Books
  • GFI Network Security and PCI Compliance Power Tools
  • The Profit Impact of Business Intelligence
  • Next Generation SSH2 Implementation
  • Numerical Methods in Biomedical Engineering
  • Analog Circuits Cookbook
  • Stealing the Network: How to Own an Identity
  • Curves and Surfaces for CAGD
  • Nmap in the Enterprise
  • Applications of NMR Spectroscopy: Volume 1
  • Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
  • Structural Dynamics Fundamentals and Advanced Applications, Volume II
  • Knowledge Representation and Reasoning
  • Our Wired Nerves
  • Recent Developments in Bioenergy Research
  • A Librarian's Guide to Graphs, Data and the Semantic Web
  • Understanding Virtual Reality
  • Interpretation of Micromorphological Features of Soils and Regoliths
  • Nutraceuticals
  • Applications of Nonlinear Fiber Optics
  • Joe Celko's SQL for Smarties
  • An Introduction to Healthcare Informatics
  • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
  • The Prefrontal Cortex
  • Urban Ecology
  • Veterinary Toxicology
  • The System Designer's Guide to VHDL-AMS
  • Insect-Borne Diseases in the 21st Century
  • Carbon Nanomaterial-Based Adsorbents for Water Purification
  • Transcription Factors for Abiotic Stress Tolerance in Plants
  • Designing Embedded Systems with PIC Microcontrollers
  • E-Mail Virus Protection Handbook
  • Small Antenna Design
  • Geotechnical Engineering Calculations and Rules of Thumb
  • Handbook of Waterborne Coatings
  • Digital Logic Design
  • Guided Wave Optical Components and Devices
  • Studies in Natural Products Chemistry
  • Molecular Mechanisms of Dementia
  • Multimedia Communications
  • Magnetic Bearings and Bearingless Drives
  • Electrical Engineer's Reference Book
  • Microsoft Outlook 2007 Programming
  • Tuberculous Meningitis
  • Evidence Found
  • Fundamental Data Compression
  • DSP Software Development Techniques for Embedded and Real-Time Systems
  • Dynamic Analysis of Structures
  • Experiments and Modeling in Cognitive Science
  • The Rat Nervous System
  • Neuroeconomics
  • Wireless Networking
  • Digital Media Steganography
  • Executing Data Quality Projects
  • Colorectal Neoplasia and the Colorectal Microbiome
  • Web Application Design Patterns
  • Autism 360°
  • Diagnosis and Management in Dementia
  • Web Application Design Handbook
  • Structural Dynamics Fundamentals and Advanced Applications, Volume I
  • New and Future Developments in Microbial Biotechnology and Bioengineering
  • Statistics in Medicine
  • Audio Engineering: Know It All
  • Genetics, Neurology, Behavior, and Diet in Parkinson's Disease
  • Power Plants and Power Systems Control 2006
  • Stabilization and Dynamic of Premixed Swirling Flames
  • Concentrating Solar Power Technology
  • Advances in Mathematical Chemistry and Applications: Volume 2
  • Op Amps: Design, Application, and Troubleshooting
  • Regional Geology and Tectonics: Principles of Geologic Analysis
  • Handbook of Toxicology of Chemical Warfare Agents
  • Modern Component Families and Circuit Block Design
  • SQL Injection Attacks and Defense
  • Zigbee Wireless Networking
  • From Molecules to Networks
  • Fiber Optic Measurement Techniques
  • Surface Acoustic Wave Devices and Their Signal Processing Applications
  • Pyramid Algorithms
  • Stealing The Network
  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
  • Essential Mathcad for Engineering, Science, and Math w/ CD
  • Constraint Processing
  • Modern Batteries
  • Handbook of Chitin and Chitosan
  • Studies in Natural Products Chemistry
  • Handbook of Reward and Decision Making
  • Biomedical Signal Processing and Artificial Intelligence in Healthcare
  • ARM System Developer's Guide
  • Network Algorithmics
  • Ethernet Networking for the Small Office and Professional Home Office
  • Graphics Gems V (IBM Version)
  • Practical Digital Signal Processing
  • New and Future Developments in Microbial Biotechnology and Bioengineering
  • FISMA Certification and Accreditation Handbook
  • PCI Compliance
  • The Mediterranean Diet
  • Encapsulation of Active Molecules and Their Delivery System
  • Understanding Your Users
  • The Real Citrix CCA Exam Preparation Kit
  • Introduction to Mineralogy and Petrology
  • Deploying QoS for Cisco IP and Next Generation Networks
  • Semantic Web for the Working Ontologist
  • Understanding Engineering Mathematics
  • XBOX 360 Forensics
  • Principles of Regenerative Medicine
  • X-Ways Forensics Practitioner's Guide
  • Managing Data in Motion
  • Mobile User Experience
  • Client-Side Attacks and Defense
  • Robert Lacoste's The Darker Side
  • Separation of Flow
  • User Experience in the Age of Sustainability
  • Android Forensics
  • Eye Tracking in User Experience Design
  • Mobile WiMAX
  • Nutrition, Digestion, Metabolism
  • Human-Computer Interaction
  • Health Education and the Media II
  • The Basics of Digital Forensics
  • Principles of Big Data
  • Eleventh Hour CISSP
  • Data Architecture
  • Mims Circuit Scrapbook V.I.
  • Neural Communication and Control
  • CUDA Fortran for Scientists and Engineers
  • Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE
  • Managing Information Security
  • The Case for the Chief Data Officer
  • Design Research Through Practice
  • Back to Basics Audio
  • Killing Public Higher Education
  • Lexical Ambiguity Resolution
  • Thor's Microsoft Security Bible
  • AVR RISC Microcontroller Handbook
  • Independent Generation of Electric Power
  • Linear Algebra
  • Joe Celko's Data, Measurements and Standards in SQL
  • Advanced Persistent Threat
  • Seven Deadliest Network Attacks
  • CISSP Study Guide
  • Making Enterprise Information Management (EIM) Work for Business
  • Dynamic Modelling of Information Systems
  • API Design for C++
  • Oxygen Transport to Tissue
  • Brainstorming and Beyond
  • Nature-Inspired Optimization Algorithms
  • Commercial Data Mining
  • Commentaries in the Neurosciences
  • Computation and Storage in the Cloud
  • Letting Go of the Words
  • Renewable Energy Systems
  • Probabilistic Methods for Bioinformatics
  • Measuring Circuits
  • Peripheral Vascular Surgery
  • Development of Responsiveness to Steroid Hormones
  • Optically Amplified WDM Networks
  • Product Manufacturing and Cost Estimating using CAD/CAE
  • Transnational Corporations, Technology Transfer and Development
  • Information Security Risk Assessment Toolkit
  • Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
  • SQL Injection Attacks and Defense
  • Web Services, Service-Oriented Architectures, and Cloud Computing
  • CompTIA Network+ Certification Study Guide: Exam N10-004
  • Mental and Neurological Public Health
  • Database Modeling and Design
  • Windows Forensic Analysis Toolkit
  • Interview Techniques for UX Practitioners
  • The Practitioner's Guide to Data Quality Improvement
  • The Basics of Hacking and Penetration Testing
  • Multifunction Peripherals for PCs
  • GPU Computing Gems Emerald Edition
  • The Essential Persona Lifecycle
  • MATLAB® by Example
  • Heterogeneous Computing with OpenCL
  • Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
  • Principles of Transistor Circuits
  • Disappearing Cryptography
  • Physically Based Rendering
  • Developing Virtual Reality Applications
  • Information Management
  • Liver Disorders in Childhood
  • Coding for Penetration Testers
  • It's Our Research
  • Heuristic Search
  • Handbook of Human-Computer Interaction
  • Basic Radio
  • Windows Forensic Analysis DVD Toolkit
  • Intersection
  • CUDA Programming
  • Understanding AC Circuits
  • Measuring Data Quality for Ongoing Improvement
  • The Basics of Information Security
  • Handbook on Securing Cyber-Physical Critical Infrastructure
  • Business Intelligence Guidebook
  • There's Not an App for That
  • Federal Cloud Computing
  • Central Adrenaline Neurons
  • The Handbook of Global User Research
  • OCEB Certification Guide
  • Collaborative Enterprise Architecture
  • A Handbook of Clinical Genetics
  • Embedded Systems Design with Platform FPGAs
  • Probabilistic Reasoning in Intelligent Systems
  • Computer and Information Security Handbook
  • Computer Incident Response and Forensics Team Management
  • Computer Animation Complete
  • Network and System Security
  • Cyber Security and IT Infrastructure Protection
  • IT Manager's Handbook
  • Hacking with Kali
  • Moving To The Cloud
  • Cybercrime Investigation Case Studies
  • Occupational Health Practice
  • How to Build a Digital Library
  • Systems Thinking
  • Cybercrime and Espionage
  • Psychophysiology
  • CISSP Study Guide
  • VHDL 101
  • Microsoft Windows Server 2008 R2 Administrator's Reference
  • Visual Computing for Medicine
  • A Practical Guide to SysML
  • Visual Usability
  • Applied Respiratory Physiology
  • The Germination of Seeds
  • Content Strategy at Work
  • Cybercrime Investigative Case Management
  • Private Cloud Computing
  • Using Open Source Platforms for Business Intelligence
  • The Geological Evolution of Australia & New Zealand
  • Mechanical Engineer's Reference Book
  • Endocrinology Neuroendocrinology Neuropeptides
  • Fluid Mechanics
  • Professional Penetration Testing
  • Thoughts on Interaction Design
  • The Art and Science of Analyzing Software Data
  • FORTRAN 90 for Scientists and Engineers
  • Applied Network Security Monitoring
  • Augmented Reality
  • Vectors in Two or Three Dimensions
  • Total Information Risk Management
  • Newnes TV and Video Engineer's Pocket Book
  • Principles of Data Integration
  • Mission-Critical and Safety-Critical Systems Handbook
  • Enterprise Applications Administration
  • The Hacker's Guide to OS X
  • Cyber Warfare
  • Practical Paediatric Nutrition
  • Logging and Log Management
  • Data Warehousing in the Age of Big Data
  • Low Tech Hacking
  • Computational Methods in Engineering
  • Securing SQL Server
  • Applied Cyber Security and the Smart Grid
  • IT Manager's Handbook: The Business Edition
  • Structured Parallel Programming
  • Detection of Signals in Noise
  • Blackhatonomics
  • Agile User Experience Design
  • The Basics of Web Hacking
  • Smart Things
  • Platform Ecosystems
  • High Speed Digital Design
  • Respiration
  • Practical Lock Picking
  • Using Information to Develop a Culture of Customer Centricity
  • Anatomy and Human Movement
  • Digital Forensics for Legal Professionals
  • Probability Theory and Mathematical Statistics for Engineers
  • Data Insights
  • Practical Lock Picking
  • M Programming: A Comprehensive Guide
  • Agile Data Warehousing Project Management
  • Transaction Processing
  • Social Media Security
  • Security Risk Management
  • Transformers and Motors
  • The Moderator's Survival Guide
  • Mathematical Modelling
  • Stem Cells
  • Semiconductor Optoelectronic Devices
  • Entity Resolution and Information Quality
  • Migrating to the Cloud
  • Windows Registry Forensics
  • Placing the Suspect Behind the Keyboard
  • Industrial Network Security
  • Microsomes and Drug Oxidations
  • High Voltage Test Techniques
  • Risk Management Framework
  • Genetics, Structure and Function of Blood Cells
  • Digital Video and HD
  • Cyber Warfare
  • The Theory and Practice of Vocational Guidance
  • Groups - Modular Mathematics Series
  • Medical Physiology
  • Business Continuity and Disaster Recovery Planning for IT Professionals
  • Fuels, Furnaces and Refractories
  • Software Engineering
  • User Experience Re-Mastered
  • Cellular Analogues of Conditioning and Neural Plasticity
  • Adaptive Systems in Control and Signal Processing 1983
  • Penetration Tester's Open Source Toolkit
  • Microcontroller Cookbook
  • Wireless Networking Complete
  • Agile Data Warehousing for the Enterprise
  • Distributed Computing Through Combinatorial Topology
  • Handbook of Systems Biology
  • Managing Time in Relational Databases
  • Design for Emotion
  • A Discipline of Software Engineering
  • Pascal for Students (including Turbo Pascal)
  • Malware Forensics Field Guide for Linux Systems
  • Quotient Space Based Problem Solving
  • Physiology of Ticks
  • Joe Celko's SQL for Smarties
  • Joe Celko's Trees and Hierarchies in SQL for Smarties
  • The Digital Crown
  • Principles of Tissue Engineering
  • Ordinary Differential Equations
  • Statistical Signal Processing for Neuroscience and Neurotechnology
  • A Physiological Approach to Clinical Neurology
  • Mathematics for the General Course in Engineering
  • Diverticular Disease of the Colon
  • Simplified Design of Data Converters
  • Cardiovascular Physiology: Microcirculation and Capillary Exchange
  • The Basics of Cyber Warfare
  • No Code Required
  • CSA Guide to Cloud Computing
  • SAE and the Evolved Packet Core
  • Digital Signal Processing 101
  • MIMO
  • Design Theory and Methods using CAD/CAE
  • Agile Software Architecture
  • Cybercrime Case Presentation
  • Keys to the Kingdom
  • Architecture of Network Systems
  • Data Virtualization for Business Intelligence Systems
  • Forrest Mims Engineer's Notebook
  • Culture, Health and Illness
  • Joe Celko's Complete Guide to NoSQL
  • Social Data Analytics
  • Scalable VoIP Mobility
  • Windows Performance Analysis Field Guide
  • GPU Computing Gems Jade Edition
  • Networked Graphics
  • Proceedings of the Fourth International Congress on Hormonal Steroids
  • Parallel Programming with OpenACC
  • Network and System Security
  • CompTIA Security+ Certification Study Guide
  • Optical Networks
  • Implementing Analytics
  • FISMA and the Risk Management Framework
  • Writing for Interaction
  • Product Design Modeling using CAD/CAE
  • FISMA Compliance Handbook
  • Analysis
  • Agile Development and Business Goals
  • Assessing Vendors
  • Steroid Hormone Regulation of the Brain
  • User Experience Management
  • Discover Digital Libraries
  • Eye Diseases in Hot Climates
  • UTM Security with Fortinet
  • UI is Communication
  • Credible Checklists and Quality Questionnaires
  • Malware Forensics Field Guide for Windows Systems
  • Techniques in Bioproductivity and Photosynthesis
  • Tall Buildings
  • Object-Oriented Analysis and Design for Information Systems
  • Windows Forensic Analysis Toolkit
  • Writing Effective Business Rules
  • Understanding Augmented Reality
  • Modern Dictionary of Electronics
  • Interconnecting Smart Objects with IP
  • Homeostasis in Injury and Shock
  • Evaluation of Quality of Care in Psychiatry
  • Business Intelligence
  • Demystifying Embedded Systems Middleware
  • Introduction to Infrared and Raman Spectroscopy
  • Oracle Real Application Clusters
  • Conformal Prediction for Reliable Machine Learning
  • Analyzing the Social Web
  • Interfacing with C
  • OFDM for Optical Communications
  • Application Administrators Handbook
  • Autonomic Network Management Principles
  • CUDA Application Design and Development
  • Occupational Health Practice
  • Oscillator Circuits
  • Knowledge-Based Configuration
  • Software Defined Networks
  • The Basics of Hacking and Penetration Testing
  • Pattern Recognition and Machine Learning
  • Designing the Search Experience
  • Handbook of Visual Communications
  • 3C Vision
  • Metrics and Methods for Security Risk Management
  • Global UX
  • Windows 2012 Server Network Security
  • Renewable Energy Technologies
  • Paradigms of Artificial Intelligence Programming
  • Intel Xeon Phi Coprocessor High Performance Programming
  • Regulatory Functions of the CNS Subsystems
  • The Basics of Cyber Safety
  • Developing High Quality Data Models
  • User Interface Inspection Methods
  • Face Detection and Recognition on Mobile Devices
  • Security Electronics Circuits Manual
  • Architecture and Patterns for IT Service Management, Resource Planning, and Governance
  • Heterogeneous Computing with OpenCL
  • The Basics of Cloud Computing
  • Sketching User Experiences: The Workbook
  • Lens Design Fundamentals
  • Handbook of Blind Source Separation
  • Brain and Behaviour
  • Factors Influencing Adrenergic Mechanisms in the Heart
  • Freemium Economics
  • Securing SQL Server
  • Electronics Explained
  • Programmable Logic Controllers
  • Pervasive Information Architecture
  • Seven Deadliest USB Attacks
  • The Wireshark Field Guide
  • Practical Web Analytics for User Experience
  • Community Care for Health Professionals
  • Physiotherapy in Mental Health
  • Network Intrusion Analysis
  • Digital Forensics Processing and Procedures
  • Plan, Activity, and Intent Recognition
  • Understanding Motion Capture for Computer Animation
  • Design Patterns for Embedded Systems in C
  • Mastering Cloud Computing
  • Deploying Next Generation Multicast-enabled Applications
  • Passive and Low Energy Architecture
  • Hardware/Firmware Interface Design
  • Securing the Cloud
  • Surface Mount Technology Terms and Concepts
  • Digital Forensics with Open Source Tools
  • The Complete Business Process Handbook
  • Corrosion Under Insulation (CUI) Guidelines
  • Service Orchestration as Organization
  • Successful User Experience: Strategies and Roadmaps
  • Embedded Computing for High Performance
  • Global Logistics Network Modelling and Policy
  • Preserving Electronic Evidence for Trial
  • PCI DSS 3.1
  • Approaches to the Purification, Analysis and Characterization of Antibody-Based Therapeutics
  • Microbiomes and Plant Health
  • Predictive Analytics and Data Mining
  • Improving the User Experience through Practical Data Analytics
  • How to Defeat Advanced Malware
  • Software Quality Assurance
  • Topics in Parallel and Distributed Computing
  • Model Answers in Ordinary National Certificate Mathematics for Engineers
  • Introduction to Medical Laboratory Technology
  • Data Breach Preparation and Response
  • Windows Registry Forensics
  • Cell Structure and Function by Microspectrofluorometry
  • A Practical Guide to SysML
  • Disorders of the Cervical Spine
  • Welding for Challenging Environments
  • Emerging Trends in Image Processing, Computer Vision and Pattern Recognition
  • RNA-Based Regulation in Human Health and Disease
  • Vibration Fatigue by Spectral Methods
  • The Illustrated Network
  • Advances in Clean Energy Technologies
  • Software Development with C++
  • Software and System Development using Virtual Platforms
  • Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications
  • Division of Labor in Cells
  • Topological UML Modeling
  • Network Processors
  • Fundamentals of Optimization Techniques with Algorithms
  • Viscoelasticity and Rheology
  • Ultrasonic Sectional Anatomy
  • Genetics and Neurology
  • Algorithmic Trading Methods
  • Information Processing in Children
  • Big Data Analytics
  • Python Passive Network Mapping
  • Presumptive Design
  • Continuous Architecture
  • Process Modeling Style
  • Intra- and Intermolecular Interactions between Non-covalently Bonded Species
  • Dentine Hypersensitivity
  • Introduction to Social Media Investigation
  • Soft Numerical Computing in Uncertain Dynamic Systems
  • OS X Incident Response
  • Atlas of the Ultrastructure of Diseased Human Muscle
  • Psychodynamics, Training, and Outcome in Brief Psychotherapy
  • Applications of Artificial Intelligence Techniques in the Petroleum Industry
  • Introduction to the Constraints-Led Approach
  • pH-Interfering Agents as Chemosensitizers in Cancer Therapy
  • Fuzzy Sets and Systems
  • Introduction to Geological Maps and Structures
  • Recent Progress in Hormone Research
  • X-Ray Anatomy
  • Microgrid
  • Consumer, Prosumer, Prosumager
  • Smart Grid
  • Meeting People via WiFi and Bluetooth
  • More books
    1018