Elsevier E‐book Collection: Computer Science 2011 1. 2. 3. Edelkamp, Stefan Serpanos, Dimitrios 4. 5. 6. 7. 8. West, Matthew Sherman, Paul Kolko, Jon Han, Jiawei Sennewald, Charles Teorey, Toby Little, Karen Resmini, Andrea Wigdor, Dennis Unger, Russ Smoot, Stephen Joseph, Vinod Witten, Ian 9. 10. 11. 12. 13. 14. 15. 16. 17. Reddy, Martin 18. Betz, Charles 19. Tupper, Charles 20. Friedenthal, Sanford 21. Levialdi 22. Koskinen, Ilpo 23. Gharajedaghi, Jamshid 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. Allemang, Dean Nemeth, Charles Weilkiens, Tim Kadinger, Christina Griffith, Christopher Watkins, Adam Mullen, Timothy Murr, Mike Winkler, J.R. ("Vic") Heiderich, Mario Wheeler, Evan Cherry, Denny Chuvakin, Anton Daniel, Larry Knapp, Eric Laszewski, Tom Andress, Jason Engebretson, Patrick Hoog, Andrew Sammons, John Wiles, Jack Dinkar, Sitaram Heuristic Search Architecture of Network Systems Data Mining: Practical Machine Learning Tools and Techniques Developing High Quality Data Models Adapting User Experience for Global Projects Thoughts on Interaction Design Data Mining: Concepts and Techniques 2011 2011 2011 2011 2011 2011 Effective Security Management 2011 Database Modeling and Design Electronic Access Control Pervasive Information Architecture Brave NUI World Guerilla UX Research Methods Private Cloud Computing Deploying Next Generation Multicast-enabled Applications GPU Computing Gems API Design for C++ Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children Data Architecture 2011 2011 2011 2011 2011 2011 2011 2011 2011 A Practical Guide to SysML 2011 Visual Cues, Contexts and Channels Design Research through Practice 2011 2011 Systems Thinking 2011 GPU Computing Gems Jade Edition Semantic Web for the Working Ontologist Private Security and the Law OCEB Certification Guide Social Game Design Real-World Flash Game Development Creating Games with Unity and Maya Thor's Microsoft Security Bible Human Compromise Securing the Cloud Web Application Obfuscation Security Risk Management Securing SQL Server Logging and Log Management Digital Forensics for Legal Professionals Industrial Network Security Migrating to the Cloud The Basics of Information Security 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 The Basics of Hacking and Penetration Testing 2011 iPhone and iOS Forensics The Basics of Digital Forensics Low Tech Hacking Moving To The Cloud 2011 2011 2011 2011 2011 2011 2011