Elsevier E‐book Collection: Computer Science 2011    1. 2.

advertisement
 Elsevier E‐book Collection: Computer Science 2011 1.
2.
3.
Edelkamp, Stefan
Serpanos, Dimitrios
4.
5.
6.
7.
8.
West, Matthew
Sherman, Paul
Kolko, Jon
Han, Jiawei
Sennewald,
Charles
Teorey, Toby
Little, Karen
Resmini, Andrea
Wigdor, Dennis
Unger, Russ
Smoot, Stephen
Joseph, Vinod
Witten, Ian
9.
10.
11.
12.
13.
14.
15.
16.
17. Reddy, Martin
18.
Betz, Charles
19. Tupper, Charles
20. Friedenthal,
Sanford
21. Levialdi
22. Koskinen, Ilpo
23. Gharajedaghi,
Jamshid
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
Allemang, Dean
Nemeth, Charles
Weilkiens, Tim
Kadinger, Christina
Griffith, Christopher
Watkins, Adam
Mullen, Timothy
Murr, Mike
Winkler, J.R. ("Vic")
Heiderich, Mario
Wheeler, Evan
Cherry, Denny
Chuvakin, Anton
Daniel, Larry
Knapp, Eric
Laszewski, Tom
Andress, Jason
Engebretson,
Patrick
Hoog, Andrew
Sammons, John
Wiles, Jack
Dinkar, Sitaram
Heuristic Search
Architecture of Network Systems
Data Mining: Practical Machine Learning Tools and
Techniques
Developing High Quality Data Models
Adapting User Experience for Global Projects
Thoughts on Interaction Design
Data Mining: Concepts and Techniques
2011
2011
2011
2011
2011
2011
Effective Security Management
2011
Database Modeling and Design
Electronic Access Control
Pervasive Information Architecture
Brave NUI World
Guerilla UX Research Methods
Private Cloud Computing
Deploying Next Generation Multicast-enabled Applications
GPU Computing Gems
API Design for C++
Architecture and Patterns for IT Service Management,
Resource Planning, and Governance: Making Shoes for the
Cobbler's Children
Data Architecture
2011
2011
2011
2011
2011
2011
2011
2011
2011
A Practical Guide to SysML
2011
Visual Cues, Contexts and Channels
Design Research through Practice
2011
2011
Systems Thinking
2011
GPU Computing Gems Jade Edition
Semantic Web for the Working Ontologist
Private Security and the Law
OCEB Certification Guide
Social Game Design
Real-World Flash Game Development
Creating Games with Unity and Maya
Thor's Microsoft Security Bible
Human Compromise
Securing the Cloud
Web Application Obfuscation
Security Risk Management
Securing SQL Server
Logging and Log Management
Digital Forensics for Legal Professionals
Industrial Network Security
Migrating to the Cloud
The Basics of Information Security
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
2011
The Basics of Hacking and Penetration Testing
2011
iPhone and iOS Forensics
The Basics of Digital Forensics
Low Tech Hacking
Moving To The Cloud
2011
2011
2011
2011
2011
2011
2011
Download