edition | Magnus Lie Hetland | 2014 | 9781484200568 |
332 | OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866) | Paul R. Allen and Joseph J. Bambara | 2014 | 9780071826785 |
333 | Network Topology in Command and Control—Organization, Operation, and Evolution | T. J. Grant, R. H. P. Janssen and H. Monsuur (eds) | 2014 | 9781466660588 |
334 | Mike Meyers' CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401) | Dawn Dunkerley and T.J. Samuelle | 2014 | 9780071832144 |
335 | Information Systems for Knowledge Management | Inès Saad, Camille Rosenthal-Sabroux and Faïez Gargouri (eds) | 2014 | 9781848216648 |
336 | Creating Personal, Social, and Urban Awareness through Pervasive Computing | Bin Guo, Daniele Riboni and Peizhao Hu (eds) | 2014 | 9781466646957 |
337 | Cases on Electronic Records and Resource Management Implementation in Diverse Environments | Janice Krueger (ed) | 2014 | 9781466644663 |
338 | Software Architecture 1 | Mourad Chabane Oussalah (ed) | 2014 | 9781848216006 |
339 | Chinese Cybersecurity and Defense | Daniel Ventre (ed) | 2014 | 9781848216143 |
340 | Data Structures and Algorithms in Java, Sixth Edition | Michael T. Goodrich, Roberto Tamassia and Michael H. Goldwasser | 2014 | 9781118771334 |
341 | Cyber Security Management—A Governance, Risk and Compliance Framework | Peter Trim and Yang-Im Lee | 2014 | 9781472432094 |
342 | CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) | Glen E. Clarke | 2014 | 9780071841283 |
343 | AngularJS | Philipp Tarasiewicz and Robin Böhm | 2014 | 9781771970013 |
344 | Android Application Development for the Intel Platform | Ryan Cohen and Tao Wang | 2014 | 9781484201015 |
345 | Introduction to Information Systems—Supporting and Transforming Business, 5th Edition | R. Kelly Rainer Jr., Brad Prince and Casey Cegielski | 2014 | 9781118674369 |
346 | Information Assurance Handbook—Effective Computer Security and Risk Management Strategies | Corey Schou and Steven Hernandez | 2014 | 9780071821650 |
347 | The Essential Guide to Serial ATA and SATA Express | David A. Deming | 2014 | 9781482243314 |
348 | Pro Spring, Fourth Edition | Chris Schaefer, Clarence Ho and Rob Harrop | 2014 | 9781430261513 |
349 | Maintaining and Troubleshooting Your 3D Printer | Charles Bell | 2014 | 9781430268093 |
350 | Javascript & JQuery—Interactive Front-End Web Development | Jon Duckett | 2014 | 9781118531648 |
351 | Information Quality and Governance for Business Intelligence | William Yeoh, John Talburt and Yinle Zhou (eds) | 2014 | 9781466648920 |
352 | Visual Studio Condensed | Patrick Desjardins | 2014 | 9781430268246 |
353 | Smart Manufacturing Innovation and Transformation—Interconnection and Intelligence | Zongwei Luo (ed) | 2014 | 9781466658363 |
354 | Reality Mining-Using Big Data to Engineer a Better World | Nathan Eagle and Kate Greene | 2014 | 9780262027687 |
355 | Multidisciplinary Perspectives in Cryptology and Information Security | Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas (eds) | 2014 | 9781466658080 |
356 | Handbook of Research on Demand–Driven Web Services—Theory, Technologies, and Applications | Zhaohao Sun and John Yearwood (eds) | 2014 | 9781466658844 |
357 | Technological Advancements and the Impact of Actor-Network Theory | Arthur Tatnall (ed) | 2014 | 9781466661264 |
358 | Rethinking the Conceptual Base for New Practical Applications in Information Value and Quality | George Leal Jamil, Armando Malheiro and Armando Malheiro (eds) | 2014 | 9781466645622 |
359 | Information Security in Diverse Computing Environments | Anne Kayem and Christoph Meinel (eds) | 2014 | 9781466661585 |
360 | Enhancing the Human Experience Through Assistive Technologies and E–Accessibility | Christos Kouroupetroglou (ed) | 2014 | 9781466661301 |
361 | Approaches and Processes for Managing the Economics of Information Systems | Theodosios Tsiakis, Theodoros Kargidis and Panagiotis Katsaros (eds) | 2014 | 9781466649835 |
362 | Integrating Social Media into Business Practice, Applications, Management, and Models | In Lee (ed) | 2014 | 9781466661820 |
363 | Handbook of Research on Emerging Advancements and Technologies in Software Engineering | Imran Ghani and Mohammad Nazir Ahmad (eds) | 2014 | 9781466660267 |
364 | Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies | Muhammad Sarfraz (ed) | 2014 | 9781466660304 |
365 | Business Continuity Management: Global Best Practices, Fourth Edition | Andrew Hiles | 2014 | 9781931332354 |
366 | Analytical Approaches to Strategic Decision-Making—Interdisciplinary Considerations | Madjid Tavana (ed) | 2014 | 9781466659582 |
367 | Systems and Software Development, Modeling, and Analysis—New Perspectives and Methodologies | Mehdi Khosrow-Pour (ed) | 2014 | 9781466660984 |
368 | jQuery 2 Recipes — A Problem-Solution Approach | Arun K. Pande | 2014 | 9781430264330 |
369 | Data Science and Simulation in Transportation Research | Davy Janssens, Ansar-Ul-Haque Yasar and Luk Knapen (eds) | 2014 | 9781466649200 |
370 | Data Mining and Analysis in the Engineering Field | Vishal Bhatnagar (ed) | 2014 | 9781466660861 |
371 | A Composer’s Guide to Game Music | Winifred Phillips | 2014 | 9780262026642 |
372 | Cognitive Radio Sensor Networks—Applications, Architectures, and Challenges | Mubashir Husain Rehmani and Yasir Faheem (eds) | 2014 | 9781466662124 |
373 | Beginning Power BI with Excel 2013—Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map | Dan Clark | 2014 | 9781430264453 |
374 | Advancing Embedded Systems and Real-Time Communications with Emerging Technologies | Seppo Virtanen (ed) | 2014 | 9781466660342 |
375 | Time and Relational Theory—Temporal Databases in the Relational Model and SQL | C. J. Date, Hugh Darwen and Nikos A. Lorentzos | 2014 | 9780128006313 |
376 | Optimizing HPC Applications with Intel Cluster Tools | Alexander Supalov, Andrey Semin, Michael Klemm and Christopher Dahnken | 2014 | 9781430264965 |
377 | Innovative Document Summarization Techniques—Revolutionizing Knowledge Understanding | Alessandro Fiori (ed) | 2014 | 9781466650190 |
378 | Game Theory Applications in Network Design | Sungwook Kim (ed) | 2014 | 9781466660502 |
379 | C# Deconstructed—Discover How C# Works on the .NET Framework | Mohammad Rahman | 2014 | 9781430266709 |
380 | Building JavaScript Games—For Phones, Tablets, and Desktop | Arjan Egges | 2014 | 9781430265382 |
381 | Biologically-Inspired Techniques for Knowledge Discovery and Data Mining | Shafiq Alam, Yun Sing Koh and Saeed ur Rehman (eds) | 2014 | 9781466660786 |
382 | Trust, Computing, and Society | Richard H.R. Harper (ed) | 2014 | 9781107038479 |
383 | 10 Don'ts on Your Digital Devices—The Non-Techie's Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach and Eric J. Rzeszut | 2014 | 9781484203682 |
384 | Better Software. Faster!—Best Practices in Virtual Prototyping | Tom De Schutter (ed) | 2014 | 9781617300134 |
385 | Expert Oracle RAC Performance Diagnostics and Tuning | Murali Vallath | 2014 | 9781430267096 |
386 | Fundamentals of Stream Processing—Application Design, Systems, and Analytics | Henrique C. M. Andrade, Buðra Gedik and Deepak S. Turaga | 2014 | 9781107015548 |
387 | Frequent Pattern Mining | Charu C. Aggarwal and Jiawei Han (eds) | 2014 | 9783319078205 |
388 | Secure Smart Embedded Devices, Platforms and Applications | Konstantinos Markantonakis and Keith Mayes (eds) | 2014 | 9781461479147 |
389 | Ways of Knowing in HCI | Judith S. Olson and Wendy A. Kellogg (eds) | 2014 | 9781493903771 |
390 | A Beginner's Guide to Scala, Object Orientation and Functional Programming | John Hunt | 2014 | 9783319067759 |
391 | Distributed Denial of Service Attack and Defense | Shui Yu | 2014 | 9781461494904 |
392 | Cloud Computing Patterns—Fundamentals to Design, Build, and Manage Cloud Applications | Christoph Fehling, Frank Leymann, Ralph Retter, Walter Schupeck and Peter Arbitter | 2014 | 9783709115671 |
393 | JRuby Rails Web Application Development | Deepak Vohra | 2014 | 9783319039336 |
394 | User-Centred Engineering—Creating Products for Humans | Michael Richter and Markus Flückiger | 2014 | 9783662439883 |
395 | Developing Credit Risk Models Using SAS Enterprise Miner and SAS/STAT—Theory and Applications | Iain L. J. Brown | 2014 | 9781612906911 |
396 | High-Performance Computing on the Intel Xeon Phi—How to Fully Exploit MIC Architectures | Endong Wang et al. | 2014 | 9783319064857 |
397 | JMP Essentials—An Illustrated Step-by-Step Guide for New Users, Second Edition | Curt Hinrichs and Chuck Boiler | 2014 | 9781612907857 |
398 | Pro ASP.NET SignalR—Real-Time Communication in .NET with SignalR 2.1 | Keyvan Nayyeri and Darren White | 2014 | 9781430263197 |
399 | Pro Exchange 2013 SP1 PowerShell Administration—For Exchange On-Premises and Office 365 | Jaap Wesselius and Michel de Rooij | 2014 | 9781430268482 |
400 | Wireless Coordinated Multicell Systems—Architectures and Preceding Designs | Duy H.N. Nguyen and Tho Le-Ngoc | 2014 | 9783319063362 |
401 | Expert Oracle Database Architecture, Third Edition | Thomas Kyte and Darl Kuhn | 2014 | 9781430262985 |
402 | Practical LATEX | George Grätzer | 2014 | 9783319064246 |
403 | V14 Certification—Teradata Basics | Tom Coffing and John Nolan | 2014 | B00OQFVUPE |
404 | Large-Scale Data Analytics | Aris Gkoulalas-Divanis and Abderrahim Labbi (eds) | 2014 | 9781461492412 |
405 | Pro iOS Persistence—Using Core Data | Michael Privat and Robert Warner | 2014 | 9781430260288 |
406 | Beginning iOS Media App Development | Ahmed Bakir | 2014 | 9781430250838 |
407 | Oracle RMAN for Absolute Beginners | Darl Kuhn | 2014 | 9781484207642 |
408 | Beginning Apache Cassandra Development | Vivek Mishra | 2014 | 9781484201435 |
409 | Business Analytics Using SAS Enterprise Guide and SAS Enterprise Miner—A Beginner's Guide | Olivia Parr-Rud | 2014 | 9781612907833 |
410 | The Business of iOS App Development—For iPhones, iPads and iPod Touches | Taylor Pierce and Dave Wooldridge | 2014 | 9781430262381 |
411 | Introducing Maven | Balaji Varanasi and Sudha Belida | 2014 | 9781484208427 |
412 | Pro Office 365 Development, Second Edition | Mark J. Collins and Michael Mayberry | 2014 | 9781484202456 |
413 | Ruby Quick Syntax Reference | Matt Clements | 2014 | 9781430265689 |
414 | Advanced Excel Essentials | Jordan Goldmeier | 2014 | 9781484207352 |
415 | Digital Video Concepts, Methods, and Metrics—Quality, Compression, Performance, and Power Trade-off Analysis | Shahriar Akramullah | 2014 | 9781430267126 |
416 | Operating System Concepts Essentials, Second Edition | Abraham Silberschatz, Peter Baer Galvin and Greg Gagne | 2014 | 9781118804926 |
417 | Beginning C++ | Ivor Horton | 2014 | 9781484200087 |
418 | Practical Software Development Techniques—Tools and Techniques for Building Enterprise Software | Edward Crookshanks | 2014 | 9781484207291 |
419 | Pro Python System Administration, Second Edition | Rytis Sileika | 2014 | 9781484202180 |
420 | AutoCAD 2015 and AutoCAD LT 2015—No Experience Required | Donnie Gladfelter | 2014 | 9781118862292 |
421 | Pro Git, Second Edition | Scott Chacon and Ben Straub | 2014 | 9781484200773 |
422 | SysML for Systems Engineering—A Model-Based Approach, 2nd Edition | Jon Holt and Simon Perry | 2014 | 9781849196512 |
423 | 4G—Deployment Strategies and Operational Implications | Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty | 2014 | 9781430263258 |
424 | Canon EOS 70D Digital Field Guide | Charlotte K. Lowrie | 2014 | 9781118169124 |
425 | Experimenting with Raspberry Pi | Warren W. Gay | 2014 | 9781484207703 |
426 | Problem Manager—Careers in IT Service Management | Colin Rudd | 2014 | 9781780172378 |
427 | Programming in C# | Harsh Bhasin | 2014 | 9780198097402 |
428 | Raspberry Pi Hardware Reference | Warren W. Gay | 2014 | 9781484208007 |
429 | Visual Insights—A Practical Guide to Making Sense of Data | Katy Börner and David E. Polley | 2014 | 9780262526197 |
430 | Android Fragments | Dave MacLean and Satya Komatineni | 2014 | 9781484208540 |
431 | Autodesk 3ds Max 2015 Essentials | Randi L. Derakhshani and Dariush Derakhshani | 2014 | 9781118867211 |
432 | C++ Game Development Primer | Bruce Sutherland | 2014 | 9781484208151 |
433 | Eat, Cook, Grow—Mixing Human-Computer Interactions with Human-Food Interactions | Jaz Hee-jeong Choi, Marcus Foth and Greg Hearn (eds) | 2014 | 9780262026857 |
434 | Encyclopedia of Business Analytics and Optimization, Volume I | John Wang (ed) | 2014 | 9781466652026 |
435 | Handbook of Research on Architectural Trends in Service-Driven Computing | Raja Ramanathan and Kirtana Raja (eds) | 2014 | 9781466661783 |
436 | Handbook of Research on Embedded Systems Design | Alessandra Bagnato, Leandro Soares Indrusiak, Imran Rafiq Quadri and Matteo Rossi (eds) | 2014 | 9781466661943 |
437 | Introduction to Machine Learning, Third Edition | 2014 | 9780262028189 | |
438 | Mastering Autodesk Maya 2015 | Todd Palamar | 2014 | 9781118862513 |
439 | Oracle Enterprise Manager 12c Command-Line Interface | Kellyn Pot’Vin, Seth Miller and Ray Smith | 2014 | 9781484202395 |
440 | Raspberry Pi System Software Reference | Warren W. Gay | 2014 | 9781484207970 |
441 | Testing Python—Applying Unit Testing, TDD, BDD, and Acceptance Testing | David Sale | 2014 | 9781118901229 |
442 | Windows 8.1 Tips, Tricks & Shortcuts | Stuart Yarnold | 2014 | 9781840786163 |
443 | Applied Predictive Analytics—Principles and Techniques for the Professional Data Analyst | Dean Abbott | 2014 | 9781118727966 |
444 | Beginning iPhone Development with Swift—Exploring the iOS SDK | David Mark, Jack Nutting, Kim Topley, Fredrik Olsson and Jeff LaMarche | 2014 | 9781484204108 |
445 | Beginning iPhone Development—Exploring the iOS SDK, Seventh Edition | David Mark, Jack Nutting, Kim Topley, Fredrik Olsson and Jeff LaMarche | 2014 | 9781484202005 |
446 | Concept-Oriented Research and Development in Information Technology | Kinji Mori (ed) | 2014 | 9781118478912 |
447 | The Definitive Guide to SUSE Linux Enterprise Server 12 | Sander van Vugt | 2014 | 9781430268215 |
448 | Evernote For Dummies, 2nd Edition | David E. Y. Sarna | 2014 | 9781118855942 |
449 | Professional C++, 3rd Edition | Marc Gregoire | 2014 | 9781118858059 |
450 | SAP ABAP—Hands-On Test Projects with Business Scenarios | Sushil Markandeya and Kaushik Roy | 2014 | 9781430248033 |
451 | Spring Recipes—A Problem-Solution Approach, Third Edition | Marten Deinum, Josh Long, Gary Mak and Daniel Rubio | 2014 | 9781430259084 |
452 | Building an Information Security Awareness Program—Defending against Social Engineering and Technical Threats | Bill Gardner and Valerie Thomas | 2014 | 9780124199675 |
453 | Cryptography and Secure Communication | Richard E. Blahut | 2014 | 9781107014275 |
454 | Developing Information Systems—Practical Guidance for IT Professionals | James Cadle (ed) | 2014 | 9781780172453 |
455 | Migrating to Swift from Android | Sean Liao | 2014 | 9781484204375 |
456 | Advances in Computers, Volume Ninety Four | Ali Hurson (ed) | 2014 | 9780128001615 |
457 | Human-Computer Interfaces and Interactivity—Emergent Research and Applications | Pedro Isaías and Katherine Blashki (eds) | 2014 | 9781466662285 |
458 | Natural Language Generation in Interactive Systems | Amanda Stent and Srinivas Bangalore (eds) | 2014 | 9781107010024 |
459 | Scholarly Information Discovery in the Networked Academic Learning Environment | LiLi Li | 2014 | 9781843347637 |
460 | Foundations of Python Network Programming, Third Edition | Brandon Rhodes and John Goerzen | 2014 | 9781430258544 |
461 | GPS, GLONASS, Galileo, and BeiDou for Mobile Devices | Ivan G. Petrovski | 2014 | 9781107035843 |
462 | Social Engineering in IT Security—Tools, Tactics, and Techniques | Sharon Conheady | 2014 | 9780071818469 |
463 | Algorithmic and Artificial Intelligence Methods for Protein Bioinformatics | Yi Pan, Jianxin Wang and Min Li (eds) | 2014 | 9781118345788 |
464 | AutoCAD Civil 3D 2015 Essentials | Eric Chappell | 2014 | 9781118871027 |
465 | Security Architect—Careers in IT Service Management | Jon Collins | 2014 | 9781780172200 |
466 | Digital Pathology | Yves Sucaet and Wim Waelput | 2014 | 9783319087795 |
467 | Body Sensor Networks, Second Edition | Guang-Zhong Yang (ed) | 2014 | 9781447163732 |
468 | Amazon Redshift—A Columnar Database SQL and Architecture | Tom Coffing and David Cook | 2014 | |
469 | Advanced Backend Code Optimization | Sid Touati and Benoit Dupont de Dinechin | 2014 | 9781848215382 |
470 | Introduction to Software Quality | Gerard O'Regan | 2014 | 9783319061054 |
471 | Data Warehouse Systems—Design and Implementation | Alejandro Vaisman and Esteban Zimányi | 2014 | 9783642546549 |
472 | Transitioning to Swift | Scott Gardner | 2014 | 9781484204078 |
473 | Practical Hadoop Security | Bhushan Lakhe | 2014 | 9781430265443 |
474 | Pervasive Wireless Environments: Detecting and Localizing User Spoofing | Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng | 2014 | 9783319073552 |
475 | Person Re-Identification | Shaogang Gong, Marco Cristani, Shuicheng Yan and Chen Change Loy (eds) | 2014 | 9781447162957 |
476 | Network Science and Cybersecurity | Robinson E. Pino (ed) | 2014 | 9781461475965 |
477 | MongoDB Basics | David Hows, Peter Membrey and Eelco Plugge | 2014 | 9781484208960 |
478 | Big Data—Related Technologies, Challenges and Future Prospects | Min Chen, Shiwen Mao, Yin Zhang and Victor C.M. Leung | 2014 | 9783319062440 |
479 | Agile Risk Management | Alan Moran | 2014 | 9783319050072 |
480 | Foundation ActionScript 3, Second Edition | Darren Richardson and Paul Milbourne | 2014 | 9781484205853 |
481 | Create Web Charts with D3 | Fabio Nelli | 2014 | 9781484208663 |
482 | Continued Rise of the Cloud—Advances and Trends in Cloud Computing | Zaigham Mahmood (ed) | 2014 | 9781447164517 |
483 | Programming Distributed Computing Systems—A Foundational Approach | Carlos A. Varela | 2013 | 9780262018982 |
484 | IT Sustainability for Business Advantage | Brian Moore | 2013 | 9781606494158 |
485 | Pro Puppet, Second Edition | Spencer Krum, William Van Hevelingen, Ben Kero, James Turnbull and Jeffery McCune | 2013 | 9781430260400 |
486 | So You've Inherited A Visual FoxPro Application – Now What? | Whil Hentzen | 2013 | |
487 | Intelligent Technologies and Techniques for Pervasive Computing | Kostas Kolomvatsos, Christos Anagnostopoulos and Stathes Hadjiefthymiades (eds) | 2013 | 9781466640382 |
488 | Efficiency and Scalability Methods for Computational Intellect | Boris Igelnik and Jacek M. Zurada (eds) | 2013 | 9781466639423 |
489 | Dealing with Reserved Words Used as Data Names in a Visual FoxPro Application | Whil Hentzen | 2013 | |
490 | Certified Agile Tester (CAT) 348 Success Secrets—348 Most Asked Questions On Certified Agile Tester (CAT)—What You Need To Know | Tammy Quinn | 2013 | 9781488524387 |
491 | Electronic Health Record—Standards, Coding Systems, Frameworks, and Infrastructures | Pradeep Sinha et al. | 2013 | 9781118281345 |
492 | Pro Oracle SQL, Second Edition | Karen Morton, Kerry Osborne, Robyn Sands, Riyaj Shamsudeen and Jared Still | 2013 | 9781430262206 |
493 | Oracle Exadata Survival Guide | David Fitzjarrell and Mary Mikell Spence | 2013 | 9781430260103 |
494 | Metro Ethernet Services for LTE Backhaul | Roman Krzanowski | 2013 | 9781608076857 |
495 | IT Career FastTrack with CompTIA A+ Certification—Your Complete Study Guide for Exams 220-801/802 | GTS Learning | 2013 | 9781840053135 |
496 | Integrated Management of Processes and Information | Kenneth A. Shaw | 2013 | 9781606494448 |
497 | Green Communications—Theoretical Fundamentals, Algorithms and Applications | Jinsong Wu, Sundeep Rangan and Honggang Zhang | 2013 | 9781466501072 |
498 | Software Product Quality Control | Stefan Wagner | 2013 | 9783642385704 |
499 | Enterprise Architecture at Work—Modelling, Communication and Analysis, Third Edition | Marc Lankhorst et al. | 2013 | 9783642296505 |
500 | Computer Science Illuminated, Fifth Edition | Nell Dale and John Lewis | 2013 | 9781449672843 |
501 | Seamless R and C++ Integration with Rcpp | Dirk Eddelbuettel | 2013 | 9781461468677 |
502 | Real-Time C++—Efficient Object-Oriented and Template Microcontroller Programming | Christopher Michael Kormanyos | 2013 | 9783642346873 |
503 | Mobile Payment | 2013 | 9783658032500 | |
504 | Big Data-A Business and Legal Guide | James R. Kalyvas and Michael R. Overly | 2013 | 9781466592377 |
505 | TechSmith Camtasia Studio 8—The Essentials | Kevin Siegel | 2013 | 9781932733532 |
506 | Game Analytics—Maximizing the Value of Player Data | Magy Seif El-Nasr, Anders Drachen and Alessandro Canossa | 2013 | 9781447147688 |
507 | Data Center Networks—Topologies, Architectures and Fault-Tolerance Characteristics | Yang Liu, Jogesh K. Muppala, Dong Lin and Mounir Hamdi | 2013 | 9783319019482 |
508 | Software Engineering Frameworks for the Cloud Computing Paradigm | Zaigham Mahmood and Saqib Saeed (eds) | 2013 | 9781447150305 |
509 | Wireless Virtualization | Heming Wen, Prabhat Kumar Tiwary and Tho Le-Ngoc | 2013 | 9783319012902 |
510 | Case-Based Reasoning—A Textbook | Michael M. Richter and Rosina O. Weber | 2013 | 9783642401664 |
511 | Concurrent Programming—Algorithms, Principles, and Foundations | Michel Raynal | 2013 | 9783642320262 |
512 | Decision Forests for Computer Vision and Medical Image Analysis | A. Criminisi and J. Shotton (eds) | 2013 | 9781447149286 |
513 | Enterprise Information Management—When Information Becomes Inspiration | Paul Baan (ed) | 2013 | 9781461452355 |
514 | Requirements Engineering and Management for Software Development Projects | Murali Chemuturi | 2013 | 9781461453765 |
515 | Time-of-Flight Cameras—Principles, Methods and Applications | Miles Hansard, Seungkyu Lee, Ouk Choi and Radu Horaud | 2013 | 9781447146575 |
516 | Compiler Design | K. Muneeswaran | 2013 | 9780198066644 |
517 | Programming with Mathematica—An Introduction | Paul Wellin | 2013 | 9781107009462 |
518 | Computer Fundamentals and Programming in C, Second Edition | Pradip Dey and Manas Ghosh | 2013 | 9780198084563 |
519 | Bluetooth Security Attacks—Comparative Analysis, Attacks, and Countermeasures | Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen and Pekka Toivanen | 2013 | 9783642406454 |
520 | Understanding Petri Nets—Modeling Techniques, Analysis Methods, Case Studies | Wolfgang Reisig | 2013 | 9783642332777 |
521 | Performance Analysis of Computer Networks | 2013 | 9783319016450 | |
522 | Modern Cryptography Primer—Theoretical Foundations and Practical Applications | Czeslaw Koscielny, Miroslaw Kurkowski and Marian Srebrny | 2013 | 9783642413858 |
523 | Enterprise Systems Integration—A Process-Oriented Approach | Diogo R. Ferreira | 2013 | 9783642407956 |
524 | Orchestrating Human-Centered Design | Guy André Boy | 2013 | 9781447143383 |
525 | Consumer Depth Cameras for Computer Vision—Research Topics and Applications | Andrea Fossati, Juergen Gall, Xiaofeng Ren and Kurt Konolige (eds) | 2013 | 9781447146391 |
526 | Botnets | Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla and Peter Martini | 2013 | |
527 | How to Get Paid (Software Developer Business Series) | Whil Hentzen | 2012 | |
528 | Implementing Successful Building Information Modeling | Erika Epstein | 2012 | 9781608071395 |
529 | RFID Design Principles, Second Edition | Harvey Lehpamer | 2012 | 9781608074709 |
530 | Net Smart-How to Thrive Online | Howard Rheingold | 2012 | 9780262017459 |
531 | The Algorithm Design Manual, Second Edition | Steven S. Skiena | 2012 | 9781848000698 |
532 | Data Structures Using C++ | Varsha H. Patil | 2012 | 9780198066231 |
533 | An Introduction to Formal Languages and Automata, Fifth Edition | Peter Linz | 2012 | 9781449615529 |
534 | Boosting—Foundations and Algorithms | Robert E. Schapire and Yoav Freund | 2012 | 9780262017183 |
535 | Mac OS X Snow Leopard for Power Users—Advanced Capabilities and Techniques | Scott Granneman | 2010 | 9781430230304 |
536 | High-Technology Crime Investigator's Handbook—Establishing and Managing a High-Technology Crime Prevention Program, Second Edition | Gerald L. Kovacich and Andy Jones | 2006 | 9780750679299 |
0 comments:
Post a Comment
Place Your Comments Here