Multimedia over IP and Wireless Networks. Effective Prototyping for Software Makers. Physical Database Design.
Geometric Algebra for Computer Science. High-Performance Embedded Computing. Letting Go of the Words. Customizable Embedded Processors. Probabilistic Methods for Financial and Marketing Informatics. IPv6 Advanced Protocols Implementation. Network Analysis, Architecture, and Design. Digital Design and Computer Architecture. Visualization in Medicine. User-Centered Design Stories. Strategic Security Management. The Profit Impact of Business Intelligence. Practical Model-Based Testing.
ESL Design and Verification. UML 2 Certification Guide. Business Process Change. IPv6 Core Protocols Implementation.
On chip communication architectures sudeep pasricha pdf to excel
The History of Information Security. Deane, Gunther Brenner, A. Periaux, N. Satofuka, Damien Tromeur-Dervout.
New Citation Alert added!
Parallel Computational Fluid Dynamics Wireless Networking Technology. Data Mining and Predictive Analysis. Security Operations Management, 2nd ed.
Integrated Security Systems Design. The Art of War for Security Managers. Electronic Security Systems. Secure Roaming in Developing Practical Wireless Applications.
Oracle 10g Developing Media Rich Applications. Microsoft Windows Security Fundamentals. Oracle Performance Tuning for 10gR2. Microsoft Outlook Programming. Computational Intelligence. System Level Design with Rosetta. Syngress Force Emerging Threat Analysis. Developer's Guide to Web Application Security.
Snort Intrusion Detection and Prevention Toolkit. Network Security Assessment. Cryptography for Developers. Virtualization with Microsoft Virtual Server WarDriving and Wireless Penetration Testing. Secure Your Network for Free. Enemy at the Water Cooler. Cyber Crime Investigations. How to Cheat at Configuring Exchange Server Cross Site Scripting Attacks.
Network On Chip Router Micro-Architecture
Alternate Data Storage Forensics. Zen and the Art of Information Security. Perl Scripting for Windows Security. How to Cheat at Microsoft Vista Administration. Open Source Fuzzing Tools.
Practical Oracle Security. Digital Modeling of Material Appearance. Architecture Design for Soft Errors. Reconfigurable Computing.
Verification Techniques for System-Level Design. Wireless Sensor and Actuator Networks. Microscope Image Processing. Digital Watermarking and Steganography.
Semantic Web for the Working Ontologist. Measuring the User Experience. Information Modeling and Relational Databases. Microsoft SharePoint Technologies.
Business Metadata: Capturing Enterprise Knowledge. On-Chip Communication Architectures.
New Citation Alert!
System-on-Chip Test Architectures. Evaluating Children's Interactive Products. Aspect-Oriented Programming with the e Verification Language. Processor Description Languages.
Executing Data Quality Projects. Practical Guide to SysML. Network Security: Know It All. Digital Signal Processing System Design. Handbook of Knowledge Representation. Information Flow and Knowledge Sharing. Designing Storage for Exchange SP1. Microsoft Exchange Server with SP1.
Google Hacking for Penetration Testers.
How to Cheat at Securing Linux. Nessus Network Auditing. Web Application Vulnerabilities. InfoSecurity Threat Analysis.
How to Cheat at Securing Your Network. Managing Catastrophic Loss of Sensitive Data.
Microsoft Forefront Security Administration Guide. OS X Exploits and Defense. Secrets Stolen, Fortunes Lost. Nagios 3 Enterprise Network Monitoring.
Scene of the Cybercrime. Securing Windows Server Securing Citrix Presentation Server in the Enterprise. Effective Prototyping with Excel. Probabilistic Methods for Bioinformatics. Building Intelligent Interactive Tutors.