Buy Computer Books : Databases : Data Storage + Management

This version is alphabetized by title. Click here to sort in order of current sales rank.

Please click any product name to check the price and shipping information

Search amazon.com for ...

All Products
Books & Audio Books
Magazine Subscriptions
Popular Music
Classical Music
VHS Videos
DVD
Electronics
Computers & Add-On
Software
Cameras & Photo
Office Products
Furniture
Kitchen & Housewares
Baby Products
Lawn - Garden - Patio
Tools & Hardware
Travel Accessories
Toys & Games
Video Games
Cell Phones
Bargain Outlet


Keywords:

  1. 10-Hour Series : File Management , by Patricia Brown (Paperback, 12 September, 2001)
  2. 19 Deadly Sins of Software Security (Security One-off) - Michael Howard (2005-07-26, Paperback)
  3. 201 Interview Questions - SAP Finance and Controlling , by A Vishwanath , Kevin, J Wilson , Otte Erland (Paperback, 05 August, 2006)
  4. 201 Interview Questions : SAP Business Warehouse Information , by Raj, Mani Thiyagarajan , Kevin Wilson (Paperback, 28 February, 2006)
  5. A First Course in Database Systems (2nd Edition) - Jeffrey D. Ullman (2001-10-02, Hardcover)
  6. A First Course in Information Theory (Information Technology : Transmission, Processing and Storage) , by Raymond W. Yeung (Hardcover, 16 June, 2006)
  7. A Mathematical Introduction to Logic, Second Edition - Herbert B. Enderton (2000-12, Hardcover)
  8. A Practical Guide to Security Assessments , by Sudhanshu Kairab (Hardcover, 29 September, 2004)
  9. A Programmer's Introduction to C# 2.0, Third Edition , by Eric Gunnerson , Nick Wienholt (Paperback, 20 June, 2005)
  10. A Semantic Web Primer (Cooperative Information Systems) , by Grigoris Antoniou , Frank van Harmelen (Hardcover, 01 April, 2004)
  11. A Theory of Distributed Objects , by Denis Caromel , Ludovic Henrio , Luca Cardelli (Hardcover, 31 December, 1899)
  12. ABAP Objects : Introduction to Programming SAP Applications - Horst Keller (2002-06-14, Hardcover)
  13. ABAP/4, Second Edition : Programming the SAP(R) R/3(R) System (2nd Edition) , by Bernd Matzke (Hardcover, 30 November, 2000)
  14. Absolute Beginner's Guide to Databases , by John Petersen (Paperback, 05 March, 2002)
  15. Absolute Beginner's Guide to Security, Spam, Spyware & Viruses (Absolute Beginner's Guide) , by Andy Walker (Paperback, 09 November, 2005)
  16. Absolute PC Security and Privacy , by Michael Miller , Michael Miller (Paperback, 01 August, 2002)
  17. Access Data Analysis Cookbook (Cookbooks) , by Ken Bluttman , Wayne Freeze (Paperback, 14 May, 2007)
  18. Access Hacks : Tips & Tools for Wrangling Your Data (Hacks) , by Ken Bluttman (Paperback, 17 April, 2005)
  19. Accounting Information Systems (10th Edition) (Accounting Information Systems) - Marshall B. Romney (2005-03-29, Hardcover)
  20. Actionable Web Analytics : Using Data to Make Smart Business Decisions - Jason Burby (2007-05-29, Paperback)
  21. Administering Data Centers : Servers, Storage, and Voice over IP - Kailash Jayaswal (2005-11-28, Hardcover)
  22. Administering Windows Vista Security : The Big Surprises - Mark Minasi (2006-12-26, Paperback)
  23. Administrating Web Servers, Security, & Maintenance Interactive Workbook , by Eric Larson , Brian Stephens (Paperback, 15 December, 1999)
  24. ADO : ActiveX Data Objects , by Jason T. Roff (Paperback, June, 2001)
  25. Advanced Host Intrusion Prevention with CSA (Networking Technology) , by Chad Sullivan , Jeff Asher , Paul Mauvais (Paperback, 27 April, 2006)
  26. Advanced Methods for Knowledge Discovery from Complex Data (Advanced Information and Knowledge Processing) , by Sanghamitra Bandyopadhyay , Ujjwal Maulik , Larry B. Holder , Diane J. Cook (Hardcover, 04 October, 2005)
  27. Advanced Techniques in Knowledge Discovery and Data Mining (Advanced Information and Knowledge Processing) , by Nikhil Pal , Lakhmi C. Jain (Hardcover, 14 June, 2005)
  28. Advances in Distributed and Parallel Knowledge Discovery , by Hillol Kargupta , Philip Chan (Paperback, 11 September, 2000)
  29. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , by Ian F. Blake , Gadiel Seroussi , Nigel P. Smart , N. J. Hitchin (Paperback, 31 May, 2005)
  30. Advances in Intelligent Data Analysis V : 5th International Symposium on Intelligent Data Analysis, IDA 2003, Berlin, Germany, August 28-30, 2003, Proceedings (Lecture Notes in Computer Science) , by Frank Pfenning , Michael R. Berthold , Hans-Joachim Lenz , Elizabeth Bradley , Rudolf Kruse , Christian Borgelt (Paperback, 29 September, 2003)
  31. Advances in Knowledge Discovery and Data Mining , by Bing Liu , Philip S. Yu (Paperback, 10 June, 2002)
  32. Advances in Knowledge Discovery and Data Mining , by Usama M. Fayyad , Gregory Piatetsky-Shapiro , Padhraic Smyth , Ramasamy Uthurusamy (Paperback, 01 February, 1996)
  33. Advances in Knowledge Discovery and Data Mining : 7th Pacific-Asia Conference, Pakdd 2003, Seoul. Korea, April 30-May 2, 2003 : Proceedings , by Kyu-Young Whang , Jongwoo Jeon , Pacific-Asia Conference on Knowledge Discovery and Data Mining 2003 S , Kyuseok Shim , Jaideep Srivatava (Paperback, 01 July, 2003)
  34. Advantage Database Server : A Developer's Guide , by Cary Jensen , Loy Anderson (Paperback, 31 January, 2007)
  35. Aggressive Network Self-Defense , by Neil R. Wyler , Bruce Potter , Chris Hurley (Paperback, 01 February, 2005)
  36. Agile Database Techniques : Effective Strategies for the Agile Software Developer (Wiley Application Development) - Scott Ambler (2003-10-17, Paperback)
  37. Amazon Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Paul Bausch (Paperback, 20 August, 2003)
  38. Ambient Intelligence , by W. Weber , J.M. Rabaey , E. Aarts (Hardcover, 19 April, 2005)
  39. An Introduction to Database Systems, Eighth Edition - C.J. Date (2003-07-22, Hardcover)
  40. Anti-Hacker Tool Kit, Third Edition , by Mike Shema (Paperback, 09 February, 2006)
  41. Applied Cryptography : Protocols, Algorithms, and Source Code in C, Second Edition - Bruce Schneier (1995-10-18, Paperback)
  42. Applied Data Mining : Statistical Methods for Business and Industry (Statistics in Practice) , by Paolo Giudici (Paperback, ..)
  43. ASP.NET at Work : Building 10 Enterprise Projects with CDROM , by Eric A. Smith (Paperback, 15 February, 2002)
  44. Association Rule Mining : Models and Algorithms (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence) , by Chengqi Zhang , Shichao Zhang (Paperback, 28 May, 2002)
  45. Authentication : From Passwords to Public Keys , by Richard E. Smith (Paperback, 01 October, 2001)
  46. Automated Data Analysis Using Excel , by Brian Bissett (Paperback, 15 June, 2007)
  47. Backup & Recovery - W. Curtis Preston (2007-01-03, Paperback)
  48. Basic Methods of Cryptography , by Jan C. A. van der Lubbe , Steve Gee (Paperback, 12 March, 1998)
  49. BEA WebLogic Server Bible, Second Edition , by Joe Zuffoletto , Lou Miranda (Paperback, 15 May, 2003)
  50. BEA WebLogic Workshop Kick Start , by Joe Weber , Mark Wutka (Paperback, 10 September, 2002)
  51. Beginning Database Design (Wrox Beginning Guides) , by Gavin Powell (Paperback, 05 December, 2005)
  52. Beginning Perl for Bioinformatics - James Tisdall (2001-10-15, Paperback)
  53. Best Practices in Information Technology : How Corporations Get the Most Value from Exploiting Their Digital Investments , by James W. Cortada (Hardcover, 29 August, 1997)
  54. BigNum Math : Implementing Cryptographic Multiple Precision Arithmetic , by Tom St Denis (Paperback, 30 June, 2006)
  55. Biometrics : Identity Verification in a Networked World , by Samir Nanavati , Michael Thieme , Raj Nanavati , Samir Nanavati , Michael Thieme , Raj Nanavati (Paperback, 15 March, 2002)
  56. BIOS Disassembly Ninjutsu Uncovered (Uncovered series) , by Darmawan Salihun (Paperback, 28 October, 2006)
  57. Blissful Data : Wisdom and Strategies for Providing Meaningful, Useful, and Accessible Data for All Employees , by Margaret Y. Chu (Hardcover, December, 2003)
  58. Blogging and RSS : A Librarian's Guide , by Michael P. Sauers (Paperback, 29 October, 2006)
  59. Blueprints for High Availability - Evan Marcus (2003-09-19, Paperback)
  60. Botnets : The Killer Web Applications , by Craig Schiller , Jim Binkley , Gadi Evron , Carsten Willems , Tony Bradley , David Harley , Michael Cross (Paperback, 26 January, 2007)
  61. Brute Force : Cracking the Data Encryption Standard , by Matt Curtin (Hardcover, 16 February, 2005)
  62. Building Client/Server Applications Under VB .NET : An Example-Driven Approach , by Jeff Levinson (Paperback, March, 2003)
  63. Building Intelligent .NET Applications : Agents, Data Mining, Rule-Based Systems, and Speech Processing , by Sara Morgan Rea (Paperback, 25 March, 2005)
  64. Building Internet Firewalls (2nd Edition) , by Elizabeth D. Zwicky , Simon Cooper , D. Brent Chapman (Paperback, 15 January, 2000)
  65. Building Open Source Network Security Tools : Components and Techniques , by Mike Schiffman (Paperback, 11 October, 2002)
  66. Building Portals with the Java Portlet API (Expert's Voice) , by Jeff Linwood , Dave Minter (Paperback, 23 August, 2004)
  67. Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers, 1/e , by James J. Townsend , Dmitri Riz , Deon Schaffer (Paperback, 02 January, 2004)
  68. Building Storage Networks, Second Edition , by Mark Farley (Digital, ..)
  69. Building the Customer-Centric Enterprise : Data Warehousing Techniques for Supporting Customer Relationship Management , by Claudia Imhoff , Lisa Loftis , Jonathan G. Geiger (Paperback, 01 February, 2001)
  70. Building the Data Warehouse - W. H. Inmon (2005-10-07, Paperback)
  71. Building Web Services with Java : Making Sense of XML, SOAP, WSDL, and UDDI (2nd Edition) (Developer's Library) , by Steve Graham , Doug Davis , Simeon Simeonov , Glen Daniels , Peter Brittenham , Yuichi Nakamura , Paul Fremantle , Dieter Koenig , Claudia Zentner (Paperback, 28 June, 2004)
  72. Business Intelligence : The IBM Solution : Data Warehousing and OLAP , by Mark Whitehorn , Mary Whitehorn (Paperback, June, 1999)
  73. Business Intelligence for the Enterprise , by Mike Biere (Paperback, 04 June, 2003)
  74. Business Intelligence Roadmap : The Complete Project Lifecycle for Decision-Support Applications - Larissa T. Moss (2003-02-25, Paperback)
  75. Business Modeling and Data Mining (The Morgan Kaufmann Series in Data Management Systems) , by Dorian Pyle (Paperback, April, 2003)
  76. Business Process Redesign in Travel Management in an SAP R/3 Upgrade Project , by Marit Schallert (Digital, 13 November, 2002)
  77. C# Programming Evolution , by Kevin Hoffman (Paperback, 17 May, 2004)
  78. Causal Models and Intelligent Data Management , by Alex Gammerman (Hardcover, 17 August, 2006)
  79. CCSP : Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541) , by Todd Lammle , Wade Edwards , Tom Lancaster , Justin Menga , Eric Quinn , Jason Rohm , Carl Timm , Bryant Tow (Hardcover, 01 April, 2005)
  80. CCSP SNPA Official Exam Certification Guide (3rd Edition) (Exam Certification Guide) , by Greg Bastien , Earl Carter , Christian Degu , Michael Gibbs (Hardcover, 24 April, 2006)
  81. CCSP SNRS Exam Certification Guide , by Greg Bastien , Sara Nasseh , Christian Degu (Hardcover, 08 December, 2005)
  82. CCSP Study Guide Kit , by Eric Quinn , Justin Menga , Tom Lancaster , Todd Lammle , Wade Edwards , Jason Rohm , Carl Timm , Bryant Tow (Hardcover, 26 April, 2004)
  83. CD and DVD Recording for Dummies, Second Edition , by Mark L. Chambers (Paperback, 05 March, 2004)
  84. CEH : Official Certified Ethical Hacker Review Guide : Exam 312-50 - Kimberly Graves (2007-02-27, Paperback)
  85. Cellular Automata Transforms : Theory and Applications in Multimedia Compression, Encryption, and Modeling (Kluwer International Series in Engineering ... ultimedia Systems and Applications, Mmsa 16.) , by Olu Lafe (Hardcover, 15 January, 2000)
  86. Characteristic Based Planning with mySAP SCM : Scenarios, Processes, and Functions (SAP Excellence) , by Jorg Thomas Dickersbach , A. Forstreuter , C. Fuhlbrugge , T. John (Hardcover, 08 August, 2005)
  87. Check Point Next Generation Security Administration , by Cherie Amon , Allen V. Keele , Daniel Kligerman , Drew Simonis , Corey Pincock (Paperback, March, 2002)
  88. Check Point NG VPN-1/Firewall-1 : Advanced Configuration and Troubleshooting , by Barry J. Stiefel , Doug Maxwell , Kyle X. Hourihan , Cherie Amon , James Noble (Paperback, May, 2003)
  89. Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance (Networking Technology) - Omar Santos (2005-10-14, Paperback)
  90. Cisco PIX Firewalls : Configure, Manage, & Troubleshoot , by Charles Riley (Editor) , Umer Khan , Michael Sweeney (Paperback, 01 May, 2005)
  91. Cisco Security Bible , by K. S. Rajesh , Rajesh, NIIT K.S. (Paperback, 01 March, 2002)
  92. Cisco(R) PIX Firewalls - Richard Deal (2002-10-23, Paperback)
  93. CISSP : Certified Information Systems Security Professional Study Guide, Third Edition - James Michael Stewart (2005-09-09, Paperback)
  94. CISSP All-in-One Exam Guide, Third Edition (All-in-One) , by Shon Harris (Hardcover, 15 September, 2005)
  95. CISSP Certification All-in-One Exam Guide, 4th Ed. - Shon Harris (2007-11-09, Hardcover)
  96. CISSP Exam Cram 2 , by Michael Gregg (Paperback, 22 September, 2005)
  97. CISSP For Dummies (For Dummies (Computer/Tech)) - Lawrence H. Miller (2007-04-02, Paperback)
  98. CISSP Practice Questions Exam Cram 2 , by Michael Gregg (Paperback, 21 October, 2004)
  99. Classification, Clustering And Data Mining Applications , by D. BANKS (Paperback, 27 July, 2004)
  100. CLEP Information Systems & Computer Applications (College Level Examination Series (Clep) , by Jack Rudman (Plastic Comb, 01 June, 2001)
  101. Client/Server Databases : Enterprise Computing , by James Martin , Joe Leben (Hardcover, 12 March, 1998)
  102. Client/Server Survival Guide, 3rd Edition - Robert Orfali (1999-01-25, Paperback)
  103. Clinical Data Mining in Practice-Based Research : Social Work in Hospital Settings , by Irwin Epstein , Susan Blumenfield (Hardcover, June, 2002)
  104. Clustering for Data Mining : A Data Recovery Approach (Computer Science and Data Analysis) , by Boris Mirkin (Hardcover, 29 April, 2005)
  105. Codes : The Guide To Secrecy From Ancient To Modern Times (Discrete Mathematics and Its Applications) , by Richard A. Mollin (Hardcover, 25 May, 2005)
  106. Coding for Wireless Channels (Information Technology : Transmission, Processing and Storage) , by Ezio Biglieri (Hardcover, 24 May, 2005)
  107. COM Beyond Microsoft Designing : Designing and Implementing COM Servers on Compaq Platforms (with CD-ROM) , by Terence Sherlock , Gene Cronin (Paperback, 15 January, 2000)
  108. COM+ Programming : A Practical Guide Using Visual C++ and ATL (With CD-ROM) , by Pradeep Tapadiya (Paperback, 22 September, 2000)
  109. Common SAP R/3 Functions Manual (Springer Professional Computing) , by William Lawlor (Hardcover, 08 January, 2004)
  110. Common Warehouse Metamodel Developer's Guide , by John Poole , Dan Chang , Douglas Tolbert , David Mellor , John Poole , Dan Chang , Douglas Tolbert , David Mellor (Paperback, 07 January, 2003)
  111. Complete Guide to CISM Certification , by Thomas R. Peltier , Justin Peltier (Hardcover, 13 December, 2006)
  112. Complete Guide to Security and Privacy Metrics : Measuring Regulatory Compliance, Operational Resilience, and ROI , by Debra S. Herrmann (Hardcover, 22 January, 2007)
  113. Compressed Image File Formats : JPEG, PNG, GIF, XBM, BMP (ACM Press) , by John Miano (Paperback, 19 August, 1999)
  114. Compression for Great Digital Video : Power Tips, Techniques, and Common Sense (With CD-ROM) , by Ben Waggoner (Paperback, August, 2002)
  115. CompTIA Security+ Study Guide : Exam SY0-101 , by Mike Pastore , Emmett Dulaney (Hardcover, 08 May, 2006)
  116. CompTIA Security+ Study Guide : Exam SY0-101 , by Mike Pastore , Emmett Dulaney (Paperback, 01 May, 2006)
  117. Computation, Causation, and Discovery , by Clark Glymour , Gregory F. Cooper (Paperback, 18 June, 1999)
  118. Computer Evidence : Collection & Preservation (Networking Series) , by Christopher LT Brown (Paperback, 03 October, 2005)
  119. Computer Forensics : Computer Crime Scene Investigation (Networking Series) (Networking Series) , by John R Vacca (Paperback, 27 May, 2005)
  120. Computer Forensics JumpStart (Jumpstart (Sybex)) - Michael Solomon (2004-12-10, Paperback)
  121. Computer Network Security , by Joseph M. Kizza (Hardcover, 07 April, 2005)
  122. Computer Security , by Dieter Gollmann (Paperback, 18 January, 2006)
  123. Computer Security : Art and Science - Matt Bishop (2002-12-02, Hardcover)
  124. Computer Security : Principles and Practice - William Stallings (2007-08-02, Hardcover)
  125. Computer Security and Cryptography , by Alan G. Konheim (Hardcover, 29 January, 2007)
  126. Computer Security Basics , by Debby Russell , Sr. G.T Gangemi (Paperback, 11 July, 1991)
  127. Computer Security Basics , by Rick Lehtinen , Deborah Russell , G T Gangemi (Paperback, 13 June, 2006)
  128. Computer Security Fundamentals (Prentice Hall Security Series) - Chuck Easttom (2005-03-03, Paperback)
  129. Computer Security Handbook - (2002-04-11, Paperback)
  130. Configuring Check Point NGX VPN-1/Firewall-1 , by Robert Stephens , Barry Stiefel , Stephen Watkins , Simon Desmeules , Eli Faskha (Paperback, 01 August, 2005)
  131. Configuring IPCop Firewalls : Closing Borders with Open Source , by Barrie, Dempster , James, Eaton-Lee (Paperback, 29 September, 2006)
  132. Configuring SAP R/3 FI/CO : The Essential Resource for Configuring the Financial and Controlling Modules - Quentin Hurst (2000-04-15, Hardcover)
  133. Connecting Microsoft Exchange Server , by Kieran McCorry (Paperback, October, 1999)
  134. Consolidation in the Data Center : Simplifying IT Environments to Reduce Total Cost of Ownership , by David Hornby , Ken Pepple (Paperback, 19 September, 2002)
  135. Content Computing : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings (Lecture Notes in Computer Science) , by Chi-Hung Chi , Kwok-Yan Lam (Paperback, June, 2005)
  136. Content Management Bible - Bob Boiko (2004-11-26, Paperback)
  137. Core Concepts of Information Technology Auditing - James E. Hunton (2003-07-24, Paperback)
  138. Core Security Patterns : Best Practices and Strategies for J2EE, Web Services, and Identity Management (Core Series) - Christopher Steel (2005-10-14, Hardcover)
  139. Corporate Computer and Network Security - Raymond Panko (2003-03-17, Hardcover)
  140. Corporate Information Factory, 2nd Edition , by W. H. Inmon , Claudia Imhoff , Ryan Sousa (Paperback, 18 December, 2000)
  141. Corporate Information With Sap-Eis : Building a Data Warehouse and a Mis - Application With in Sight , by Bernd-Ulrich Kaiser , Bernd-Ulrich Kaiser (Hardcover, 1988)
  142. Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses , by Ed Skoudis (Paperback, 23 July, 2001)
  143. Counter Hack Reloaded : A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) , by Edward Skoudis , Tom Liston (Paperback, 23 December, 2005)
  144. CramSession's Designing & Implementing Data Warehouses with Microsoft SQL Server 7.0 : Certification Study Guide (Digital, 16 August, 2000)
  145. Creating Documents with BusinessObjects , by Robert D Schmidt (Paperback, 18 May, 2005)
  146. Critical Infrastructure Protection in Homeland Security : Defending a Networked Nation , by Ted G. Lewis (Hardcover, 21 April, 2006)
  147. Cryptography : A Very Short Introduction , by Fred Piper , Sean Murphy (Paperback, 15 July, 2002)
  148. Cryptography : Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) , by Douglas R. Stinson (Hardcover, 01 November, 2005)
  149. Cryptography and Public Key Infrastructure on the Internet , by Klaus Schmeh (Paperback, 01 June, 2003)
  150. Cryptography Decrypted - H. X. Mel (2000-12-21, Paperback)
  151. Cryptography for Developers , by Tom St Denis (Paperback, 01 November, 2006)
  152. Cryptography for Dummies , by Chey Cobb (Paperback, 30 January, 2004)
  153. Cryptography in C and C++, Second Edition , by Michael Welschenbach (Hardcover, 25 May, 2005)
  154. Cryptology (Spectrum) , by Albrecht Beutelspacher , William Watkins , Gerald L. Alexanderson , Dipa Choudhury , William J. Firey , Dan Kalman , Eleanor Lang , Russell L. Merris , Jeffrey L. Nunemacher , Ellen M. Parker (Paperback, 05 September, 1996)
  155. Customer Data Integration : Reaching a Single Version of the Truth (SAS Institute Inc.) - Jill Dyche (2006-07-21, Hardcover)
  156. Customer Relationship Management , by Federico Rajola (Hardcover, 15 April, 2003)
  157. Customer Relationship Management : Getting It Right! , by Judith W. Kincaid (Paperback, 29 October, 2002)
  158. CWSP Certified Wireless Security Professional Official Study Guide (Exam PW0-200), Second Edition , by Tom Carpenter , Grant Moerschel , Richard Dreger (Paperback, 26 September, 2006)
  159. Cyber-Safe Kids, Cyber-Savvy Teens : Helping Young People Learn To Use the Internet Safely and Responsibly , by Nancy E. Willard (Paperback, 16 March, 2007)
  160. Data and Text Mining : A Business Applications Approach , by Thomas W. Miller (Paperback, 06 April, 2004)
  161. Data Hiding Fundamentals and Applications : Content Security in Digital Multimedia , by Husrev T. Sencar , Mahalingam Ramkumar , Ali N. Akansu (Hardcover, 20 August, 2004)
  162. Data Management : Databases & Organizations - Richard T. Watson (2005-08-26, Hardcover)
  163. Data Management for Mobile Computing (Kluwer International Series on Advances in Database Systems, 10) , by Evaggelia Pitoura , George Samaras (Hardcover, January, 1998)
  164. Data Mining & Statistical Analysis Using SQL , by Jr., John N. Lovett , Robert P. Trueblood , John N. Lovett Jr. (Paperback, 15 October, 2001)
  165. Data Mining : A Heuristic Approach , by Hussein A. Abbass , Ruhul Amin Sarker , Charles S. Newton (Hardcover, February, 2002)
  166. Data Mining : A Tutorial Based Primer , by Richard Roiger , Michael Geatz (Paperback, 26 September, 2002)
  167. Data Mining : Building Competitive Advantage , by Robert Groth (Textbook Binding, 28 October, 1999)
  168. Data Mining : Concepts, Models, Methods, and Algorithms , by Mehmed Kantardzic (Paperback, 18 October, 2002)
  169. Data Mining : Introductory and Advanced Topics - Margaret H. Dunham (2002-08-22, Paperback)
  170. Data Mining : Multimedia, Soft Computing, and Bioinformatics , by Sushmita Mitra , Tinku Acharya (Hardcover, 12 September, 2003)
  171. Data Mining : Next Generation Challenges and Future Directions , by Hillol Kargupta , Anupam Joshi , Krishnamoorthy Sivakumar , Yelena Yesha (Paperback, 01 October, 2004)
  172. Data Mining : Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems) - Ian H. Witten (2005-06-08, Paperback)
  173. Data Mining : Technologies, Techniques, Tools, and Trends , by Bhavani Thuraisingham (Hardcover, 18 December, 1998)
  174. Data Mining and Business Intelligence : A Guide to Productivity , by Stephan Kudyba , Richard Hoptroff (Paperback, 09 February, 2001)
  175. Data Mining and Knowledge Discovery Handbook , by Oded Maimon , Lior Rokach (Hardcover, 01 September, 2005)
  176. Data Mining and Knowledge Discovery with Evolutionary Algorithms , by Alex A. Freitas , G. Rozenberg (Hardcover, 03 October, 2002)
  177. Data Mining and Predictive Analysis : Intelligence Gathering and Crime Analysis , by Colleen McCue (Paperback, 01 May, 2007)
  178. Data Mining Cookbook : Modeling Data for Marketing, Risk and Customer Relationship Management , by Olivia Parr Rud (Paperback, 03 November, 2000)
  179. Data Mining for Business Intelligence : Concepts, Techniques, and Applications in Microsoft Office Excel with XLMiner - Galit Shmueli (2006-12-11, Hardcover)
  180. Data Mining for Scientific and Engineering Applications , by Robert L. Grossman , Chandrika Kamath , Philip Kegelmeyer , Vipin Kumar , Raju R. Namburu (Paperback, 03 October, 2001)
  181. Data Mining in Bioinformatics (Advanced Information and Knowledge Processing) , by Jason T. L. Wang , Mohammed J. Zaki , Hannu T.T. Toivonen , Dennis E. Shasha (Hardcover, 17 September, 2004)
  182. Data Mining in Finance : Advances in Relational and Hybrid Methods (Kluwer International Series in Engineering and Computer Science, 547) , by Boris Kovalerchuk , Evgenii Vityaev (Hardcover, 01 March, 2000)
  183. Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence) , by Mark Last , Abraham Kandel , Horst Bunke (Hardcover, 01 November, 2004)
  184. Data Mining Methods and Models , by Daniel T. Larose (Hardcover, 30 January, 2006)
  185. Data Mining Techniques : For Marketing, Sales, and Customer Relationship Management - Michael J. A. Berry (2004-04-09, Paperback)
  186. Data Mining Using SAS Applications , by George Fernandez (Hardcover, 27 December, 2002)
  187. Data Mining Using SAS Applications CD-ROM , by George Fernandez (CD-ROM, 31 December, 2002)
  188. Data Mining Using Sas Enterprise Miner : A Case Study Approach , by SAS Institute (Paperback, May, 2003)
  189. Data Mining with Microsoft SQL Server 2000 Technical Reference , by Claude Seidman (Hardcover, 09 May, 2001)
  190. Data Mining with SQL Server 2005 - ZhaoHui Tang (2005-10-07, Paperback)
  191. Data Mining, Second Edition, Second Edition : Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems) (The Morgan Kaufmann Series in Data Management Systems) - Jiawei Han (2006-01-13, Hardcover)
  192. Data Model Patterns : A Metadata Map (The Morgan Kaufmann Series in Data Management Systems) , by David C. Hay (Hardcover, 23 June, 2006)
  193. Data Modeler's Workbench : Tools and Techniques for Analysis and Design , by Steve Hoberman (Paperback, 01 February, 2001)
  194. Data Modeling Essentials, Third Edition - Graeme Simsion (2004-11-04, Paperback)
  195. Data Modeling with ERwin , by Carla DeAngelis (Paperback, 15 May, 2000)
  196. Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems) , by Dorian Pyle (Paperback, 15 March, 1999)
  197. Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems) , by Mamdouh Refaat (Paperback, 29 September, 2006)
  198. Data Privacy and Security , by D. Salomon (Hardcover, 01 June, 2003)
  199. Data Quality : Concepts, Methodologies and Techniques (Data-Centric Systems and Applications) , by Carlo Batini , Monica Scannapieco (Hardcover, 09 October, 2006)
  200. Data Quality : The Accuracy Dimension (The Morgan Kaufmann Series in Data Management Systems) - Jack E. Olson (2002-12-26, Paperback)
  201. Data Strategy - Sid Adelman (2005-06-15, Paperback)
  202. Data Transfer Made Easy 4.0B/4.5x , by Inc. R/3 Simplification Group SAP Labs (Paperback, 06 August, 1999)
  203. Data Warehouse : From Architecture to Implementation , by Barry Devlin (Paperback, 04 November, 1996)
  204. Data Warehouse Design Solutions , by Christopher Adamson , Michael Venerable (Paperback, 29 June, 1998)
  205. Data Warehouse Management Handbook , by Richard J. Kachur (Hardcover, January, 2000)
  206. Data Warehouse Project Management , by Sid Adelman , Larissa T. Moss (Paperback, 15 December, 2000)
  207. Data Warehouses : More Than Just Mining , by Barbara J. Bashein , M. Lynne Markus (Hardcover, 30 November, 2000)
  208. Data Warehousing : Architecture and Implementation , by Mark W. Humphries , Michael W. Hawkins , Michelle C. Dy (Paperback, 30 December, 1998)
  209. Data Warehousing : The Route to Mass Communication , by Sean Kelly (Paperback, June, 1996)
  210. Data Warehousing : Using the Wal-Mart Model (The Morgan Kaufmann Series in Data Management Systems) , by Paul Westerman (Paperback, 15 January, 2000)
  211. Data Warehousing 101 : Concepts and Implementation , by Arshad Khan (Paperback, 21 August, 2003)
  212. Data Warehousing And Business Intelligence For e-Commerce , by Alan R. Simon , Steven L. Shaffer (Paperback, 18 May, 2001)
  213. Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library) , by Rob Mattison (Hardcover, August, 1997)
  214. Data Warehousing and Web Engineering , by Shirley A. Becker (Paperback, April, 2002)
  215. Data Warehousing for Dummies - Alan R. Simon (1997-11, Paperback)
  216. Data Warehousing Fundamentals : A Comprehensive Guide for IT Professionals - Paulraj Ponniah (2001-08-03, Hardcover)
  217. Database and Applications Security : Integrating Information Security and Data Management , by Bhavani Thuraisingham , Bhavani Thruaisingham (Hardcover, 28 July, 2004)
  218. Database Concepts (2nd Edition) , by David M. Kroenke (Paperback, 10 March, 2004)
  219. Database Concepts (3rd Edition) - David Kroenke (2007-01-24, Paperback)
  220. Database Design (Sams Teach Yourself) , by Ryan Stephens , Ronald Plew (Paperback, 20 November, 2000)
  221. Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1) , by Sikha Bagui , Richard Earp (Hardcover, 27 June, 2003)
  222. Database Management Systems - Raghu Ramakrishnan (2002-08-14, Hardcover)
  223. Database Modeling and Design : Logical Design, 4th Edition (The Morgan Kaufmann Series in Data Management Systems) - Toby J. Teorey (2005-09-06, Paperback)
  224. Database Modeling with Microsoft Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems) - Terry Halpin (2003-08-14, Paperback)
  225. Database Security and Auditing : Protecting Data Integrity and Accessibility - Hassan A. Afyouni (2005-04-06, Paperback)
  226. Database Systems : A Practical Approach to Design, Implementation and Management (4th Edition) (International Computer Science Series) - Thomas M. Connolly (2004-05-27, Paperback)
  227. Database Systems : An Application Oriented Approach, Compete Version (2nd Edition) - Michael Kifer (2005-03-16, Hardcover)
  228. Database Systems : Design, Implementation, and Management, Seventh Edition , by Peter Rob , Carlos Coronel (Hardcover, 27 January, 2006)
  229. Database Systems Concepts , by Abraham Silberschatz , Henry F. Korth , S. Sudarshan (Hardcover, 17 May, 2005)
  230. Databases and Mobile Computing , by Daniel Barbara , Ravi Jain , N. Krishnakumar (Hardcover, 31 July, 1996)
  231. DB2 UDB V8.1 Certification Exam 700 Study Guide , by Roger E. Sanders (Paperback, 17 September, 2003)
  232. DDS Keyword Reference , by James Coolbaugh (Paperback, 01 April, 1999)
  233. DDS Programming for Display and Printer Files, Second Edition , by James Coolbaugh (Paperback, March, 1999)
  234. Decision Support in the Data Warehouse (Data Warehousing Institute Series from Prentice Hall Ptr) , by Paul Gray , Hugh J. Watson (Paperback, 01 December, 1997)
  235. Decision Support Systems (2nd Edition) , by George M. Marakas (Paperback, 23 August, 2002)
  236. Decision Trees for Business Intelligence and Data Mining : Using SAS Enterprise Miner , by Barry De Ville (Paperback, 30 October, 2006)
  237. Defeating the Hacker : A non-technical guide to computer security , by Robert Schifreen (Hardcover, 05 May, 2006)
  238. Defending the Digital Frontier : Practical Security for Management, 2nd Edition , by Jan Babiak , John Butters , Mark W. Doll (Hardcover, 29 November, 2004)
  239. del.icio.us Mashups , by Brett O'Connor (Paperback, 17 January, 2007)
  240. Department of Defense Information Security Report : The New Model for Protecting Networks Against Terrorist Threats , by Department of Defense (Hardcover, 09 April, 2007)
  241. Designing a Data Warehouse : Supporting Customer Relationship Management , by Chris Todman (Paperback, 29 December, 2000)
  242. Designing a Total Data Solution : Technology, Implementation, and Deployment , by Roxannee. Burkey , Charles V. Breakfield (Hardcover, 28 September, 2000)
  243. Designing Applications with MSMQ : Message Queuing for Developers , by Alan Dickman (Paperback, 31 August, 1998)
  244. Designing BSD Rootkits : An Introduction to Kernel Hacking , by Joseph Kong (Paperback, 10 April, 2007)
  245. Designing Effective Database Systems (The Addison-Wesley Microsoft Technology Series) , by Rebecca M. Riordan (Paperback, 10 January, 2005)
  246. Designing Storage Area Networks : A Practical Reference for Implementing Fibre Channel and IP SANs (2nd Edition) - Tom Clark (2003-03-21, Paperback)
  247. Desktop Witness : The Do's & Don'ts of Personal Computer Security , by Michael A. Caloyannides (Paperback, 13 May, 2002)
  248. Developer's Guide to Web Application Security , by Michael Cross (Paperback, 26 January, 2007)
  249. Developing Bioinformatics Computer Skills , by Cynthia Gibas , Per Jambeck (Paperback, 15 April, 2001)
  250. Developing Distributed and E-Commerce Applications , by Darrel Ince , Darrell Ince (Paperback, 22 June, 2001)
  251. Developing Secure Distributed Systems with CORBA , by Ulrich Lang , Rudolf Schreiner (Hardcover, February, 2002)
  252. Developing Solutions with Microsoft InfoPath (Pro - Developer) , by Vani Mandava Teredesai , Patrick Halstead , Matthew Blain (Paperback, 24 November, 2004)
  253. Digital Certificates : Applied Internet Security , by Jalal Feghhi , Peter Williams (Paperback, 15 October, 1998)
  254. Digital Identity , by Phillip Windley (Paperback, 01 August, 2005)
  255. Digital Rights Management : Protecting and Monetizing Content (Nab Executive Technology Briefings) , by Joan Van Tassel (Paperback, 14 April, 2006)
  256. Digital Storage Oscilloscopes , by Ian Hickman (Paperback, 01 February, 1997)
  257. Disappearing Cryptography, Second Edition - Information Hiding : Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) , by Peter Wayner (Paperback, 29 April, 2002)
  258. Disaster Recovery Planning : For Computers and Communication Resouces , by Jon William Toigo (Paperback, 21 December, 1995)
  259. Disaster Recovery Planning : Strategies for Protecting Critical Information Assets , by Jon William Toigo , Jon Toigo (Hardcover, 27 August, 2002)
  260. Discovering Data Mining from Concept to Implementation , by Peter Cabena , Hadjnian , Stadler , Verhees , Zanasi , Alessandro Zanasi (Hardcover, 18 September, 1997)
  261. Discovering Knowledge in Data : An Introduction to Data Mining , by Daniel T. Larose (Hardcover, 18 November, 2004)
  262. Disk and File Management Tasks on Hp-Ux (Hewlett-Packard Professional Books) , by Tom Madell (Paperback, October, 1996)
  263. Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems) , by Nancy A. Lynch (Hardcover, April, 1997)
  264. Distributed Computing : Fundamentals, Simulations, and Advanced Topics (Wiley Series on Parallel and Distributed Computing) , by Hagit Attiya , Jennifer Welch (Hardcover, 25 March, 2004)
  265. Distributed Computing : Principles and Applications , by M.L. Liu (Paperback, 02 June, 2003)
  266. Distributed Computing and Internet Technology : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings (Lecture Notes in Computer Science) , by R.K. Ghosh , Hrushikesha Mohanty (Paperback, 14 March, 2005)
  267. Distributed Event-Based Systems , by Gero Muhl , Ludger Fiege , Peter Pietzuch (Hardcover, 28 July, 2006)
  268. Distributed Operating Systems , by Andrew S. Tanenbaum (Hardcover, 25 August, 1994)
  269. Distributed Operating Systems : Concepts and Practice , by Doreen L. Galli (Hardcover, 31 August, 1999)
  270. Distributed Operating Systems and Algorithm Analysis , by Randy Chow , Theodore Johnson , Yuan-Chieh Chow (Paperback, 18 March, 1997)
  271. Distributed Programming With Java , by Qusay H. Mahmoud (Paperback, September, 1999)
  272. Distributed Storage Networks : Architecture, Protocols and Management , by Thomas C. Jepsen (Hardcover, 18 November, 2003)
  273. Distributed Systems : Concepts and Design (3rd Edition) , by George Coulouris , Jean Dollimore , Tim Kindberg (Hardcover, 11 August, 2000)
  274. Distributed Systems : Concepts and Design (4th Edition) (International Computer Science Series) - Jean Dollimore (2005-05-10, Hardcover)
  275. Distributed Systems : Principles and Paradigms (2nd Edition) - Andrew S. Tanenbaum (2006-10-02, Hardcover)
  276. Distributed Systems : Principles and Paradigms , by Andrew S. Tanenbaum , Maarten van Steen (Hardcover, 15 January, 2002)
  277. Drugs, Guns and Violence : DATA MINING : An article from : Law & Order , by Colleen McCue , Paul J McNulty (Digital, 13 September, 2005)
  278. E-Commerce and Web Technologies : 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings (Lecture Notes in Computer Science) , by Kurt Bauknecht , Birgit Proll , Hannes Werthner (Paperback, 21 September, 2005)
  279. e-Data : Turning Data into Information with Data Warehousing (Addison-Wesley Information Technology Series) , by Jill Dyche (Paperback, 15 February, 2000)
  280. Effective COM : 50 Ways to Improve Your COM and MTS-based Applications , by Keith Brown , Tim Ewald , Chris Sells , Don Box (Paperback, 03 December, 1998)
  281. Electronic Payment Systems for E-Commerce , by Donal O'Mahony , Michael A. Peirce , Hitesh Tewari , O'Mahony Donal (Hardcover, 15 August, 2001)
  282. Elements of Distributed Algorithms : Modeling and Analysis with Petri Nets , by Wolfgang Reisig (Hardcover, 18 September, 2001)
  283. EnCase Computer Forensics : The Official EnCE : EnCaseeCertified Examiner Study Guide - Steve Bunting (2006-02-20, Paperback)
  284. Encyclopedia of Cryptography and Security , by Henk C.A. van Tilborg (Hardcover, 10 August, 2005)
  285. Encyclopedia Of Database Technologies And Applications , by laura Rivero , Jorge H. Doorn , VIVIANA FERRAGGINE , Jorge Doorn (Hardcover, 30 June, 2005)
  286. Enemy at the Water Cooler : Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures , by Brian Contos , Dave Kleiman (Paperback, 23 August, 2006)
  287. Enterprise Asset Management : Configuring and Administering SAP R/3 Plant Maintenance , by Ian McMullan (Paperback, 18 August, 2004)
  288. Enterprise Java for SAP , by Austin Sincock (Hardcover, 25 July, 2003)
  289. Enterprise Knowledge Management : The Data Quality Approach (The Morgan Kaufmann Series in Data Management Systems) - David Loshin (2001-01-22, Paperback)
  290. Enterprise Management with SAP SEM/ Business Analytics (SAP Excellence) , by Marco Meier , Werner Sinzig , Peter Mertens (Hardcover, 14 February, 2005)
  291. Enterprise Security Architecture : A Business-Driven Approach - John Sherwood (2005-11-12, Hardcover)
  292. Enterprise SOA : Service-Oriented Architecture Best Practices (The Coad Series) - Dirk Krafzig (2004-11-09, Paperback)
  293. Error Control Systems for Digital Communication and Storage , by Stephen B. Wicker (Hardcover, 15 January, 1995)
  294. Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security , by Tony Bradley , Harlan Carvey (Paperback, 01 October, 2006)
  295. Essential PHP Security , by Chris Shiflett (Paperback, 13 October, 2005)
  296. Essentials : Microsoft Office 2003 Level 1 (Essentials Series for Office 2003) - Marianne Fox (2004-04-12, Paperback)
  297. Evolutionary Computation in Data Mining (Studies in Fuzziness and Soft Computing) , by Ashish Ghosh , Lakhmi C. Jain (Hardcover, 23 November, 2004)
  298. Ew 101 : A First Course in Electronic Warfare (Artech House Radar Library) , by David Adamy (Hardcover, February, 2001)
  299. ExamInsight For MCP / MCSE Certification : Installing, Configuring, and Administering Microsoft Windows XP Professional Exam 70-270 (ExamInsight S.) , by Deborah Timmons (Paperback, 14 October, 2002)
  300. ExamWise For MCP / MCSE Certification : Installing, Configuring, and Administering Microsoft Windows XP Professional Exam 70-270 (With Online Exam) (ExamWise S.) , by Deborah and Patrick Timmons (Paperback, 14 October, 2002)
  301. Expert SQL Server 2005 Integration Services (Programmer to Programmer) - Brian Knight (2007-05-29, Paperback)
  302. Exploratory Data Mining and Data Cleaning , by Tamraparni Dasu , Theodore Johnson , Tamraparni Dasu , Theodore Johnson (Hardcover, 09 May, 2003)
  303. Exploring IBM Server & Storage Technology : A Laymen's Guide to the IBM eServer and TotalStorage Families (Exploring IBM series) , by Jim Hoskins (Paperback, 01 June, 2005)
  304. Extreme Exploits : Advanced Defenses Against Hardcore Hacks (Hacking Exposed) , by Victor Oppleman , Oliver Friedrichs , Brett Watson (Paperback, 18 July, 2005)
  305. Fast Track to MDX - Mark Whitehorn (2005-10-15, Paperback)
  306. Fault-Tolerant Distributed Computing (Lecture Notes in Computer Science, Vol 448) , by A. Spector , Barbara Simons (Paperback, November, 1990)
  307. Fault Tolerance in Distributed Systems , by Pankaj Jalote (Paperback, 06 April, 1994)
  308. Fibre Channel Storage Area Networks , by The Fibre Channel Association (Paperback, 15 August, 2001)
  309. File Organization and Processing , by Alan L. Tharp (Hardcover, January, 1988)
  310. File Structures : An Object-Oriented Approach with C++ - Michael J. Folk (1997-12-16, Hardcover)
  311. File System Forensic Analysis - Brian Carrier (2005-03-17, Paperback)
  312. FileMaker Pro 8 : The Missing Manual - Geoff Coffey (2005-09-23, Paperback)
  313. FileMaker Pro 9 : The Missing Manual - Geoff Coffey (2007-08-02, Paperback)
  314. Find It Online, Fourth Edition : The Complete Guide to Online Research (Find It Online : The Complete Guide to Online Research) , by Alan M. Schlein (Paperback, 25 August, 2004)
  315. Fixing Access Annoyances : How to Fix the Most Annoying Things About Your Favorite Database (Annoyances) , by Phil Mitchell , Evan Callahan (Paperback, 01 September, 2005)
  316. Forensic Discovery , by Dan Farmer , Wietse Venema (Hardcover, 31 December, 2004)
  317. Foundations of Cryptography , by Oded Goldreich (Paperback, 18 January, 2007)
  318. Foundations of Cryptography : Volume 2, Basic Applications , by Oded Goldreich (Hardcover, 10 May, 2004)
  319. Foundations of Security : What Every Programmer Needs to Know (Expert's Voice) - Neil Daswani (2007-02-16, Paperback)
  320. Freeware Encryption and Security Programs : Protecting Your Computer and Your Privacy , by Michael Chesbro (Paperback, September, 2001)
  321. From P2P to Web Services and Grids : Peers in a Client/Server World , by Ian J. Taylor (Paperback, 21 October, 2004)
  322. From WAN to LAN to SSP : Carriers' Carrier Vendors Enter the Data Storage Market , by Yankee Group (Digital, 01 July, 2000)
  323. Fundamentals of Data Warehouses , by Matthias Jarke , Maurizio Lenzerini , Yannis Vassiliou , Panos Vassiliadis (Hardcover, 17 January, 2003)
  324. Fundamentals of Database Systems (5th Edition) , by Ramez Elmasri , Shamkant B. Navathe (Hardcover, 07 March, 2006)
  325. Fundamentals of Database Systems, Fourth Edition - Ramez Elmasri (2003-07-23, Hardcover)
  326. Fundamentals of Network Security - Eric Maiwald (2003-11-07, Paperback)
  327. Geek House : 10 Hardware Hacking Projects for Around Home (ExtremeTech) , by Barry Press , Marcia Press (Paperback, 06 May, 2005)
  328. Geeks On Call Security and Privacy : 5-Minute Fixes (Geeks on Call) , by Geeks On Call (Paperback, 19 December, 2005)
  329. Geographic Data Mining & Knowledge Discovery , by Harvey J. Miller (Hardcover, 15 December, 2001)
  330. Getting Started With Sas 9.1 Text Miner , by SAS Publishing (Paperback, 30 April, 2004)
  331. Getting Started With Sas Enterprise Miner 4.3 , by Sas Institute (Paperback, 31 March, 2004)
  332. GoldMine for Dummies , by Joel Scott (Paperback, 07 March, 2000)
  333. Google : The Missing Manual - Sarah Milstein (2006-03-10, Paperback)
  334. Google : The Missing Manual , by Sarah Milstein , Rael Dornfest (Paperback, May, 2004)
  335. Google Analytics - Mary E. Tyler (2006-09-12, Paperback)
  336. Google Analytics 2.0 - Jerri L. Ledford (2007-09-04, Paperback)
  337. Google and Other Search Engines (Visual QuickStart Guide) , by Alfred Glossbrenner , Emily Glossbrenner , Diane Poremsky (Paperback, 11 May, 2004)
  338. Google and the Myth of Universal Knowledge : A View from Europe , by Jean-Noel Jeanneney , Ian Wilson , Teresa Lavender Fagan (Hardcover, 01 November, 2006)
  339. Google Hacks : Tips & Tools for Finding and Using the World's Information (Hacks) - Rael Dornfest (2006-08-03, Paperback)
  340. Google Powered : Productivity with Online Tools , by Jerri L. Ledford (Paperback, 23 January, 2007)
  341. Googlepedia : The Ultimate Google Resource , by Michael Miller (Paperback, 11 July, 2006)
  342. Graphical Models : Methods for Data Analysis and Mining , by Christian Borgelt , Rudolf Kruse (Hardcover, 15 March, 2002)
  343. Gray Hat Hacking : The Ethical Hacker's Handbook - Shon Harris (2004-11-09, Paperback)
  344. Grid Computing (On Demand Series) , by Joshy Joseph , Craig Fellenstein (Paperback, 30 December, 2003)
  345. Guide to Computer Forensics and Investigations, Second Edition - Amelia Phillips (2005-03-03, Paperback)
  346. Guide to Disaster Recovery - Michael Erbschloe (2003-03-10, Paperback)
  347. Guide to Network Defense and Countermeasures - Randy Weaver (2006-01-09, Paperback)
  348. Guide to Operating Systems Security , by Michael Palmer (Paperback, 19 November, 2003)
  349. Guide to Review of Library Collections : Preservation, Storage, and Withdrawal (Collection Management and Development Guides, 12) , by Dennis K. Lambert , Winston Atkins , Douglas A. Litts , Lorraine H. Olley , Association for Library Collection
  350. Hack I.T. : Security Through Penetration Testing , by T. J. Klevinsky , Scott Laliberte , Ajay Gupta (Paperback, February, 2002)
  351. Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios , by Mike Schiffman (Paperback, 01 October, 2001)
  352. Hacker's Challenge 2 : Test Your Network Security & Forensic Skills , by Mike Schiffman , Bill Pennington , David Pollino , Adam J. O'Donnell (Paperback, 18 December, 2002)
  353. Hacker's Challenge 3 , by David Pollino , Bill Pennington , Tony Bradley , Himanshu Dwivedi (Paperback, 25 April, 2006)
  354. Hacker's Delight - Henry S. Warren Jr. (2002-07-17, Hardcover)
  355. Hacker Disassembling Uncovered (Uncovered series) - Kris Kaspersky (2007-02-01, Paperback)
  356. Hackers : Heroes of the Computer Revolution - Steven Levy (2001-01, Paperback)
  357. Hacking : The Art of Exploitation - Jon Erickson (2003-10, Paperback)
  358. Hacking Digital Cameras (ExtremeTech) , by Chieh Cheng , Auri Rahimzadeh (Paperback, 23 September, 2005)
  359. Hacking Exposed 5th Edition (Hacking Exposed) - Stuart McClure (2005-04-19, Paperback)
  360. Hacking Exposed Cisco Networks (Hacking Exposed) , by Andrew Vladimirov , Konstantin Gavrilenko , Andrei Mikhailovsky (Paperback, 15 December, 2005)
  361. Hacking Exposed Computer Forensics (Hacking Exposed) , by Chris Davis , Aaron Philipp , David Cowen (Paperback, 22 November, 2004)
  362. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) - Joel Scambray (2006-06-05, Paperback)
  363. Hacking Exposed Wireless (Hacking Exposed) - Johnny Cache (2007-03-26, Paperback)
  364. Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech) , by Mel Reyes (Paperback, 05 August, 2005)
  365. Hacking For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2006-10-30, Paperback)
  366. Hacking GMail (ExtremeTech) , by Ben Hammersley (Paperback, 19 December, 2005)
  367. Hacking RSS and Atom , by Leslie M. Orchard (Paperback, 09 September, 2005)
  368. Hacking the Code : ASP.NET Web Application Security , by Mark Burnett (Paperback, May, 2004)
  369. Hacking the Xbox : An Introduction to Reverse Engineering , by Andrew Huang (Paperback, July, 2003)
  370. Hacking Windows XP (ExtremeTech) - Steve Sinchak (2004-08-06, Paperback)
  371. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2005-09-13, Paperback)
  372. Hackish PC Pranks & Cracks , by Michael Flenov (Paperback, ..)
  373. Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) , by Alfred J. Menezes , Paul C. van Oorschot , Scott A. Vanstone (Hardcover, 16 October, 1996)
  374. Hands-On Ethical Hacking and Network Defense - Michael T. Simpson (2005-10-19, Paperback)
  375. Hardening Cisco Routers (O'Reilly Networking) , by Thomas Akin (Paperback, February, 2002)
  376. Healthcare Information Management Systems : Cases, Strategies, and Solutions (Health Informatics) , by Marion Ball , Charlotte A. Weaver , Joan M. Kiel (Hardcover, 03 June, 2004)
  377. Highly Available Storage for Windows Servers , by Paul Massiglia (Hardcover, 15 December, 2001)
  378. Holy Grail of Data Storage Management, The , by Jon William Toigo , Margaret Romao Toigo , Jon W. Toigo (Hardcover, 16 August, 1999)
  379. Home Theater Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Brett McLaughlin (Paperback, 01 November, 2004)
  380. Homeland Security Techniques & Technologies (Networking Series) , by Jesus Mena (Paperback, 15 May, 2004)
  381. Honeypots : Tracking Hackers , by Lance Spitzner (Paperback, 10 September, 2002)
  382. How Personal & Internet Security Works (How It Works) , by Preston Gralla (Paperback, 31 May, 2006)
  383. How to Cheat at Managing Information Security , by Mark Osborne , Paul M Summitt (Paperback, 17 July, 2006)
  384. How to Do Everything with Google , by Fritz Schneider , Nancy Blachman , Eric Fredricksen (Paperback, 21 November, 2003)
  385. HP-UX 11i Internals (Hewlett-Packard Professional Books) , by Chris Cooper , Chris Moore (Paperback, ..)
  386. HP-UX 11i Security , by Chris Wong (Paperback, 24 September, 2001)
  387. Human Sexuality : Diversity in Contemporary America with SexSource CD-ROM and PowerWeb , by Bryan Strong , Christine DeVault , Barbara Sayad , William Yarber (Paperback, 20 February, 2004)
  388. Hunting Security Bugs , by Tom Gallagher , Lawrence Landauer , Bryan Jeffries (Paperback, 09 June, 2006)
  389. I-Way Robbery : Crime on the Internet , by William C. Boni , Gerald L. Kovacich (Paperback, 18 May, 1999)
  390. I Found It on the Internet : Coming of Age Online , by Frances Jacobson Harris (Paperback, 01 April, 2005)
  391. IBM Data Warehousing : With IBM Business Intelligence Tools , by Michael L. Gonzales , Michael L. Gonzales (Paperback, 10 January, 2003)
  392. Image and Video Encryption : From Digital Rights Management to Secured Personal Communication (Advances in Information Security) , by Andreas Uhl , Andreas Pommer (Hardcover, 04 November, 2004)
  393. Implementing a Data Warehouse : A methodology that worked , by Bruce Russell Ullrey (Paperback, 23 March, 2007)
  394. Implementing Backup and Recovery : The Readiness Guide for the Enterprise , by David B Little , David A. Chapa (Paperback, 16 May, 2003)
  395. Implementing Biometric Security , by John Chirillo , Scott Blaul (Paperback, 01 April, 2003)
  396. Implementing CIFS : The Common Internet File System , by Christopher Hertel , Christopher R. Hertel (Paperback, 14 August, 2003)
  397. Implementing Database Security and Auditing : Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase , by Ron Ben Natan (Paperback, 18 April, 2005)
  398. Implementing Elliptic Curve Cryptography , by Michael Rosing (Paperback, October, 1998)
  399. Implementing SAP R/3 : The Guide for Business and Technology Managers (Other Programming) , by Vivek Kale (Paperback, January, 2000)
  400. Implementing SAP R/3 : The Guide for Business and Technology Managers , by Vivek Kale (Digital, ..)
  401. Implementing SAP R/3 Sales and Distribution - Glynn C. Williams (2000-02-24, Paperback)
  402. Implementing SSH : Strategies for Optimizing the Secure Shell , by Himanshu Dwivedi (Paperback, 31 October, 2003)
  403. Impossible Data Warehouse Situations : Solutions from the Experts , by Sid Adelman , Joyce Bischoff , Jill Dyche , Douglas Hackney , Sean Ivoghli , Chuck Kelley , David Marco , Larissa T. Moss , Clay Rehm , Larissa Moss (Paperback, 01 October, 2002)
  404. Impromptu Startup! , by Brian Olah (Paperback, 06 July, 2000)
  405. Improving .NET Application Performance and Scalability (Patterns & Practices) - Microsoft Corporation (2004-07-28, Paperback)
  406. Improving Data Warehouse and Business Information Quality : Methods for Reducing Costs and Increasing Profits , by Larry P. English (Paperback, 11 March, 1999)
  407. Improving Web Application Security : Threats and Countermeasures , by Microsoft Corporation (Paperback, 24 September, 2003)
  408. Incident Response : Computer Forensics Toolkit , by Douglas Schweitzer (Paperback, 11 April, 2003)
  409. Incident Response and Computer Forensics, Second Edition - Chris Prosise (2003-07-17, Paperback)
  410. Inferno Programming with Limbo , by Phillip Stanley-Marbell (Paperback, 26 March, 2003)
  411. Information Fusion in Data Mining (Studies in Fuzziness and Soft Computing) , by Vicenç Torra (Hardcover, 29 July, 2003)
  412. Information Hiding : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Lecture Notes in Computer Science) , by Mauro Barni , Jordi Herrera Joancomartí , Stefan Katzenbeisser , Fernando Perez-Gonzalez (Paperback, October, 2005)
  413. Information Literacy and Technology - Carla List-Handley (2005-05-01, Paperback)
  414. Information Retrieval : Algorithms and Heuristics (The Information Retrieval Series)(2nd Edition) , by David A. Grossman , Ophir Frieder (Paperback, 23 January, 2006)
  415. Information Security : Principles and Practice - Mark Stamp (2005-10-28, Hardcover)
  416. Information Security : Protecting the Global Enterprise , by Donald L. Pipkin , Donald Pipkin (Paperback, ..)
  417. Information Security Illuminated (Jones and Barlett Illuminated) - Michael G. Solomon (2005-04-25, Paperback)
  418. Information Security Management Handbook on CD-ROM, 2006 Edition , by Harold F. Tipton , Micki Krause (CD-ROM, 06 April, 2006)
  419. Information Security Management Handbook, Fifth Edition , by Harold F. Tipton , Micki Krause (Hardcover, 30 December, 2003)
  420. Information Security Management Handbook, Sixth Edition (Isc2 Press) - Harold F. Tipton (2007-05-14, Hardcover)
  421. Information Security Policies and Procedures : A Practitioner's Reference, Second Edition , by Thomas R. Peltier (Hardcover, 20 May, 2004)
  422. Information Security Policies, Procedures, and Standards : Guidelines for Effective Information Security Management , by Thomas R. Peltier (Paperback, 20 December, 2001)
  423. Information Security Risk Analysis, Second Edition - Thomas R. Peltier (2005-04-26, Hardcover)
  424. Information Seeking in Electronic Environments (Cambridge Series on Human-Computer Interaction) - Gary Marchionini (1997-03-13, Paperback)
  425. Information Storage and Retrieval , by Robert R. Korfhage (Hardcover, 27 May, 1997)
  426. Information Storage and Retrieval Systems : Theory and Implementation (The Kluwer International Series on Information Retrieval) , by Gerald J. Kowalski , Mark T. Maybury (Hardcover, 30 September, 2000)
  427. Information Systems Today : Managing in the Digital World (3rd Edition) - Leonard Jessup (2007-03-29, Hardcover)
  428. Information Technology : Inside and Outside (With CD-ROM) - David Cyganski (2001-01-15, Paperback)
  429. Information Visualization : Beyond the Horizon , by Chaomei Chen (Paperback, 24 May, 2006)
  430. Information Visualization in Data Mining and Knowledge Discovery (The Morgan Kaufmann Series in Data Management Systems) , by Usama Fayyad , Georges Grinstein , Andreas Wierse (Hardcover, 14 September, 2001)
  431. Information Warfare & Security - Dorothy E. Denning (1998-12-10, Paperback)
  432. Inside Java 2 Platform Security : Architecture, API Design, and Implementation (2nd Edition) , by Li Gong , Gary Ellison , Mary Dageforde (Paperback, 27 May, 2003)
  433. Inside MapInfo Professional , by Larry Daniel , Paula Loree , Angela Whitener (Paperback, 18 May, 2001)
  434. Inside Microsoft SQL Server (tm) 2005 : The Storage Engine - Kalen Delaney (2006-11-08, Paperback)
  435. Inside Windows Storage : Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond , by Dilip C. Naik , Dilip Naik (Paperback, 15 July, 2003)
  436. Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft , by Eric Cole , Sandra Ring (Paperback, 01 March, 2006)
  437. InsideScoop to 70-227 Microsoft Windows 2000 Server Enterprise Certification Exam (With CD Exam) (InsideScoop S.) , by Michael Yu Chak Tin (Paperback, 27 January, 2002)
  438. Intelligence and Security Informatics : First Nsf/Nij Symposium, Isi 2003, Tucson, Az, Usa, June 2-3, 2003 : Proceedings (Lecture Notes in Computer Science, 2665) , by Isi 200 , Hsinchun Chen , Richard Miranda , Daniel D. Zeng , Chris Demchak , Therani Madhusudan (Paperback, August, 2003)
  439. Intelligence and Security Informatics for International Security : Information Sharing and Data Mining (Integrated Series in Information Systems) , by Hsinchun Chen (Hardcover, 10 February, 2006)
  440. Intelligent Agents for Data Mining and Information Retrieval , by Masoud Mohammadian (Hardcover, February, 2004)
  441. Intelligent Agents for Data Mining and Information Retrieval , by Masoud Mohammadian (Paperback, 01 February, 2004)
  442. Intelligent Data Analysis , by Michael Berthold , David J. Hand (Hardcover, January, 2007)
  443. Intelligent Data Engineering and Automated Learning - Ideal 2000 : Data Mining, Financial Engineering, and Intelligent Agents : Second International Conference, Shatin, N.T., Hong Kong, December 2000 : Proceedings (Lecture Notes in Computer Scienc
  444. Internet Cryptography , by Richard E. Smith (Paperback, 15 January, 1997)
  445. Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) , by Jelena Mirkovic , Sven Dietrich , David Dittrich , Peter Reiher (Paperback, 30 December, 2004)
  446. Internet Explorer 6 for Dummies , by Doug Lowe (Paperback, 29 September, 2001)
  447. Internet Security : Cryptographic Principles, Algorithms and Protocols , by Man Young Rhee (Hardcover, 31 March, 2003)
  448. Introduction to Computer Security - Matt Bishop (2004-10-26, Hardcover)
  449. Introduction to Cryptography (Undergraduate Texts in Mathematics) , by Johannes Buchmann (Paperback, 13 July, 2004)
  450. Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems) , by Khalid Sayood (Hardcover, 01 December, 2005)
  451. Introduction to Data Mining Using SAS Enterprise Miner , by patricia B. Cerrito (Paperback, 16 February, 2007)
  452. Introduction to Data Mining, (First Edition) - Pang-Ning Tan (2005-05-02, Hardcover)
  453. Introduction to Distributed Algorithms , by Gerard Tel (Paperback, 15 February, 2001)
  454. Introduction to Modern Information Retrieval - G. G. Chowdhury (2003-12-01, Paperback)
  455. Introduction to MultiAgent Systems , by Michael Wooldridge (Paperback, 12 June, 2002)
  456. Intrusion Detection with SNORT : Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID , by Rafeeq Rehman (Paperback, 08 May, 2003)
  457. Intrusion Signatures and Analysis , by Mark Cooper , Stephen Northcutt , Matt Fearnow , Karen Frederick (Paperback, 29 January, 2001)
  458. Investigative Data Mining for Security and Criminal Detection, First Edition , by Jesus Mena (Paperback, 31 January, 2003)
  459. IT Architectures and Middleware : Strategies for Building Large, Integrated Systems (2nd Edition) (Unisys Series) - Chris Britton (2004-05-24, Paperback)
  460. IT Governance : A Manager's Guide to Data Security and BS 7799/ISO 17799 , by Alan Calder , Steve Watkins (Paperback, August, 2005)
  461. J2EE 1.4 Essentials , by Aaron E. Walsh (Paperback, 21 February, 2003)
  462. Jaguar Development With Powerbuilder 7 (Powerbuilder Developer's Library) , by Michael Barlotta , Mike Barlotta (Paperback, August, 1999)
  463. Java Data Mining : Strategy, Standard, and Practice : A Practical Guide for architecture, design, and implementation (The Morgan Kaufmann Series in Data Management Systems) , by Mark F. Hornick , Erik Marcade , Sunil Venkayala (Paperback, 07 November, 2006)
  464. Java in Distributed Systems : Concurrency, Distribution and Persistence , by Marko Boger (Paperback, 16 May, 2001)
  465. Java Security (2nd Edition) , by Scott Oaks (Paperback, 17 May, 2001)
  466. Java Security Solutions , by Rich Helton , Johennie Helton , Rich Helton , Johennie Helton (Paperback, 01 May, 2002)
  467. Java Tools : Using XML, EJB, CORBA, Servlets and SOAP , by Andreas Eberhart , Stefan Fischer (Paperback, 15 March, 2002)
  468. Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 24 July, 2006)
  469. Joe Celko's Data and Databases : Concepts in Practice (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 19 June, 2006)
  470. Joe Celko's SQL for Smarties : Advanced SQL Programming Third Edition (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 15 August, 2005)
  471. Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 21 September, 2006)
  472. JSTOR : A History , by Hal Varian , Roger C. Schonfeld (Hardcover, 27 May, 2003)
  473. JXTA in a Nutshell , by Scott Oaks , Bernard Traversat , Li Gong (Paperback, September, 2002)
  474. Kerberos : The Definitive Guide - Jason Garman (2003-08-26, Paperback)
  475. Know Your Enemy : Learning about Security Threats (2nd Edition) , by Honeynet Project The (Paperback, 17 May, 2004)
  476. Knowledge Management in Fuzzy Databases (Studies in Fuzziness and Soft Computing) , by Olga Pons , Maria A. Vila , Janusz Kacprzyk (Hardcover, 15 March, 2000)
  477. Lab Manual For Security + Guide To Network Security Fundamentals - Paul Cretaro (2004-08-19, Paperback)
  478. Learning MySQL (Learning) - Seyed M.M. (Saied) Tahaghoghi (2006-11-14, Paperback)
  479. Learning SQL , by Alan Beaulieu (Paperback, 22 August, 2005)
  480. Learning SQL on SQL Server 2005 , by Richard Earp , Sikha Bagui (Paperback, 01 May, 2006)
  481. Leo Laporte's Guide to TiVo , by Leo Laporte , Gareth Branwyn (Paperback, 07 October, 2004)
  482. Leonardo's Laptop : Human Needs and the New Computing Technologies , by Ben Shneiderman (Paperback, 01 September, 2003)
  483. Linux Enterprise Cluster : Build a Highly Available Cluster with Commodity Hardware and Free Software - Karl Kopper (2005-05-15, Paperback)
  484. Linux Firewalls (3rd Edition) (Novell Press) , by Steve Suehring , Robert Ziegler (Paperback, 14 September, 2005)
  485. Linux Security (Craig Hunt Linux Library) , by Ramon J. Hontanon (Paperback, 14 June, 2001)
  486. Linux Server Security , by Michael D Bauer (Paperback, 18 January, 2005)
  487. Machine Learning and Data Mining for Computer Security : Methods and Applications (Advanced Information and Knowledge Processing) , by Marcus A. Maloof (Hardcover, 01 September, 2005)
  488. Magnetic Information Storage Technology (Electromagnetism) , by Shan X. Wang , Alex M. Taratorin (Hardcover, 28 April, 1999)
  489. Making Sense of Data : A Practical Guide to Exploratory Data Analysis and Data Mining , by Glenn J. Myatt (Paperback, 28 November, 2006)
  490. Malicious Cryptography : Exposing Cryptovirology , by Adam Young , Moti Yung (Paperback, 27 February, 2004)
  491. Malware : Fighting Malicious Code - Ed Skoudis (2003-11-09, Paperback)
  492. Management of Information Security , by Michael E. Whitman , Herbert J. Mattord (Paperback, 27 January, 2004)
  493. Managing AFS : The Andrew File System , by Richard Campbell (Paperback, 03 February, 1998)
  494. Managing Business with SAP : : Planning Implementation and Evaluation , by Linda Lau (Hardcover, 22 March, 2005)
  495. Managing Business With SAP : Planning, Implementation and Evaluation , by Linda K. Lau (Paperback, 01 July, 2004)
  496. Managing Cybersecurity Resources : A Cost-Benefit Analysis (The Mcgraw-Hill Homeland Security Series) , by Lawrence A. Gordon , Martin P. Loeb (Hardcover, 28 September, 2005)
  497. Managing Data Mining : Advice from Experts (IT Solutions series) , by Stephan Kudyba (Paperback, 01 April, 2004)
  498. Managing Gigabytes : Compressing and Indexing Documents and Images (The Morgan Kaufmann Series in Multimedia Information and Systems) - Ian H. Witten (1999-05-15, Hardcover)
  499. Managing Security with Snort and IDS Tools , by Christopher Gerg , Kerry J. Cox (Paperback, August, 2004)
  500. Managing Time and Space in the Modern Warehouse : With Ready-To-Use Forms, Checklists & Documentation , by Ernst F. Bolten (Plastic Comb, ..)
  501. Mapping Hacks : Tips & Tools for Electronic Cartography (Hacks) , by Schuyler Erle , Rich Gibson , Jo Walsh (Paperback, 09 June, 2005)
  502. Master Data Management and Customer Data Integration for a Global Enterprise - Alex Berson (2007-05-24, Paperback)
  503. Mastering Data Mining : The Art and Science of Customer Relationship Management , by Michael J. A. Berry , Gordon S. Linoff (Paperback, 28 December, 1999)
  504. Mastering Data Warehouse Aggregates : Solutions for Star Schema Performance - Christopher Adamson (2006-07-19, Paperback)
  505. Mastering Data Warehouse Design : Relational and Dimensional Techniques , by Claudia Imhoff , Nicholas Galemmo , Jonathan G. Geiger (Paperback, 08 August, 2003)
  506. Mastering FreeBSD and OpenBSD Security , by Yanek Korff , Paco Hope , Bruce Potter (Paperback, December, 2004)
  507. Mastering Network Security , by Chris Brenton , Cameron Hunt (Paperback, 07 October, 2002)
  508. Mastering the SAP Business Information Warehouse , by Kevin McDonald , Andreas Wilmsmeier , David C. Dixon (Hardcover, 23 August, 2002)
  509. Mastering the SAP Business Information Warehouse : Leveraging the Business Intelligence Capabilities of SAP NetWeaver - Kevin McDonald (2006-08-28, Hardcover)
  510. Mastering Web Services Security , by Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto , Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto (Paperback, 06 January, 2003)
  511. Materialized Views : Techniques, Implementations, and Applications , by Ashish Gupta , Inderpal Singh Mumick (Paperback, 04 June, 1999)
  512. Maximum PC Guide to Extreme PC Mods (Maximum PC Guide To...) , by Paul Capello , Jon Phillips (Paperback, 21 December, 2004)
  513. MCSA/MCSE Self-Paced Training Kit (Exam 70-350) : Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification) - Stan Reimer (2005-04-13, Hardcover)
  514. MCSE Self-Paced Training Kit (Exam 70-298) : Designing Security for a Microsoft Windows Server 2003 Network (Training Kit) - Roberta Bragg (2004-02-04, Hardcover)
  515. MCSE Training Guide (70-227) : Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000 , by Roberta Bragg (Paperback, 03 July, 2001)
  516. MDX Solutions : With Microsoft SQL Server Analysis Services , by George Spofford (Paperback, 20 July, 2001)
  517. MDX Solutions : With Microsoft SQL Server Analysis Services 2005 and Hyperion Essbase - George Spofford (2006-03-06, Paperback)
  518. Medical Informatics : Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems) , by Hsinchun Chen , Sherrilynne S. Fuller , Carol Friedman , William Hersh (Hardcover, 21 June, 2005)
  519. Metadata Solutions : Using Metamodels, Repositories, XML, and Enterprise Portals to Generate Information on Demand , by Adrienne Tannenbaum (Paperback, 14 August, 2001)
  520. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , by James Foster (Paperback, 01 September, 2007)
  521. Microcantilevers for Atomic Force Microscope Data Storage (Microsystems) , by Benjamin W. Chui (Hardcover, 01 March, 1999)
  522. Microsoft .NET Distributed Applications : Integrating XML Web Services and .NET Remoting - Matthew MacDonald (2003-02-12, Paperback)
  523. Microsoft .NET Remoting , by Scott McLean , James Naftel , Kim Williams , Scott , Naftel,James , Williams,Kim McLean (Paperback, 25 September, 2002)
  524. Microsoft Access 2003 Forms, Reports, and Queries (Business Solutions) - Paul McFedries (2004-08-18, Paperback)
  525. Microsoft ADO.NET (Core Reference) , by David Sceppa (Hardcover, 15 May, 2002)
  526. Microsoft Encyclopedia of Security , by Mitch Tulloch (Paperback, 16 July, 2003)
  527. Microsoft Exchange Server V5.5 : Planning, Design and Implementation , by Tony Redmond (Paperback, June, 1998)
  528. Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant (Pro-Administrator's Pocket Consultant) , by Bud Ratliff , Jason Ballard (Paperback, 11 January, 2006)
  529. Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed , by Michael Noel (Paperback, 24 August, 2005)
  530. Microsoft ISA Configuration and Administration , by Curt Simmons (Paperback, 01 May, 2001)
  531. Microsoft SQL Server 2005 Administrator's Companion (Pro - Administrator's Companion) , by Edward Whalen (Hardcover, 13 December, 2006)
  532. Microsoft Vista for It Security Professionals , by Anthony Piltzecker , Tony Piltzecker (Paperback, 23 February, 2007)
  533. Microsoft Windows 2000 Server Distributed Systems Guide , by Microsoft Corporation , Microsoft Corporation (Paperback, 17 April, 2002)
  534. Mike Meyers' Security+ Certification Passport (Passport) , by Trevor Kay (Paperback, 06 January, 2003)
  535. Mind Hacks : Tips & Tricks for Using Your Brain (Hacks) - Tom Stafford (2004-11-22, Paperback)
  536. Mining Amazon Web Services : Building Applications with the Amazon API , by John Paul Mueller , Sybex (Paperback, 23 January, 2004)
  537. Mining Google Web Services : Building Applications with the Google API , by John Paul Mueller , Sybex (Paperback, 23 April, 2004)
  538. Mining Graph Data , by Diane J. Cook , Lawrence B. Holder (Hardcover, 28 November, 2006)
  539. Mining Imperfect Data : Dealing With Contamination And Incomplete Records , by Ronald K. Pearson (Paperback, 04 April, 2005)
  540. Mining the Web : Discovering Knowledge from Hypertext Data - Soumen Chakrabarti (2002-08-15, Hardcover)
  541. Mining the Web : Transforming Customer Data , by Gordon S. Linoff , Michael J. A. Berry (Paperback, ..)
  542. Mining the World Wide Web - An Information Search Approach (The Kluwer International Series on Information Retrieval, Volume 10) (The Kluwer International Series on Information Retrieval) , by George Chang , Marcus Healey , James A. M. McHugh , T.L. Wang (Hardcover, 01 June, 2001)
  543. Mining Very Large Databases with Parallel Processing (Advances in Database Systems) , by Alex A. Freitas , Simon H. Lavington (Hardcover, 30 November, 1997)
  544. Minoli-Cordovana's Authoritative Computer & Network Security Dictionary , by Daniel Minoli , James Cordovana (Paperback, ..)
  545. Mission-Critical Security Planner : When Hackers Won't Take No for an Answer , by Eric Greenberg , Eric Greenberg (Paperback, January, 2003)
  546. Mission Critical Systems Management , by Yuval Lirov (Paperback, 18 April, 1997)
  547. Mobility, Security and Web Services : Technologies and Service-oriented Architectures for a New Era of IT Solutions , by Gerhard Wiehler (Hardcover, 13 August, 2004)
  548. Modern Cryptography : Theory and Practice , by Wenbo Mao (Hardcover, 25 July, 2003)
  549. Modern Database Management (8th Edition) , by Jeffrey A. Hoffer , Mary Prescott , Fred McFadden (Hardcover, 10 March, 2006)
  550. Multimedia Security Technologies for Digital Rights Management , by Wenjun Zeng , Heather Yu , Ching-Yung Lin (Hardcover, 06 July, 2006)
  551. mySAP HR Interview Questions, Answers, and Explanations : SAP HR Certification Review , by Jim Stewart (Paperback, 30 December, 2005)
  552. mySAP Tool Bag for Performance Tuning and Stress Testing (HP Professional Series) , by George W. Anderson (Paperback, 25 June, 2004)
  553. MySQL Stored Procedure Programming , by Guy Harrison , Steven Feuerstein (Paperback, 28 March, 2006)
  554. Net Crimes & Misdemeanors : Outmaneuvering Web Spammers, Stalkers, and Con Artists , by Vinton Cerf , J. A. Hitchcock , Loraine Page (Paperback, 15 May, 2006)
  555. Network Distributed Computing : Fitscapes and Fallacies , by Max K. Goff (Paperback, 07 December, 2003)
  556. Network Intrusion Detection (3rd Edition) , by Stephen Northcutt , Judy Novak (Paperback, 27 August, 2002)
  557. Network Security : Private Communication in a Public World, Second Edition , by Charlie Kaufman , Radia Perlman , Mike Speciner (Hardcover, 15 April, 2002)
  558. Network Security : The Complete Reference - Mark Rhodes-Ousley (2003-11-17, Paperback)
  559. Network Security Assessment : Know Your Network , by Chris McNab (Paperback, 01 March, 2004)
  560. Network Security Essentials : Applications and Standards (3rd Edition) , by William Stallings (Paperback, 19 July, 2006)
  561. Network Security Evaluation : Using the NSA IEM , by Russ Rogers , Ed Fuller , Greg Miles , Matthew Hoagberg , Travis Schack , Ted Dykstra , Bryan Cunningham , Chuck Little (Paperback, 09 August, 2005)
  562. Network Security for Dummies - Chey Cobb (2002-10-10, Paperback)
  563. Network Security Hacks , by Andrew Lockhart (Paperback, 01 April, 2004)
  564. Network Security Hacks : Tips & Tools for Protecting Your Privacy (Hacks) , by Andrew Lockhart (Paperback, 30 October, 2006)
  565. Network Security JumpStart , by Matthew Strebe , Matthew Strebe (Paperback, 15 August, 2002)
  566. Next Generation of Data-Mining Applications , by Mehmed Kantardzic , Jozef Zurada (Hardcover, 25 February, 2005)
  567. Nortel Guide to VPN Routing for Security and VoIP , by James Edwards , Richard Bramante , Al Martin (Hardcover, 14 August, 2006)
  568. Norton All-In-One Desk Reference For Dummies (For Dummies (Computer/Tech)) , by Kate J. Chase (Paperback, 01 April, 2005)
  569. Number Theory in Science and Communication : With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity (Springer Series in Information Sciences) , by M.R. Schroeder (Hardcover, 19 December, 2005)
  570. Object-Oriented Data Warehouse Design : A Star Schema , by William A. Giovinazzo , William Giovinazzo (Paperback, 16 February, 2000)
  571. Object-Oriented Modeling and Design for Database Applications , by Michael R Blaha , William Premerlani (Hardcover, 17 July, 1997)
  572. OCP : Oracle 10g Administration II Study Guide : Exam 1Z0-043 , by Doug Stuns , Tim Buterbaugh , Bob Bryla (Paperback, 22 February, 2005)
  573. Official (ISC)2 Guide to the CISSP-ISSEP CBK , by CISSP, Susan Hansche (Hardcover, 01 January, 2005)
  574. Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press) , by Diana-Lynn Contesti , Douglas Andre , Eric Waxvik , Paul A. Henry , Bonnie A. Goins (Hardcover, 27 April, 2007)
  575. On Time Within Budget : Software Project Management Practices and Techniques, 3rd Edition , by E. M. Bennatan (Paperback, 24 May, 2000)
  576. Online GIS and Metadata , by David G. Green , Terry Bossomaier (Paperback, December, 2001)
  577. Optimal Database Marketing : Strategy, Development, and Data Mining - Ronald G. Drozdenko (2002-03-26, Hardcover)
  578. Oracle 10g Data Warehousing - Lilian Hobbs (2004-11-17, Paperback)
  579. Oracle 10g RAC Grid, Services & Clustering , by Murali Vallath (Paperback, 25 May, 2006)
  580. Oracle 8i Data Warehousing , by Lilian Hobbs , Susan Hillson (Paperback, 01 November, 1999)
  581. Oracle Backup & Recovery 101 (Paperback, 01 March, 2002)
  582. Oracle Data Warehouse Management , by Mike Ault (Digital, ..)
  583. Oracle Data Warehouse Tuning for 10g , by Gavin JT Powell (Paperback, 30 August, 2005)
  584. Oracle Data Warehousing and Business Intelligence Solutions - Robert Stackowiak (2007-01-10, Paperback)
  585. Oracle Database Foundations : Technology Fundamentals for IT Success , by Bob Bryla (Paperback, 12 October, 2004)
  586. Oracle DBA Guide to Data Warehousing and Star Schemas , by Bert Scalzo (Paperback, 04 June, 2003)
  587. Oracle E-Business Suite Manufacturing & Supply Chain Management - Bastin Gerald (2001-12-18, Paperback)
  588. Oracle E-Business Suite Security (Oracle) , by John Abel (Paperback, 08 August, 2006)
  589. Oracle Privacy Security Auditing : Includes Federal Law Compliance with HIPAA, Sarbanes Oxley & The Gramm Leach Bliley Act GLB , by Arup Nanda , Donald K. Burleson (Paperback, 01 December, 2003)
  590. Oracle9i RMAN Backup & Recovery , by Robert G. Freeman , Matthew Hart (Paperback, 18 October, 2002)
  591. Ordinary Shares. Exotic Methods : Financial Forecasting Using Data Mining Techniques , by Francis E. H. Tay , Francis Tay Eng Hock , Lixiang Shen , Lijuan Cao , Francis Eng-Hock Tay (Hardcover, 01 April, 2003)
  592. Outsourcing Information Security (Computer Security Series) , by C. Warren Axelrod (Hardcover, 30 September, 2004)
  593. Own Your Space : Keep Yourself and Your Stuff Safe Online (Symantec Press) , by Linda McCarthy (Paperback, 12 October, 2006)
  594. Palm & Treo Hacks , by Scott MacHaffie (Paperback, 01 September, 2005)
  595. Parallel and Distributed Programming Using C++ , by Cameron Hughes , Tracey Hughes , Tracy Hughes (Hardcover, 29 August, 2003)
  596. Pattern Recognition Algorithms for Data Mining , by Sankar K. Pal (Hardcover, 27 May, 2004)
  597. PC Magazine Windows Vista Security Solutions (PC Magazine) , by Dan DiNicolo (Paperback, 23 January, 2007)
  598. PC Magazine Windows XP Security Solutions (PC Magazine) , by Dan DiNicolo (Paperback, 05 December, 2005)
  599. Penetration Testing and Network Defense (Networking Technology) , by Andrew Whitaker , Daniel Newman (Paperback, 31 October, 2005)
  600. Perfect Passwords : Selection, Protection, Authentication , by Mark Burnett , Dave Kleiman (Paperback, 03 January, 2006)
  601. Perspectives of Systems Informatics : 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, ... Papers (Lecture Notes in Computer Science) , by Manfred Broy , Alexandre V. Zamulin (Paperback, 05 March, 2004)
  602. Pfc Programmer's Reference Manual , by Richard Brooks (Paperback, 24 April, 1998)
  603. PGP & GPG : Email for the Practical Paranoid , by Michael W Lucas (Paperback, 01 April, 2006)
  604. PGP : Pretty Good Privacy , by Simson Garfinkel (Paperback, 01 December, 1994)
  605. Phishing : Cutting the Identity Theft Line , by Rachael Lininger , Russell Dean Vines (Paperback, 06 May, 2005)
  606. Physical and Logical Security Convergence : Powered By Enterprise Security Management , by Brian T. Contos , Colby Derodeff , William P. Crowell , Dan Dunkel (Paperback, 13 May, 2007)
  607. Physical Database Design : the database professional's guide to exploiting indexes, views, storage, and more (The Morgan Kaufmann Series in Data Management ... Kaufmann Series in Data Management Systems) , by Sam S. Lightstone , Toby J. Teorey , Tom Nadeau (Paperback, 21 March, 2007)
  608. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues , by Kapil Raina (Paperback, 11 April, 2003)
  609. Planning for PKI : Best Practices Guide for Deploying Public Key Infrastructure , by Russ Housley , Tim Polk (Paperback, 13 March, 2001)
  610. Podcasting Hacks : Tips and Tools for Blogging Out Loud (Hacks) , by Jack Herrington (Paperback, 19 August, 2005)
  611. Power Programming with RPC (Nutshell Handbooks) , by John Bloomer (Paperback, 01 February, 1992)
  612. PowerBuilder 9 : Advanced Client/Server Development , by Bruce Armstrong , Millard Brown (Paperback, 25 July, 2003)
  613. PowerBuilder 9 : Internet and Distributed Application Development , by William Green , John D. Olson (Paperback, 19 September, 2003)
  614. Practical Analysis and Design for Client/Server and GUI Systems (Yourdon Press Computing Series) , by David Ruble (Paperback, 26 June, 1997)
  615. Practical Cryptography - Niels Ferguson (2003-03-28, Paperback)
  616. Practical Hacking Techniques and Countermeasures , by Mark D. Spivey (Hardcover, 02 November, 2006)
  617. Practical PostgreSQL (O'Reilly Unix) , by Command Prompt Inc , John C. Worsley , Joshua D. Drake (Paperback, January, 2002)
  618. Practical VoIP Security , by Thomas Porter , Jan Kanclirz Jr. (Paperback, 01 March, 2006)
  619. Predictive Data Mining : a practical guide (The Morgan Kaufmann Series in Data Management Systems) , by Sholom M. Weiss , Nitin Indurkhya (Paperback, 01 August, 1997)
  620. Preventing Web Attacks with Apache , by Ryan C. Barnett (Paperback, 27 January, 2006)
  621. Principles and Practice of Information Security , by Linda Volonino , Stephen R. Robinson (Paperback, 02 September, 2003)
  622. Principles of Data Mining (Adaptive Computation and Machine Learning) , by David J. Hand , Heikki Mannila , Padhraic Smyth (Hardcover, 01 August, 2001)
  623. Principles of Distributed Systems : 8th International Conference, OPODIS 2004, Grenoble, France, December 15-17, 2004, Revised Selected Papers (Lecture Notes in Computer Science) , by Teruo Higashino (Paperback, 01 September, 2005)
  624. Principles of Information Security - Michael E. Whitman (2004-11-23, Paperback)
  625. Principles of Transaction Processing (The Morgan Kaufmann Series in Data Management Systems) , by Philip A. Bernstein , Eric Newcomer (Paperback, 15 January, 1997)
  626. Privacy on the Line : The Politics of Wiretapping and Encryption , by Whitfield Diffie , Susan Landau (Paperback, 26 February, 1999)
  627. Privacy on the Line : The Politics of Wiretapping and Encryption, Updated and Expanded Edition - Whitfield Diffie (2007-05-31, Hardcover)
  628. Pro SQL Server 2005 - Thomas Rizzo (2005-10-24, Paperback)
  629. Pro SQL Server 2005 Reporting Services , by Rodney Landrum , Walter J. Voytek II (Paperback, 26 October, 2005)
  630. Pro VS 2005 Reporting using SQL Server and Crystal Reports (Pro) - Kevin Goff (2006-11-17, Paperback)
  631. Proceedings 11th IEEE International Symposium on High Performance Distributed Computing Hpdc-11 2002 : 24-26 July 2002 Edinburgh, Scotland , by IEEE Computer Society (Paperback, September, 2002)
  632. Professional Pen Testing for Web Applications (Programmer to Programmer) - Andres Andreu (2006-07-05, Paperback)
  633. Professional Rootkits (Programmer to Programmer) , by Ric Vieler (Paperback, 12 March, 2007)
  634. Professional Windows Desktop and Server Hardening (Programmer to Programmer) , by Roger A. Grimes (Paperback, ..)
  635. Programming .NET Security , by Adam Freeman , Allen Jones (Paperback, June, 2003)
  636. Programming Microsoft SQL Server 2000 with XML, Second Edition , by Graeme Malcolm (Paperback, 12 June, 2002)
  637. Programming Web Services with SOAP , by James Snell , Doug Tidwell , Pavel Kulchenko (Paperback, 15 December, 2001)
  638. Programming Web Services with XML-RPC (O'Reilly Internet Series) , by Simon St. Laurent , Edd Dumbill , Joe Johnston (Paperback, June, 2001)
  639. Programming Windows Security , by Keith Brown (Paperback, 05 July, 2000)
  640. Prompt Connectivity Series : Data Warehousing , by Amitesh Sinha (Paperback, 13 September, 2001)
  641. Protect Your Windows Network : From Perimeter to Data (The Addison-Wesley Microsoft Technology Series) , by Jesper M. Johansson , Steve Riley (Paperback, 20 May, 2005)
  642. Protocols for Authentication and Key Establishment , by Colin Boyd , Anish Mathuria (Hardcover, 17 September, 2003)
  643. Proven Portals : Best Practices for Planning, Designing, and Developing Enterprise Portals , by Dan Sullivan (Paperback, 19 September, 2003)
  644. Pseudorandomness and Cryptographic Applications , by Michael George Luby , Michael Luby (Paperback, 08 January, 1996)
  645. Pthreads Programming : A POSIX Standard for Better Multiprocessing (O'Reilly Nutshell) - Bradford Nichols (1996-09-01, Paperback)
  646. Public Key Infrastructure : Building Trusted Applications and Web Services , by John R. Vacca (Hardcover, ..)
  647. Pure Corba , by Fintan Bolton (Paperback, 16 July, 2001)
  648. Puzzles for Hackers , by Ivan Sklyarov (Paperback, 01 July, 2005)
  649. R/3 Authorization Made Easy 4.6A/B , by SAP Labs Inc. R/3 Simplification Group , Incorporated SAP Labs , Inc. R/3 Simplification Group SAP Labs (Paperback, 16 February, 2000)
  650. Reading External Data Files Using Sas : Examples Handbook , by Michele M. Burlew (Paperback, December, 2002)
  651. Readings in Database Systems, 4th Edition , by Joseph M. Hellerstein , Michael Stonebraker (Paperback, 07 January, 2005)
  652. Real Digital Forensics : Computer Security and Incident Response - Keith J. Jones (2005-09-23, Paperback)
  653. Real World Microsoft Access Database Protection and Security , by Garry Robinson (Paperback, 17 October, 2003)
  654. Recent Issues on Fuzzy Databases (Studies in Fuzziness and Soft Computing) , by Gloria Bordogna , Gabriella Pasi (Hardcover, 15 January, 2000)
  655. Relational Data Mining , by Saso Dzeroski , Nada Lavrac (Hardcover, 02 October, 2001)
  656. Relational Database Design Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems) , by Jan L. Harrington (Paperback, 16 April, 2002)
  657. Reliable Distributed Systems : Technologies, Web Services, and Applications , by Kenneth P. Birman (Hardcover, 25 March, 2005)
  658. Research and Documentation in the Electronic Age - Diana Hacker (2005-12-28, Spiral-bound)
  659. Researching Online for Dummies (with CD-ROM) , by Reva Basch , Mary Ellen Bates (Paperback, 15 February, 2000)
  660. Resilient Storage Networks : Designing Flexible Scalable Data Infrastructures (Digital Press Storage Technology) , by Greg Schulz (Paperback, 07 April, 2004)
  661. Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy , by Stefan A. Brands (Hardcover, 28 August, 2000)
  662. RFID Essentials (Theory in Practice (O'Reilly)) , by Bill Glover , Himanshu Bhatt (Paperback, 19 January, 2006)
  663. RFID+ Exam Cram (Exam Cram 2) , by OTA Training (Paperback, 16 May, 2006)
  664. Rootkits : Subverting the Windows Kernel (Addison-Wesley Software Security Series) - Greg Hoglund (2005-07-22, Paperback)
  665. Rootkits for Dummies (For Dummies (Computer/Tech)) , by Larry Stevenson , Nancy Altholz (Paperback, 30 January, 2007)
  666. Rootkits, Spyware/Adware, Keyloggers and Backdoors : Detection and Neutralization , by Oleg Zaytsev (Paperback, 01 September, 2006)
  667. Safeware : System Safety and Computers (Paperback, 07 April, 1995)
  668. Samba Unleashed (Unleashed) , by Steve Litt (Paperback, 30 March, 2000)
  669. Sams Teach Yourself SAP in 24 Hours (2nd Edition) (Sams Teach Yourself) - George Anderson (2005-11-07, Paperback)
  670. Sams Teach Yourself SAP R/3 in 24 Hours , by Danielle Larocca (Digital, ..)
  671. SANS GIAC Certification : Security Essentials Toolkit (GSEC) , by Eric Cole , Mathew Newfield , John M. Millican , Stephen Northcutt (Paperback, 18 March, 2002)
  672. SAP : An Executive's Comprehensive Guide , by Norris , Dunleavy , Gibson , John Dunleavy , James R. Hurley , Alison Gibson , Ian Wright (Hardcover, 01 February, 2001)
  673. SAP ABAP Certification Review : SAP ABAP Interview Questions, Answers, And Explanations , by Barry Fewer (Paperback, ..)
  674. SAP Authorization System : Design and Implementation of Authorization concepts for SAP R/3 and SAP Enterprise Portals , by IBM Business Consulting GmbH (Hardcover, 16 September, 2003)
  675. SAP Basis Certification Questions : SAP Basis Interview Questions, Answers, and Explanations , by Jim Stewart (Paperback, 30 December, 2005)
  676. SAP Business One : Simple But Powerful , by Thomas Teufel , Monika Nguyen Nam , Roland Heun (Paperback, 30 March, 2005)
  677. SAP BW : A Step by Step Guide for BW 2.0 , by Biao Fu , Henry Fu (Paperback, 23 July, 2002)
  678. SAP BW Certification : A Business Information Warehouse Study Guide , by Catherine M. Roze (Paperback, 25 October, 2002)
  679. SAP BW Reporting Made Easy, 2.0B/2.1C , by SAP Labs Inc. Simplification Group (Paperback, 27 April, 2001)
  680. SAP BW Simplified : Part B of SAP and BW Data Warehousing How to Plan and Implement , by Arshad Khan (Paperback, 01 April, 2006)
  681. SAP BW Ultimate Interview Questions, Answers, and Explanations : SAP BW Certification Review , by Anurag Barua (Paperback, 30 December, 2005)
  682. SAP CRM Interview Questions, Answers, and Explanations : SAP Customer Relationship Management Certification Review , by Scott Cameron (Paperback, 15 April, 2006)
  683. SAP FICO Interview Questions, Answers, and Explanations : SAP FICO Certification Review , by Stuart Lee (Paperback, 28 February, 2006)
  684. SAP Hardware Solutions , by Michael Missbach , Uwe M. Hoffmann , Dr. Michael Missbach (Paperback, 15 December, 2000)
  685. SAP MM / PP Interview Questions, Answers, and Explanations : SAP Production Planning Certification , by Jim Stewart (Paperback, 28 February, 2006)
  686. SAP MM Certification And Interview Questions : SAP MM Interview Questions, Answers, And Explanations , by Jordan Schliem , Jim Stewart (Paperback, 15 November, 2005)
  687. SAP NetWeaver For Dummies - Dan Woods (2004-05-07, Paperback)
  688. SAP Planning : Best Practices in Implementation - George W. Anderson (2003-05-19, Paperback)
  689. SAP PM Interview Questions, Answers, and Explanations : SAP Plant Maintenance Certification Review , by Jim Stewart (Paperback, February, 2006)
  690. SAP PS FAQ : SAP Project Systems Interview Questions, Answers, and Explanations , by Terry Sanchez (Paperback, March, 2006)
  691. SAP Query Reporting - Danielle Larocca Signorile (2006-07-24, Paperback)
  692. SAP R/3 Business Blueprint : Understanding Enterprise Supply Chain Management (2nd Edition) , by Thomas A. Curran , Andrew Ladd (Paperback, 19 August, 1999)
  693. SAP R/3 Business Blueprint : Understanding the Business Process Reference Model (Enterprise Resource Planning Series) , by Thomas Curran , Gerhard Keller , Andrew Ladd (Paperback, 28 July, 1997)
  694. SAP R/3 FI Transactions (Business (Infinity Science Press)) - V. Narayanan (2006-11-01, Hardcover)
  695. SAP R/3 for Everyone : Step-by-Step Instructions, Practical Advice, and Other Tips and Tricks for Working with SAP - Jim Mazzullo (2005-07-15, Paperback)
  696. SAP R/3 Handbook, Third Edition - Jose Antonio Hernandez (2005-11-30, Paperback)
  697. SAP R/3 Implementation : Methods and Tools (SAP Excellence) , by Hans-Jurgen Appelrath , Jorg Ritter (Hardcover, 25 May, 2000)
  698. SAP R/3 System Administration : The Official SAP Guide , by Sigrid Hagemann , Liane Will (Hardcover, 05 October, 2002)
  699. SAP SD Interview Questions, Answers, and Explanations , by jim stewart (Paperback, 02 January, 2006)
  700. SAP Security : SAP Security Essentials , by Jim Stewart (Paperback, 30 December, 2005)
  701. SAP SEM BPS Interview Questions : Strategic Enterprise Management and Business Planning with SAP Sem , by Terry Sanchez (Paperback, 30 May, 2006)
  702. SAP Simplified : Part A of SAP and BW Data Warehousing How to Plan and Implement , by Arshad Khan (Paperback, 01 April, 2006)
  703. SAP SRM Advanced EBP Cookbook , by Jim Stewart (Paperback, 30 January, 2005)
  704. SAP(R) R/3(R) Plant Maintenance : Making It Work for Your Business - Britta Stengl (2001-05-18, Hardcover)
  705. SAPscript Made Easy 4.6 , by Inc. R/3 Simplification Group SAP Labs (Paperback, 26 January, 2000)
  706. SAS For Dummies (For Dummies (Computer/Tech)) - Stephen McDaniel (2007-06-12, Paperback)
  707. Search Engine Advertising : Buying Your Way to the Top to Increase Sales (VOICES) , by Catherine Seda (Paperback, 24 February, 2004)
  708. Search Engine Optimization : An Hour a Day - Jennifer Grappone (2006-06-13, Paperback)
  709. Search Engine Optimization For Dummies, Second Edition (For Dummies (Computer/Tech)) , by Peter Kent (Paperback, 08 May, 2006)
  710. Search Engine Visibility (2nd Edition) (Voices That Matter) - Shari Thurow (2007-08-29, Paperback)
  711. Search Engine Visibility , by Shari Thurow (Paperback, 30 December, 2002)
  712. Searching & Researching on the Internet & World Wide Web, 4th Edition - Karen Hartman (2004-07, Paperback)
  713. Secrets and Lies : Digital Security in a Networked World , by Bruce Schneier (Paperback, 30 January, 2004)
  714. Secrets of Computer Espionage : Tactics and Countermeasures , by Joel McNamara (Paperback, 02 June, 2003)
  715. Secure Architectures with OpenBSD , by Brandon Palmer , Jose Nazario (Paperback, 07 April, 2004)
  716. Secure Coding : Principles and Practices , by Mark G. Graff , Kenneth R. Van Wyk (Paperback, July, 2003)
  717. Secure Communicating Systems : Design, Analysis, and Implementation , by Michael R. A. Huth (Hardcover, 27 August, 2001)
  718. Secure Electronic Commerce : Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) , by Warwick Ford , Michael S. Baum (Paperback, 04 December, 2000)
  719. Secure Messaging with PGP and S/MIME , by Rolf Oppliger (Hardcover, 15 December, 2000)
  720. Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More , by John Viega , Matt Messier (Paperback, 14 July, 2003)
  721. Secure Programming with Static Analysis (Addison-Wesley Software Security Series) - Brian Chess (2007-06-29, Paperback)
  722. Securing the Network from Malicious Code : A Complete Guide to Defending Against Viruses, Worms, and Trojans , by Douglas Schweitzer (Paperback, 19 September, 2002)
  723. Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption , by Jothy Rosenberg , David Remy (Paperback, 12 May, 2004)
  724. Securing Windows NT/2000 Servers for the Internet , by Stefan Norberg (Paperback, November, 2000)
  725. Security and Usability : Designing Secure Systems That People Can Use , by Lorrie Faith Cranor , Simson Garfinkel (Paperback, 25 August, 2005)
  726. Security Assessment : Case Studies for Implementing the NSA IAM , by Russ Rogers , Greg Miles , Ed Fuller , Ted Dykstra (Paperback, 01 January, 2004)
  727. Security Awareness : Applying Practical Security in Your World - Mark Ciampa (2006-02-07, Paperback)
  728. Security Complete , by Sybex Inc. , Sybex Inc (Paperback, 12 September, 2002)
  729. Security Controls for Sarbanes-Oxley Section 404 IT Compliance : Authorization, Authentication, and Access , by Dennis C. Brewer (Paperback, 21 October, 2005)
  730. Security Engineering : A Guide to Building Dependable Distributed Systems - Ross J. Anderson (2001-01-22, Paperback)
  731. Security for Microsoft Visual Basic .NET , by Ed Robinson , Michael James Bond (Paperback, 28 May, 2003)
  732. Security for Ubiquitous Computing , by Frank Stajano (Hardcover, 15 June, 2002)
  733. Security in Computing (4th Edition) , by Charles P. Pfleeger , Shari Lawrence Pfleeger (Hardcover, 13 October, 2006)
  734. Security in Computing, Third Edition - Charles P. Pfleeger (2002-12-02, Hardcover)
  735. Security Warrior - Cyrus Peikari (2004-02-01, Paperback)
  736. Security+ Certification All-in-One Exam Guide - Gregory White (2003-06-27, Hardcover)
  737. Security+ Certification for Dummies , by Lawrence H. Miller , Peter H. Gregory (Paperback, 17 February, 2003)
  738. Security+ Certification Training Kit - Microsoft Corporation (2003-01-29, Hardcover)
  739. Security+ Exam Cram 2 (Exam Cram SYO-101) , by Kirk Hausman , Diane Barrett , Martin Weiss , Ed Tittel (Paperback, 10 April, 2003)
  740. Security+ Guide to Networking Security Fundamentals, Second Edition - Mark Ciampa (2004-10-19, Paperback)
  741. Security+ Practice Questions Exam Cram 2 (Exam SYO-101) (Exam Cram 2) , by Hans B. Sparbel , Ed Tittel (Paperback, 09 March, 2004)
  742. Security+ Prep Guide , by Ronald L. Krutz , Russell Dean Vines (Paperback, 03 March, 2003)
  743. Security+Fast Pass , by James Michael Stewart (Paperback, 19 October, 2004)
  744. SELinux by Example : Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) - Frank Mayer (2006-07-27, Paperback)
  745. Semantic Web Technologies : Trends and Research in Ontology-based Systems , by John Davies , Rudi Studer , Paul Warren (Hardcover, 11 July, 2006)
  746. Server Architectures : Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions , by Rene J. Chevance (Paperback, 15 December, 2004)
  747. Server Load Balancing , by Tony Bourke (Paperback, August, 2001)
  748. Server+ Guide to Advanced Hardware Support , by James I Conrad (Paperback, 23 August, 2001)
  749. Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks - Michal Zalewski (2005-04-15, Paperback)
  750. Smart Enough Systems : How to Deliver Competitive Advantage by Automating Hidden Decisions - James Taylor (2007-06-29, Paperback)
  751. Smart Home Hacks : Tips & Tools for Automating Your House (Hacks) - Gordon Meyer (2004-10-25, Paperback)
  752. Snort 2.1 Intrusion Detection, Second Edition , by Jay Beale , Caswell (Paperback, May, 2004)
  753. Snort Cookbook , by Angela Orebaugh , Simon Biles , Jacob Babbin (Paperback, 29 March, 2005)
  754. Snort for Dummies , by Charlie Scott , Paul Wolfe , Bert Hayes (Paperback, 09 July, 2004)
  755. Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security) - Brian Caswell (2007-02-01, Paperback)
  756. Sockets, Shellcode, Porting, & Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals , by James C. Foster , Stuart McClure (Paperback, 12 April, 2005)
  757. Software Development for Sap R/3 : Data Dictionary, Abap/4, Interfaces , by Ulrich Mende (Hardcover, 31 March, 2000)
  758. Spatial Databases : Technologies, Techniques and Trends , by Yannis Manolopoulos , Apostolos N. Papadopoulos , Michael Gr Vassilakopoulos (Hardcover, 31 December, 2004)
  759. Spatial Databases : With Application to GIS (The Morgan Kaufmann Series in Data Management Systems) , by Philippe Rigaux , Michel Scholl , Agnès Voisard (Hardcover, 18 May, 2001)
  760. Spidering Hacks - Kevin Hemenway (2003-11-01, Paperback)
  761. Spies Among Us : How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day , by Ira Winkler (Hardcover, 08 April, 2005)
  762. SPSS For Dummies (For Dummies (Computer/Tech)) - Arthur Griffith (2007-04-02, Paperback)
  763. SQL : The Complete Reference, Second Edition , by James R Groff , Paul N. Weinberg (Paperback, 28 August, 2002)
  764. SQL Server 2005 for Developers , by Robert Ericsson , Jason Cline (Paperback, 15 January, 2006)
  765. SQL Server DTS , by Jim Samuelson , M. Santos , S. Miller , S. Hughes , B. Sullivan (Paperback, 27 August, 2001)
  766. SQL Server Security , by David Litchfield (Paperback, 27 August, 2003)
  767. SSCP Study Guide and DVD Training System , by Jeffrey Posulns , Robert J. Shimonski , Jeremy Faircloth (Hardcover, January, 2003)
  768. SSH, The Secure Shell : The Definitive Guide - Daniel J. Barrett (2005-05-10, Paperback)
  769. SSL and TLS : Designing and Building Secure Systems , by Eric Rescorla (Paperback, 13 October, 2000)
  770. Statistical Data Mining & Knowledge Discovery , by Hamparsum Bozdogan (Hardcover, 29 July, 2003)
  771. Steal This Computer Book 3 : What They Won't Tell You About the Internet , by Wallace Wang (Paperback, May, 2003)
  772. Stealing the Network : How to Own the Box , by Ryan Russell , Ido Dubrawsky , FX , Joe Grand , Tim Mullen (Paperback, 01 April, 2003)
  773. Storage-to-Data Networking Equipment : Bringing Transparency to Storage Communications , by Yankee Group (Digital, 01 May, 2001)
  774. Storage : the outer limits; Take a look at storage 2012.(Storage Management) : An article from : Computer Technology Review , by Fred Moore (Digital, 25 July, 2005)
  775. Storage Area Networking Essentials : A Complete Guide to Understanding & Implementing SANs , by Richard Barker , Paul Massiglia (Hardcover, 15 October, 2001)
  776. Storage Network Performance Analysis , by Huseyin Simitci (Paperback, 11 April, 2003)
  777. Storage Networking Fundamentals : An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems (Fundamentals) , by Marc Farley (Paperback, 09 December, 2004)
  778. Storage Networks Explained : Basics and Application of Fibre Channel SAN, NAS iSCSI and InfiniBand - Ulf Troppens (2004-09-15, Hardcover)
  779. Storage Security : Protecting, SANs, NAS and DAS , by John Chirillo , Scott Blaul , John Chirillo , Scott Blaul (Paperback, 20 December, 2002)
  780. Storage Virtualization : Technologies for Simplifying Data Storage and Management - Tom Clark (2005-03-14, Paperback)
  781. Succeeding with Open Source , by Bernard Golden (Paperback, 10 August, 2004)
  782. Succeeding with SOA : Realizing Business Value Through Total Architecture , by Paul C. Brown (Paperback, 24 April, 2007)
  783. Super Searchers Make It on Their Own : Top Independent Information Professionals Share Their Secrets for Starting and Running a Research Business (Super Searchers series) , by Suzanne Sabroski , Reva Basch (Paperback, 01 June, 2002)
  784. Supply Chain Management Based on SAP Systems , by Gerhard Knolmayer , Peter Mertens , Alexander Zeier (Hardcover, 10 January, 2002)
  785. Survey of Text Mining : Clustering, Classification, and Retrieval , by Michael W. Berry (Hardcover, 09 September, 2003)
  786. Syngress IT Security Project Management Handbook , by Susan Snedaker , Russ Rogers (Paperback, 01 June, 2006)
  787. Take Back Your Life! Special Edition : Using Microsoft Outlook to Get Organized and Stay Organized (Bpg-Other) , by Sally McGhee (Paperback, 22 June, 2005)
  788. Teaching Library Media Skills in Grades K-6 : A How-To-Do-It Manual and CD-ROM , by Carolyn Garner , Jamie Crabtree (Paperback, May, 2004)
  789. Teaching Web Search Skills : Techniques And Strategies Of Top Trainers , by Greg R. Notess (Paperback, 29 October, 2006)
  790. Tech Mining : Exploiting New Technologies for Competitive Advantage , by Alan L. Porter , Scott W. Cunningham (Hardcover, 04 November, 2004)
  791. Testing SAP(R) R/3(R) Systems : Using the Computer Aided Test Tool , by Gerhard Oberniedermeier , Marcus Geiss (Hardcover, 22 September, 2000)
  792. Text Information Retrieval Systems, Third Edition (Library and Information Science) (Library and Information Science) - Charles T. Meadow (2007-03-26, Hardcover)
  793. Text Mining : Predictive Methods for Analyzing Unstructured Information , by Sholom Weiss , Nitin Indurkhya , Tong Zhang , Fred Damerau (Hardcover, 25 October, 2004)
  794. Text Mining Application Programming (Programming Series) , by Manu Konchady (Paperback, 04 May, 2006)
  795. Text Mining for Biology And Biomedicine , by Sophia Ananiadou , John Mcnaught (Hardcover, 30 December, 2005)
  796. The .NET Developer's Guide to Directory Services Programming (Microsoft .NET Development Series) - Joe Kaplan (2006-05-08, Paperback)
  797. The .NET Developer's Guide to Windows Security (Microsoft .NET Development Series) , by Keith Brown (Paperback, 27 September, 2004)
  798. The 123s of ABC in SAP : Using SAP R/3 to Support Activity-Based Costing , by Dawn J. Sedgley , Christopher F. Jackiw (Hardcover, 27 July, 2001)
  799. The Architecture of Distributed Computer Systems : A Data Engineering Perspective on Information Systems , by Richard L. Shuey , David L. Spooner , Ophir Frieder (Paperback, July, 1997)
  800. The Art of Deception : Controlling the Human Element of Security - Kevin D. Mitnick (2003-10-17, Paperback)
  801. The Art of Deception : Controlling the Human Element of Security , by Kevin D. Mitnick , William L. Simon , Steve Wozniak (Hardcover, 04 October, 2002)
  802. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers - Kevin D. Mitnick (2005-12-27, Paperback)
  803. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , by Kevin D. Mitnick , William L. Simon (Hardcover, 04 March, 2005)
  804. The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities - Mark Dowd (2006-11-20, Paperback)
  805. The Business Case for Storage Networks (Network Business) , by Bill Williams (Paperback, 19 October, 2004)
  806. The CERT Guide to System and Network Security Practices , by Julia H. Allen (Paperback, ..)
  807. The CISM Prep Guide : Mastering the Five Domains of Information Security Management , by Ronald L. Krutz , Russell Dean Vines (Paperback, 30 May, 2003)
  808. The CISSP and CAP Prep Guide : Platinum Edition - Ronald L. Krutz (2006-11-06, Hardcover)
  809. The CISSP Prep Guide : Gold Edition - Ronald L. Krutz (2002-10-31, Hardcover)
  810. The CISSP Prep Guide : Mastering the Ten Domains of Computer Security , by Ronald L. Krutz , Russell Dean Vines , Edward M. Stroz (Hardcover, 24 August, 2001)
  811. The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography - Simon Singh (2000-08-29, Paperback)
  812. The Complete Book of Middleware , by Judith M. Myerson (Paperback, 05 March, 2002)
  813. The Complete Guide to Client/Server Computing , by Eric J. Johnson (Hardcover, January, 2001)
  814. The CRM Handbook : A Business Guide to Customer Relationship Management (Addison-Wesley Information Technology Series) - Jill Dyche (2001-08-09, Paperback)
  815. The Data Modeling Handbook : A Best-Practice Approach to Building Quality Data Models , by Michael C. Reingruber , William W. Gregory (Hardcover, December, 1994)
  816. The Data Warehouse ETL Toolkit : Practical Techniques for Extracting, Cleanin - Ralph Kimball (2004-09-13, Paperback)
  817. The Data Warehouse Lifecycle Toolkit : Expert Methods for Designing, Developing, and Deploying Data Warehouses - Ralph Kimball (1998-08-13, Paperback)
  818. The Data Warehouse Toolkit : The Complete Guide to Dimensional Modeling (Second Edition) - Ralph Kimball (2002-04-26, Paperback)
  819. The Data WarehouseETL Toolkit : Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data , by Ralph Kimball , Joe Caserta (Digital, ..)
  820. The Data Webhouse Toolkit : Building the Web-Enabled Data Warehouse , by Ralph Kimball , Richard Merz (Paperback, 20 January, 2000)
  821. The Database Hacker's Handbook : Defending Database Servers , by David Litchfield , Chris Anley , John Heasman , Bill Grindlay (Paperback, 14 July, 2005)
  822. The Definitive Guide to Stellent Content Server Development , by Brian Huff (Hardcover, 26 June, 2006)
  823. The Design of Rijndael : AES - The Advanced Encryption Standard (Information Security and Cryptography) , by Joan Daemen , Vincent Rijmen (Hardcover, 22 March, 2002)
  824. The Dictionary Catalogue : Catalogue of General, Technical, Medical, Legal, Business and Other Specialized Foreign Language Dictionaries : Accounting Aeronautics Agriculture Architecture Automotive Biology Business Chemistry Data Processing Education Electronics Finance Heating and Ventilation Insurance Language Law Manufacturing Mathematics Medicine Mining Music Philosophy Photography Physics Psychology Publishing Religion Television Textiles , by Emanuel Molho , Deborah Molho (Paperback, 15 January, 2000)
  825. The E-Business Workplace : Discovering the Power of Enterprise Portals , by Matthias Vering , Peter Barth , James R. Hurley , Brenda Mackay , David J. Duray , Matthias Vering (Hardcover, 07 March, 2001)
  826. The Elements of Statistical Learning - T. Hastie (2003-07-30, Hardcover)
  827. The Essential Guide to Data Warehousing , by Lou Agosta (Paperback, 26 August, 1999)
  828. The Executive Guide to Information Security : Threats, Challenges, and Solutions (Symantec Press) , by Mark Egan , Tim Mather (Paperback, 30 November, 2004)
  829. The Expert Guide to PeopleSoft Security , by Jason Carter (Paperback, 14 July, 2004)
  830. The GSEC Prep Guide : Mastering SANS GIAC Security Essentials , by Mike Chapple (Paperback, 27 June, 2003)
  831. The Holy Grail of Network Storage Management , by Jon William Toigo (Paperback, 31 October, 2003)
  832. The Information Commons Handbook , by Donald Robert Beagle , Donald Russell Bailey , Barbara Tierney (Paperback, 02 October, 2006)
  833. The Invisible Web : Uncovering Information Sources Search Engines Can't See (A CyberAge Book) , by Chris Sherman , Gary Price (Paperback, September, 2001)
  834. The Joy of SOX : Why Sarbanes-Oxley and Services Oriented Architecture May Be the Best Thing That Ever Happened to You - Hugh Taylor (2006-04-03, Paperback)
  835. The Labyrinth Key , by Howard V. Hendrix (Paperback, 30 March, 2004)
  836. The MicrosofteData Warehouse Toolkit : With SQL Servere2005 and the MicrosofteBusiness Intelligence Toolset - Joy Mundy (2006-02-13, Paperback)
  837. The New Hacker's Dictionary - 3rd Edition , by Eric S. Raymond (Paperback, 11 October, 1996)
  838. The Organization of Information : Second Edition (Library and Information Science Text Series) - Arlene G. Taylor (2003-11-30, Paperback)
  839. The Power of Events : An Introduction to Complex Event Processing in Distributed Enterprise Systems , by David Luckham (Hardcover, 08 May, 2002)
  840. The Rational Guide to : SQL Server Reporting Services (Rational Guides) , by A. T. Mann (Paperback, January, 2004)
  841. The Relational Database Dictionary : A Comprehensive Glossary of Relational Terms and Concepts, with Illustrative Examples , by Chris J. Date (Paperback, 01 August, 2006)
  842. The SAP Consultant Handbook - Jon Reed (2002-10-01, Paperback)
  843. The Security Development Lifecycle , by Michael Howard , Steve Lipner (Paperback, 28 June, 2006)
  844. The Shellcoder's Handbook : Discovering and Exploiting Security Holes - Chris Anley (2007-08-20, Paperback)
  845. The Shellcoder's Handbook : Discovering and Exploiting Security Holes , by Jack Koziol , David Litchfield , Dave Aitel , Chris Anley , Sinan noir Eren , Neel Mehta , Riley Hassell (Paperback, 02 April, 2004)
  846. The Software Vulnerability Guide (Programming Series) (Programming Series) , by Herbert H Thompson , Scott G Chase (Paperback, 03 June, 2005)
  847. The SSCP Prep Guide : Mastering the Seven Key Areas of System Security , by Debra S. Isaac , Michael J. Isaac (Paperback, 11 April, 2003)
  848. The Text Mining Handbook : Advanced Approaches in Analyzing Unstructured Data - Ronen Feldman (2006-12-11, Hardcover)
  849. The Ultimate Security+ Certification Exam Cram 2 Study Kit (Exam SYO-101) (Exam Cram 2) - Que Certification (2004-03-16, Paperback)
  850. The Unofficial Guide to Ethical Hacking (Miscellaneous) , by Ankit Fadia (Paperback, ..)
  851. The Web Library : Building a World Class Personal Library with Free Web Resources , by Nicholas Tomaiuolo , Steve Coffman , Barbara Quint (Paperback, 01 October, 2004)
  852. Thinking About GIS : Geographic Information System Planning for Managers , by Roger Tomlinson (Paperback, 01 May, 2005)
  853. Time Granularities in Databases, Data Mining, and Temporal Reasoning , by Claudio Bettini , Sushil Jajodia , Xiaoyang Sean Wang (Hardcover, August, 2000)
  854. Traditional Photographic Effects with Adobe Photoshop , by Michelle Perkins , Paul Grant (Paperback, 01 September, 2003)
  855. Transaction Processing : Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems) , by Jim Gray , Andreas Reuter (Hardcover, 1993)
  856. Transactional Information Systems : Theory, Algorithms, and the Practice of Concurrency Control (The Morgan Kaufmann Series in Data Management Systems) , by Gerhard Weikum , Gottfried Vossen (Hardcover, 24 May, 2001)
  857. Tribology and Mechanics of Magnetic Storage Devices , by Bharat Bhushan (Hardcover, 15 January, 1996)
  858. Tru64 UNIX File System Administration Handbook , by Steven Hancock (Paperback, 24 November, 2000)
  859. Tru64 Unix System Administrator's Guide , by Matthew Cheek , Scott Fafrak , Steven Hancock , Martin Moore , Gregory Yates (Paperback, 23 November, 2001)
  860. TruCluster Server Handbook (HP Technologies) , by Scott Fafrak , Jim Lola , Dennis O'Brien , Gregory Yates , Brad Nichols (Paperback, 13 December, 2002)
  861. Understanding MySQL Internals (Understanding) , by Sasha Pachev (Paperback, 10 April, 2007)
  862. Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition , by Carlisle Adams , Steve Lloyd (Hardcover, 06 November, 2002)
  863. Understanding Search Engines : Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition , by Michael W. Berry , Murray Browne (Paperback, 28 April, 2005)
  864. Understanding Voice over Ip Security (Artech House Telecommunications Library) , by Alan B. Johnston , David M. Piscitello (Hardcover, 31 March, 2006)
  865. Universal Meta Data Models , by David Marco , Michael Jennings (Paperback, 09 April, 2004)
  866. UNIX Filesystems : Evolution, Design, and Implementation , by Steve D. Pate , Steve D. Pate (Paperback, 03 January, 2003)
  867. USB Mass Storage : Designing and Programming Devices and Embedded Hosts - Jan Axelson (2006-09-01, Paperback)
  868. Users Speak Out About SAP NetWeaver , by LWC Research (Digital, 12 December, 2005)
  869. Using SANs and NAS - W. Curtis Preston (2002-02, Paperback)
  870. Using SQLWindows and Centura : Techniques for Building Client/Server Solutions , by Sanjiv Purba (Paperback, 30 September, 1996)
  871. Using the Data Warehouse , by W. H. Inmon , Richard D. Hackathorn (Hardcover, 13 July, 1994)
  872. Utility Computing : 15th IFIP/IEEE International Workshop on Distributed Systems : Operations and Management, DSOM 2004, Davis, CA, USA, November 15-17, ... (Lecture Notes in Computer Science) , by Akhil Sahai , Wu Felix (Paperback, 23 November, 2004)
  873. Virtual Private Networks, 2nd Edition (O'Reilly Nutshell) , by Mike Erwin , Charlie Scott , Paul Wolfe (Paperback, December, 1998)
  874. Visual and Spatial Analysis , by Boris Kovalerchuk , James Schwing (Hardcover, February, 2005)
  875. Visual Data Mining : Techniques and Tools for Data Visualization and Mining , by Tom Soukup , Ian Davidson (Paperback, 15 May, 2002)
  876. VPNs : A Beginner's Guide , by John Mairs (Paperback, 14 December, 2001)
  877. Wardriving & Wireless Penetration Testing , by Chris Hurley , Russ Rogers , Frank Thornton , Daniel Connelly , Brian Baker (Paperback, 31 October, 2006)
  878. Web 101 : Making the Net Work for You (2nd Edition) , by Wendy G. Lehnert (Paperback, 14 October, 2002)
  879. Web Analytics : An Hour a Day - Avinash Kaushik (2007-06-05, Paperback)
  880. Web Caching (O'Reilly Internet Series) , by Duane Wessels (Paperback, June, 2001)
  881. Web Content Mining with Java , by Tony Loton (Paperback, 15 January, 2002)
  882. Web Data Management and Electronic Commerce , by Bhavani Thuraisingham (Hardcover, 22 June, 2000)
  883. Web Data Mining : Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications) , by Bing Liu (Hardcover, 28 December, 2006)
  884. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism , by Bhavani Thuraisingham (Hardcover, 26 June, 2003)
  885. Web Dragons : Inside the Myths of Search Engine Technology (The Morgan Kaufmann Series in Multimedia and Information Systems) , by Ian H. Witten , Marco Gori , Teresa Numerico (Paperback, 03 November, 2006)
  886. Web Hacking : Attacks and Defense , by Stuart McClure , Saumil Shah , Shreeraj Shah (Paperback, 08 August, 2002)
  887. Web Metrics : Proven Methods for Measuring Web Site Success , by Jim Sterne (Paperback, 15 June, 2002)
  888. Web Mining : Applications and Techniques , by Idea Group Publishing , Anthony Scime (Paperback, 02 August, 2004)
  889. Web Privacy with P3P , by Lorrie Faith Cranor (Paperback, 23 September, 2002)
  890. Web Service Security : Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0 (Patterns & Practices) , by Microsoft Corporation (Paperback, 22 March, 2006)
  891. Webbots, Spiders, and Screen Scrapers : A Guide to Developing Internet Agents with PHP/CURL - Michael Schrenk (2007-03-30, Paperback)
  892. Webster's New World Hacker Dictionary (Webster's New World) , by Bernadette Schell , Clemens Martin (Paperback, ..)
  893. Why ERP? A Primer on SAP Implementation - F. Robert Jacobs (2000-01-06, Paperback)
  894. Wi-Foo : The Secrets of Wireless Hacking - Andrew Vladimirov (2004-06-28, Paperback)
  895. Windows 2000 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 29 August, 2001)
  896. Windows Communication Foundation Unleashed (WCF) (Unleashed) - Craig McMurtry (2007-03-06, Paperback)
  897. Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series) , by Harlan Carvey (Paperback, 21 July, 2004)
  898. Windows Forms in Action (In Action) , by Erik Brown (Paperback, 27 April, 2006)
  899. Windows Server 2003 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 27 October, 2006)
  900. Windows Server 2003 Security : A Technical Reference (Microsoft Windows Server System Series) , by Roberta Bragg (Paperback, 26 May, 2005)
  901. Windows Server 2003 Security Bible , by Blair Rampling (Paperback, 15 July, 2002)
  902. Wireless Messaging Demystified : SMS, EMS, MMS, IM, and others , by Donald J. Longueuil (Paperback, 23 October, 2002)
  903. Wireless Security End to End , by Brian Carter , Russell Shumway (Paperback, 15 August, 2002)
  904. Wireless Security Essentials : Defending Mobile Systems from Data Piracy , by Russell Dean Vines , Russell Dean Vines (Paperback, 15 July, 2002)
  905. Workflow Management with SAP WebFlow : A Practical Manual , by Andrew N. Fletcher , Markus Brahm , Hergen Pargmann (Hardcover, 05 November, 2003)
  906. Writing Secure Code for Windows Vista (Pro - Step By Step Developer) , by Michael Howard , David LeBlanc (Paperback, 11 April, 2007)
  907. Writing Secure Code, Second Edition - Michael Howard (2002-12-04, Paperback)
  908. Writing Security Tools and Exploits , by James C. Foster (Paperback, 01 September, 2005)
  909. XML Distributed Systems Design , by Ajay M. Rambhia , Ajay Rambhia (Paperback, 04 March, 2002)
  910. XML for Data Architects : Designing for Reuse and Integration (The Morgan Kaufmann Series in Data Management Systems) , by James Bean (Paperback, June, 2003)
  911. XQuery - Priscilla Walmsley (2007-03-30, Paperback)
  912. Zero Configuration Networking : The Definitive Guide , by Stuart Cheshire , Daniel Steinberg (Paperback, 13 December, 2005)

Link to more stores on our main index page ...