Buy Computer Books : Hardware : System Architecture

This version is alphabetized by title. Click here to sort in order of current sales rank.

Please click any product name to check the price and shipping information

Search amazon.com for ...

All Products
Books & Audio Books
Magazine Subscriptions
Popular Music
Classical Music
VHS Videos
DVD
Electronics
Computers & Add-On
Software
Cameras & Photo
Office Products
Furniture
Kitchen & Housewares
Baby Products
Lawn - Garden - Patio
Tools & Hardware
Travel Accessories
Toys & Games
Video Games
Cell Phones
Bargain Outlet


Keywords:

  1. (SCTS) Symantec Certified Technical Specialist : Small Business Security Study Guide , by Nik Alston , Mike Chapple , Kirk Hausman (Paperback, 30 September, 2005)
  2. .NET Security , by Jason Bock , Pete Stromquist , Tom Fischer , Nathan Smith (Paperback, 09 July, 2002)
  3. 10 Cool LEGO Mindstorms Robotics Invention System 2 Projects : Amazing Projects You Can Build in Under an Hour , by Jeff Elliott , Dean Hystad , Luke Ma , C. S. Soh , Rob Stehlik , Tonya L. Witherspoon (Paperback, 10 October, 2002)
  4. 10 Cool LEGO Mindstorms Ultimate Builder Projects : Amazing Projects You Can Build in Under an Hour , by Mario Ferrari , Giulio Ferrari , Stephen Cavers (Paperback, 10 September, 2002)
  5. 1337 h4x0r h4ndb00k , by tapeworm (Paperback, 10 August, 2005)
  6. 19 Deadly Sins of Software Security (Security One-off) - Michael Howard (2005-07-26, Paperback)
  7. 30 Cool LEGO Mindstorms Projects Kit : Dark Side Robots, Ultimate Builder, and RIS , by Miguel Agullo , David Astolfo , Jeff Elliott , Dean Hystad , C. S. Soh , Hideaki Yabuki (Paperback, 30 November, 2002)
  8. 32/64-bit 80x86 Assembly Language Architecture , by James Leiterman (Paperback, 25 September, 2005)
  9. 70-227 : MCSE Guide to Microsoft ISA Server 2000 , by Jeremy Cioara (Hardcover, 21 December, 2001)
  10. 70-298 : MCSE Guide to Designing Security for Microsoft Windows Server 2003 Network , by Byron Wright (Paperback, 01 September, 2004)
  11. 70-299 MCSE Guide to Implementing and Administering Security in a Microsoft Windows Server 2003 Network , by Diane Barrett , Bill Ferguson (Paperback, 08 July, 2005)
  12. 802.11 Security , by Bruce Potter , Bob Fleck (Paperback, December, 2002)
  13. A First Course in Information Theory (Information Technology : Transmission, Processing and Storage) , by Raymond W. Yeung (Hardcover, 16 June, 2006)
  14. A Gift of Fire , by Sara Baase (Paperback, 15 July, 2002)
  15. A Guide to Forensic Testimony : The Art and Practice of Presenting Testimony As An Expert Technical Witness , by Fred Chris Smith , Rebecca Gurley Bace (Paperback, 09 October, 2002)
  16. A Mathematical Introduction to Logic, Second Edition , by Herbert B. Enderton (Hardcover, December, 2000)
  17. A Practical Guide to Digital Design , by Pina Lewandowsky , Francis Zeischegg (Paperback, 01 October, 2003)
  18. A Practical Guide to Security Assessments , by Sudhanshu Kairab (Hardcover, 29 September, 2004)
  19. A Programmer's Introduction to C# 2.0, Third Edition , by Eric Gunnerson , Nick Wienholt (Paperback, 20 June, 2005)
  20. A Semantic Web Primer (Cooperative Information Systems) , by Grigoris Antoniou , Frank van Harmelen (Hardcover, 01 April, 2004)
  21. A Technical Guide to IPSec Virtual Private Networks , by James S. Tiller , Jim S. Tiller (Paperback, 11 December, 2000)
  22. A+, Network+, Security+ Exams in a Nutshell : A Desktop Quick Reference (In a Nutshell (O'Reilly)) , by Pawan Bhardwaj (Paperback, 27 March, 2007)
  23. AAA and Network Security for Mobile Access : Radius, Diameter, EAP, PKI and IP Mobility , by Madjid Nakhjiri , Mahsa Nakhjiri (Hardcover, 28 October, 2005)
  24. Absolute Beginner's Guide to Building Robots , by Gareth Branwyn (Paperback, 29 September, 2003)
  25. Absolute Beginner's Guide to Databases , by John Petersen (Paperback, 05 March, 2002)
  26. Absolute Beginner's Guide to Personal Firewalls , by Jerry Lee Ford , Jerry Ford (Paperback, 24 October, 2001)
  27. Absolute Beginner's Guide to Security, Spam, Spyware & Viruses (Absolute Beginner's Guide) , by Andy Walker (Paperback, 09 November, 2005)
  28. Absolute Beginner's Guide to Tablet PCs (Absolute Beginner's Guide) , by Craig Forrest Mathews (Paperback, 04 December, 2003)
  29. Absolute PC Security and Privacy , by Michael Miller , Michael Miller (Paperback, 01 August, 2002)
  30. Accounting Information Systems (10th Edition) (Accounting Information Systems) - Marshall B. Romney (2005-03-29, Hardcover)
  31. Active Directory Cookbook, 2nd Edition - Robbie Allen (2006-06-09, Paperback)
  32. Active Directory, 3rd Edition - Joe Richards (2006-01-19, Paperback)
  33. Adaptation in Natural and Artificial Systems : An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , by John H. Holland (Paperback, 29 April, 1992)
  34. Administering Data Centers : Servers, Storage, and Voice over IP , by Kailash Jayaswal (Hardcover, 28 November, 2005)
  35. Administering Windows Vista Security : The Big Surprises - Mark Minasi (2006-12-26, Paperback)
  36. Administrating Web Servers, Security, & Maintenance Interactive Workbook , by Eric Larson , Brian Stephens (Paperback, 15 December, 1999)
  37. Advanced Compiler Design and Implementation , by Steven Muchnick (Hardcover, 01 August, 1997)
  38. Advanced CORBA(R) Programming with C++ , by Michi Henning , Steve Vinoski (Paperback, 17 February, 1999)
  39. Advanced Host Intrusion Prevention with CSA , by Chad Sullivan , Jeff Asher , Paul Mauvais (Paperback, 27 April, 2006)
  40. Advanced NXT : The Da Vinci Inventions Book (Technology in Action) - Matthias Paul Scholz (2007-06-25, Paperback)
  41. Advanced PC Architecture , by William Buchanan , Austin Wilson (Paperback, 29 December, 2000)
  42. Advantage Database Server : A Developer's Guide , by Cary Jensen , Loy Anderson (Paperback, 31 January, 2007)
  43. Aggressive Network Self-Defense , by Neil R. Wyler , Bruce Potter , Chris Hurley (Paperback, 01 February, 2005)
  44. Agile Database Techniques : Effective Strategies for the Agile Software Developer (Wiley Application Development) , by Scott Ambler (Paperback, 17 October, 2003)
  45. AIX 5L Administration , by Randal K. Michael (Paperback, 02 August, 2002)
  46. Al Jazeera : How Arab TV News Challenges America , by Hugh Miles (Hardcover, 09 January, 2005)
  47. Almost Human : Making Robots Think , by Lee Gutkind (Hardcover, 19 March, 2007)
  48. Always Use Protection : A Teen's Guide to Safe Computing , by Dan Appleman (Paperback, 01 May, 2004)
  49. An Introduction to AI Robotics (Intelligent Robotics and Autonomous Agents) , by Robin R. Murphy (Hardcover, 13 November, 2000)
  50. An Introduction to Database Systems, Eighth Edition , by C.J. Date (Hardcover, 22 July, 2003)
  51. An Introduction to Parallel Computing : Design and Analysis of Algorithms, Second Edition , by Ananth Grama , George Karypis , Vipin Kumar , Anshul Gupta (Hardcover, 16 January, 2003)
  52. Analog Design for CMOS VLSI Systems (The Kluwer International Series in Engineering and Computer Science) , by Franco Maloberti (Hardcover, 31 October, 2001)
  53. Analog In, Digital Out : Brendan Dawes on Interaction Design (VOICES) , by Brendan Dawes (Paperback, 06 September, 2006)
  54. Analysis and Design of Digital Systems with VHDL , by Allen Dewey (Spiral-bound, 26 August, 1996)
  55. Anti-Hacker Tool Kit, Third Edition , by Mike Shema (Paperback, 09 February, 2006)
  56. Apache Cookbook , by Ken Coar , Rich Bowen (Paperback, 18 November, 2003)
  57. Apache Security , by Ivan Ristic (Paperback, 15 March, 2005)
  58. Applied Control Theory for Embedded Systems (Embedded Technology) , by Tim Wescott (Paperback, 03 April, 2006)
  59. Approaching Quantum Computing , by Dan C. Marinescu , Gabriela M. Marinescu (Hardcover, 10 September, 2004)
  60. Architecture Exploration for Embedded Processors With Lisa , by ›Andreas Hoffmann , Heinrich Meyr , Rainer Leupers (Hardcover, January, 2003)
  61. ARM Architecture Reference Manual (2nd Edition) , by David Seal (Paperback, 27 December, 2000)
  62. ARM System-on-Chip Architecture (2nd Edition) , by Steve Furber (Paperback, 25 August, 2000)
  63. ARM System Developer's Guide : Designing and Optimizing System Software (The Morgan Kaufmann Series in Computer Architecture and Design) - Andrew Sloss (2004-03-25, Hardcover)
  64. Artificial Intelligence and Mobile Robots : Case Studies of Successful Robot Systems , by David Kortenkamp , R. Peter Bonasso , Robin Murphy (Paperback, 06 March, 1998)
  65. AS/400 : System, Utilities, Database, and Programming (2nd Edition) , by George Lin , Gayla Stewart (Hardcover, 30 November, 1998)
  66. ASP.NET 2.0 MVP Hacks , by David Yack , Joe Mayo , Scott Hanselman , Fredrik Normen , Dan Wahlin , J. Ambrose Little , Jonathan Goodyear (Paperback, 30 May, 2006)
  67. Authentication : From Passwords to Public Keys , by Richard E. Smith (Paperback, 01 October, 2001)
  68. Autodesk Architectural Desktop 2007 Fundamentals , by Elise Moss (Paperback, 28 April, 2006)
  69. Automated Planning : Theory & Practice , by Paolo Traverso , Malik Ghallab , Dana Nau (Hardcover, 03 May, 2004)
  70. Automating Science and Engineering Laboratories with Visual Basic , by Mark F. Russo , Martin M. Echols (Paperback, 31 March, 1999)
  71. Backup & Recovery - W. Curtis Preston (2007-01-03, Paperback)
  72. Beacon of Hatred : Inside Hizballahs Al-Manar Television , by Avi Jorisch (Paperback, 01 November, 2004)
  73. Beginning Database Design (Wrox Beginning Guides) , by Gavin Powell (Paperback, 05 December, 2005)
  74. Behavior-Based Robotics (Intelligent Robotics and Autonomous Agents) , by Ronald C. Arkin (Hardcover, 22 May, 1998)
  75. Beyond Our Control? Confronting the Limits of Our Legal System in the Age of Cyberspace , by Stuart Biegel (Hardcover, 01 October, 2001)
  76. Beyond Software Architecture : Creating and Sustaining Winning Solutions - Luke Hohmann (2003-01-30, Paperback)
  77. BGP Design and Implementation , by Randy Zhang , Micah Bartell (Hardcover, 02 December, 2003)
  78. Biologically-Inspired Intelligent Robots (SPIE Vol. PM122) , by Yoseph Bar-Cohen , Cynthia L. Breazeal (Hardcover, 13 May, 2003)
  79. Biometrics : Identity Verification in a Networked World , by Samir Nanavati , Michael Thieme , Raj Nanavati , Samir Nanavati , Michael Thieme , Raj Nanavati (Paperback, 15 March, 2002)
  80. Black Ice : The Invisible Threat of Cyber-Terrorism , by Dan Verton (Hardcover, 19 August, 2003)
  81. Blogging and RSS : A Librarian's Guide , by Michael P. Sauers (Paperback, 29 October, 2006)
  82. Botnets : The Killer Web Applications , by Craig Schiller , Jim Binkley , Gadi Evron , Carsten Willems , Tony Bradley , David Harley , Michael Cross (Paperback, 01 February, 2007)
  83. Build the Ultimate Custom PC , by Adrian Kingsley-Hughes , Kathie Kingsley-Hughes (Paperback, 05 December, 2005)
  84. Build Your Own PC, 4th Edition (Build Your Own) , by Morris Rosenthal (Paperback, 20 October, 2004)
  85. Building a Digital Human (Graphics Series) (Graphics Series) , by Ken Brilliant (Paperback, 30 April, 2003)
  86. Building a PC For Dummies (Building a PC for Dummies) , by Mark L. Chambers (Paperback, 07 November, 2005)
  87. Building and Programming LEGO Mindstorms Robots Kit , by Mario Ferrari , Ralph Hempel , Giulio Ferrari (Paperback, October, 2002)
  88. Building Enterprise Information Architecture : Reengineering Information Systems , by Melissa Cook , Hewlett-Packard Professional Books (Paperback, 22 January, 1996)
  89. Building Internet Firewalls (2nd Edition) , by Elizabeth D. Zwicky , Simon Cooper , D. Brent Chapman (Paperback, 15 January, 2000)
  90. Building Linux Virtual Private Networks , by Oleg Kolesnikov , Brian Hatch (Paperback, 04 February, 2002)
  91. Building Open Source Network Security Tools : Components and Techniques , by Mike Schiffman , Mike Schiffman (Paperback, 11 October, 2002)
  92. Building Portals with the Java Portlet API (Expert's Voice) , by Jeff Linwood , Dave Minter (Paperback, 23 August, 2004)
  93. Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs , by Mario Ferrari , Giulio Ferrari , Ralph Hempel (Paperback, 15 December, 2001)
  94. Building Secure Software : How to Avoid Security Problems the Right Way , by John Viega , Gary McGraw (Hardcover, 24 September, 2001)
  95. Building the Data Warehouse , by W. H. Inmon (Paperback, 07 October, 2005)
  96. Building the Perfect PC - Robert Thompson (2006-12-22, Paperback)
  97. Bulls, Bears and Brains : Investing with the Best and Brightest of the Financial Internet , by Adam Leitzes , Joshua Solan (Hardcover, 04 January, 2002)
  98. Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business) , by Catherine Paquet , Warren Saxe (Paperback, 13 December, 2004)
  99. Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition , by Matjaz B. Juric (Paperback, 30 January, 2006)
  100. Byte Wars : The Impact of September 11 on Information Technology , by Edward Yourdon , Ed Yourdon (Hardcover, 15 March, 2002)
  101. Cambrian Intelligence : The Early History of the New AI , by Rodney A. Brooks (Paperback, 16 July, 1999)
  102. CCDP Self-Study : Designing Cisco Network Architectures (ARCH) (Self-Study Guide) , by Amir Ranjbar , Keith Hutton (Hardcover, 06 December, 2004)
  103. CCIE Routing and Switching Official Exam Certification Guide (2nd Edition) (Exam Certification Guide) - Wendell Odom (2006-02-20, Hardcover)
  104. CCNP ISCW Official Exam Certification Guide - Brian Morgan (2007-07-18, Hardcover)
  105. CCSA NG : Check Point Certified Security Administrator Study Guide , by Justin Menga , Justin Menga (Hardcover, 14 January, 2003)
  106. CCSP : Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541) , by Wade Edwards , Todd Lammle , Tom Lancaster , Justin Menga , Eric Quinn (Hardcover, 08 March, 2005)
  107. CCSP : Secure Intrusion Detection and SAFE Implementation Study Guide (642-531 and 642-541) , by Justin Menga , Carl Timm (Paperback, 08 March, 2004)
  108. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study) , by John Roland , Mark J. Newcomb (Hardcover, 02 April, 2003)
  109. CCSP CSI Exam Certification Guide (2nd Edition) , by Ido Dubrawsky , Paul Grey (Hardcover, 29 November, 2004)
  110. CCSP CSPFA Exam Cram 2 (Exam Cram 642-521) , by Daniel P. Newman , Daniel Newman (Paperback, 10 October, 2003)
  111. CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501) (Ccsp Self-Study) , by Greg Bastien , Christian Abera Degu (Hardcover, 22 December, 2003)
  112. CCSP SECUR Exam Cram 2 (642-501) , by Raman Sud , Ken Edelman (Paperback, 14 November, 2003)
  113. CCSP Self-Study : Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Certification Self-Study Series) , by Earl Carter , Inc. Cisco Systems (Hardcover, 09 February, 2004)
  114. CCSP Self-Study : Cisco Secure PIX Firewall Advanced (CSPFA) (2nd Edition) , by Behzad Behtash , Inc. Cisco Systems (Hardcover, 14 January, 2004)
  115. CCSP Self-Study : Cisco Secure Virtual Private Networks (CSVPN) (2nd Edition) (Ccsp Self-Study) , by Andrew Mason (Hardcover, 19 May, 2004)
  116. CCSP SNPA Official Exam Certification Guide (3rd Edition) (Exam Certification Guide) , by Greg Bastien , Earl Carter , Christian Degu , Michael Gibbs (Hardcover, 24 April, 2006)
  117. CCSP SNRS Exam Certification Guide (CCSP Self-Study) (Exam Certification Guide) , by Greg Bastien , Sara Nasseh , Christian Degu (Hardcover, 08 December, 2005)
  118. CCSP Study Guide Kit , by Eric Quinn , Justin Menga , Tom Lancaster , Todd Lammle (Paperback, 26 April, 2004)
  119. CD and DVD Recording for Dummies, Second Edition , by Mark L. Chambers (Paperback, 05 March, 2004)
  120. Check Point Next Generation Security Administration , by Cherie Amon , Allen V. Keele , Daniel Kligerman , Drew Simonis , Corey Pincock (Paperback, March, 2002)
  121. Check Point NG VPN-1/Firewall-1 : Advanced Configuration and Troubleshooting , by Barry J. Stiefel , Doug Maxwell , Kyle X. Hourihan , Cherie Amon , James Noble (Paperback, May, 2003)
  122. Check Point™ Next Generation with Application Intelligence Security , by Chris Tobkin , Daniel Kligerman (Paperback, 07 January, 2004)
  123. CICS : A How-To for COBOL Programmers , by David Shelby Kirk (Paperback, 24 September, 1993)
  124. CISA : Certified Information Systems Auditor Study Guide - David L. Cannon (2006-05-08, Paperback)
  125. Cisco Access Control Security : AAA Administration Services , by Brandon Carroll (Hardcover, ..)
  126. Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance (Networking Technology) - Omar Santos (2005-10-14, Paperback)
  127. Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology : Security) - David Hucaby (2007-08-09, Paperback)
  128. Cisco IOS Access Lists , by Jeff Sedayao (Paperback, June, 2001)
  129. Cisco Network Admission Control, Volume I : NAC Framework Architecture and Design (Networking Technology) , by Denise Helfrich , Lou Ronnau , Jason Frazier , Paul Forbes (Paperback, 08 December, 2006)
  130. Cisco Network Admission Control, Volume II : NAC Deployment and Troubleshooting (Networking Technology) , by Jazib Frahim , Omar Santos , David White (Paperback, 21 November, 2006)
  131. Cisco Network Security Little Black Book , by Joe Harris (Paperback, 15 August, 2002)
  132. Cisco Networking Academy Program CCNA 3 and 4 Lab Companion, Third Edition , by Cisco Systems Inc. , Cisco Networking Academy Program , Inc., ILSG Cisco Systems , Aries Cisco Networking Academy Program (Paperback, 20 June, 2003)
  133. Cisco PIX Firewalls : Configure, Manage, & Troubleshoot , by Charles Riley (Editor) , Umer Khan , Michael Sweeney (Paperback, 01 May, 2005)
  134. Cisco Router Firewall Security (Networking Technology) , by Richard Deal (Paperback, 10 August, 2004)
  135. Cisco Security Agent , by Chad Sullivan (Paperback, 01 June, 2005)
  136. Cisco Security Bible , by K. S. Rajesh , Rajesh, NIIT K.S. (Paperback, 01 March, 2002)
  137. Cisco Security Specialist's Guide to PIX Firewall , by Umer Khan , Vitaly Osipov , Mike Sweeney , Woody Weaver (Paperback, December, 2002)
  138. Cisco Wireless LAN Security (Networking Technology) , by Krishna Sankar , Sri Sundaralingam , Darrin Miller , Andrew Balinsky (Hardcover, 15 November, 2004)
  139. Cisco(R) PIX Firewalls , by Richard Deal (Paperback, 23 October, 2002)
  140. CISSP : Certified Information Systems Security Professional Study Guide, Third Edition , by James Michael Stewart , Ed Tittel , Mike Chapple (Paperback, 09 September, 2005)
  141. CISSP All-in-One Exam Guide, Third Edition (All-in-One) , by Shon Harris (Hardcover, 15 September, 2005)
  142. CISSP Certification All-in-One Exam Guide, 4th Ed. - Shon Harris (2007-11-09, Hardcover)
  143. CISSP Exam Cram 2 (Exam Cram 2) , by Michael Gregg (Paperback, ..)
  144. CISSP For Dummies (For Dummies (Computer/Tech)) - Lawrence H. Miller (2007-04-02, Paperback)
  145. CISSP Practice Questions Exam Cram 2 , by Michael Gregg (Paperback, 21 October, 2004)
  146. CISSP Training Guide , by Roberta Bragg (Paperback, 18 November, 2002)
  147. Citrix Access Suite 4 for Windows Server 2003 : The Official Guide, Third Edition , by Steve Kaplan , Tim Reeser , Alan Wood (Paperback, 25 September, 2006)
  148. Citrix CCA MetaFrame Presentation Server 3.0 and 4.0 (Exams 223/256) (Exam Cram 2) , by Todd Mathers , Elias Khnaser (Paperback, 21 December, 2005)
  149. CIW : Security Professional Study Guide Exam 1D0-470 (With CD-ROM) , by James Stanger , Patrick T. Lane , Tim Crothers , James Stanger Ph.D. , Tim Crothers (Hardcover, 15 June, 2002)
  150. CMOS Digital Integrated Circuits Analysis & Design , by Sung-Mo (Steve) Kang , Yusuf Leblebici (Hardcover, 29 October, 2002)
  151. CMOS Integrated Analog-to-Digital and Digital-to-Analog Converters (The Kluwer International Series in Engineering and Computer Science) , by Rudy J. van de Plassche (Hardcover, 31 May, 2003)
  152. COBOL : From Micro to Mainframe (3rd Edition) , by Robert T. Grauer , Carol Vasquez Villar , Arthur R. Buss , Carol Vazquez Villar (Paperback, 25 March, 1998)
  153. COBOL and Visual Basic on .NET : A Guide for the Reformed Mainframe Programmer , by Chris L. Richardson (Paperback, 10 April, 2003)
  154. Code Hacking : A Developer's Guide To Network Security (Networking Series) , by Richard Conway , Julian Cordingley (Paperback, May, 2004)
  155. ColdFusion 5 : A Beginner's Guide , by Jeffry Houser (Paperback, 08 February, 2002)
  156. Color for Websites : Digital Media Design (Digital Media Design) , by Molly Holzschlag (Hardcover, October, 2001)
  157. COM and .NET Interoperability , by Andrew Troelsen (Paperback, 20 April, 2002)
  158. Compilers : Principles, Techniques, and Tools (2nd Edition) - Alfred V. Aho (2006-08-31, Hardcover)
  159. Complete Digital Design : A Comprehensive Guide to Digital Electronics and Computer System Architecture , by Mark Balch (Hardcover, 18 June, 2003)
  160. CompTIA Security+ Study Guide : Exam SY0-101 - Mike Pastore (2006-05-08, Hardcover)
  161. CompTIA Security+ Study Guide : Exam SY0-101 , by Mike Pastore , Emmett Dulaney (Paperback, 01 May, 2006)
  162. Computational Geometry : Algorithms and Applications, Second Edition - Mark de Berg (2000-02-18, Hardcover)
  163. Computational Principles of Mobile Robotics , by Gregory Dudek , Michael Jenkin (Paperback, 15 April, 2000)
  164. Computer Architecture : From Microprocessors to Supercomputers (Oxford Series in Electrical and Computer Engineering) , by Behrooz Parhami (Hardcover, 17 February, 2005)
  165. Computer Architecture, Fourth Edition : A Quantitative Approach - John L. Hennessy (2006-09-13, Paperback)
  166. Computer Forensics : Computer Crime Scene Investigation (Networking Series) (Networking Series) , by John R Vacca (Paperback, 27 May, 2005)
  167. Computer Forensics : Incident Response Essentials , by Warren G. Kruse II , Jay G. Heiser (Paperback, 26 September, 2001)
  168. Computer Forensics : Principles and Practices (Prentice Hall Security Series) - Linda Volonino (2006-08-21, Paperback)
  169. Computer Forensics JumpStart (Jumpstart (Sybex)) , by Michael Solomon , Neil Broom , Diane Barrett (Paperback, 10 December, 2004)
  170. Computer Intrusion Detection and Network Monitoring : A Statistical Viewpoint (Information Science and Statistics) , by David J. Marchette (Hardcover, 26 June, 2001)
  171. Computer Organization , by Carl Hamacher , Zvonko Vranesic , Safwat Zaky (Hardcover, 02 August, 2001)
  172. Computer Organization and Architecture : Designing for Performance (7th Edition) - William Stallings (2005-07-11, Hardcover)
  173. Computer Organization and Design : The Hardware/Software Interface - David A. Patterson (1997-08-01, Hardcover)
  174. Computer Organization and Design : The Hardware/Software Interface, Third Edition (The Morgan Kaufmann Series in Computer Architecture and Design) (The ... Series in Computer Architecture and Design) , by David A. Patterson , John L. Hennessy (Paperback, 02 August, 2004)
  175. Computer Organization and Design, Revised Printing, Third Edition, Third Edition : The Hardware/Software Interface (The Morgan Kaufmann Series in Computer ... Series in Computer Architecture and Design) - David A. Patterson (2007-06-01, Paperback)
  176. Computer Privacy Annoyances , by Dan Tynan (Paperback, 27 July, 2005)
  177. Computer Security : Art and Science - Matt Bishop (2002-12-02, Hardcover)
  178. Computer Security Assurance , by Mark S Merkow , Jim Breithaupt (Paperback, 01 June, 2004)
  179. Computer Security Basics , by Rick Lehtinen , Deborah Russell , G T Gangemi (Paperback, 13 June, 2006)
  180. Computer Security Fundamentals (Security Series) , by Chuck Easttom (Paperback, 03 March, 2005)
  181. Computer System Architecture (3rd Edition) - M. Morris Mano (1992-10-19, Hardcover)
  182. Computer Systems : A Programmer's Perspective - Randal E. Bryant (2002-08-13, Hardcover)
  183. Computer Systems Design and Architecture (2nd Edition) , by Vincent P. Heuring , Harry F. Jordan (Hardcover, 26 November, 2003)
  184. Computer Systems Organization and Architecture , by John D. Carpinelli (Hardcover, 20 October, 2000)
  185. Computer Vision - Linda G. Shapiro (2001-01-23, Hardcover)
  186. Computer Vision : A Modern Approach , by David A. Forsyth , Jean Ponce (Hardcover, ..)
  187. Computer Vision and Applications : A Guide for Students and Practitioners (With CD-ROM) , by Bernd Jahne , Horst Haussecker (Hardcover, 15 May, 2000)
  188. Computers, Ethics, and Society , by M. David Ermann , Michele S. Shauf (Paperback, 14 November, 2002)
  189. Concurrent and Real-time Systems : The CSP Approach , by Steve Schneider (Paperback, 05 November, 1999)
  190. Concurrent Programming in Java : Design Principles and Pattern (2nd Edition) , by Doug Lea (Paperback, 05 November, 1999)
  191. Concurrent Programming in ML , by John H. Reppy (Hardcover, 13 August, 1999)
  192. Configuring Check Point NGX VPN-1/Firewall-1 , by Robert Stephens , Barry Stiefel , Stephen Watkins , Simon Desmeules , Eli Faskha (Paperback, 01 August, 2005)
  193. Configuring Juniper Networks NetScreen & SSG Firewalls , by Rob Cameron , Chris Cantrell , Anne Hemni , Lisa Lorenzin (Paperback, 28 November, 2006)
  194. Configuring Netscreen Firewalls , by Rob Cameron , CJ Cui , Thomas Byrne , Dave Killion , Kevin Russell , Chris Cantrell (Paperback, 01 December, 2004)
  195. Configuring Sonicwall Firewalls , by Barry Steifel , Simon Desmeules (Paperback, 26 April, 2006)
  196. Consolidation in the Data Center : Simplifying IT Environments to Reduce Total Cost of Ownership , by David Hornby , Ken Pepple (Paperback, 19 September, 2002)
  197. Contemporary Logic Design (2nd Edition) , by Randy H. Katz , Gaetano Borriello (Hardcover, 15 December, 2004)
  198. Contemporary Security Management, Second Edition , by John Fay (Hardcover, 04 October, 2005)
  199. Content Management Bible - Bob Boiko (2004-11-26, Paperback)
  200. Control Language Programming for the AS/400 (2nd Edition) , by Bryan Meyers , Dan Riehl (Paperback, 01 October, 1997)
  201. Control System Design Guide, Third Edition : Using Your Computer to Understand and Diagnose Feedback Controllers , by George Ellis (Hardcover, 17 February, 2004)
  202. Control Systems Engineering , by Norman S. Nise (Hardcover, 02 September, 2003)
  203. Control Systems for Live Entertainment, Second Edition , by John Huntington (Paperback, September, 2000)
  204. Core Concepts of Information Technology Auditing - James E. Hunton (2003-07-24, Paperback)
  205. Core LEGO MINDSTORMS Programming : Unleash the Power of the Java Platform , by Brian Bagnall (Paperback, 11 March, 2002)
  206. Core Security Patterns : Best Practices and Strategies for J2EE, Web Services, and Identity Management (Core Series) - Christopher Steel (2005-10-14, Hardcover)
  207. Corporate Computer and Network Security - Raymond Panko (2003-03-17, Hardcover)
  208. Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses , by Ed Skoudis (Paperback, 23 July, 2001)
  209. Counter Hack Reloaded : A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) - Edward Skoudis (2005-12-23, Paperback)
  210. Cover Your Assets : Building and Managing Secure Internet Applications , by Troy R. Schumaker , Demetrios Lazarikos (Paperback, 01 December, 2002)
  211. CramSession's CIW Foundations : Certification Study Guide (Digital, 09 March, 2001)
  212. CramSession's NAI Sniffer Certified Professional - Troubleshooting with the Sniffer Pro Network Analyzer : Certification Study Guide (Digital, 10 January, 2002)
  213. CRCP Crystal Reports Certified Professional All-in-One , by Annette Harper (Hardcover, 20 January, 2005)
  214. Creative Projects with LEGO Mindstorms , by Benjamin Erwin (Paperback, 09 April, 2001)
  215. Cryptography and Network Security (4th Edition) - William Stallings (2005-11-16, Hardcover)
  216. Cryptography and Public Key Infrastructure on the Internet , by Klaus Schmeh (Paperback, June, 2003)
  217. Cryptography Decrypted - H. X. Mel (2000-12-21, Paperback)
  218. Cryptography for Dummies , by Chey Cobb (Paperback, 30 January, 2004)
  219. Cryptography in the Database : The Last Line of Defense , by Kevin Kenan (Paperback, 19 October, 2005)
  220. CSIDS Exam Cram 2 (Exam Cram 642-531) , by Daniel Newman , Kristina Maria Manalo , Ed Tittel (Paperback, 15 March, 2004)
  221. CYA : Securing Exchange Server 2003 & Outlook Web Access , by Henrik Walther , Patrick Santry (Paperback, 01 April, 2004)
  222. CYA Securing IIS 6.0 , by Chris Peiris , Bernard Cheah , Ken Schaefer (Paperback, 01 April, 2004)
  223. Cyber-Safe Kids, Cyber-Savvy Teens : Helping Young People Learn To Use the Internet Safely and Responsibly , by Nancy E. Willard (Paperback, 16 March, 2007)
  224. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection : Defending the U.S. Homeland , by Anthony H. Cordesman , Justin G. Cordesman (Hardcover, 30 November, 2001)
  225. Cyber Adversary Characterization : Auditing the Hacker Mind , by Tom Parker , Marcus Sachs , Eric Shaw , Ed Stroz , Matthew G. Devost (Paperback, June, 2004)
  226. Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives , by Ted Fair , Michael Nordfelt , Sandra Ring , Eric Cole (Paperback, 15 February, 2005)
  227. Cybernetic Trading Strategies : Developing a Profitable Trading System with State-of-the-Art Technologies , by Murray A. Ruggiero (Hardcover, 17 June, 1997)
  228. Cybernetics, Second Edition : or the Control and Communication in the Animal and the Machine , by Norbert Wiener (Paperback, 15 March, 1965)
  229. Cyberpolitics , by Kevin A. Hill , John E. Hughes (Paperback, April, 1998)
  230. Cybershock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption , by Winn Schwartau (Paperback, 30 March, 2001)
  231. Darknet : Hollywood's War Against the Digital Generation , by J. D. Lasica (Hardcover, 02 May, 2005)
  232. Data Management : Databases & Organizations - Richard T. Watson (2005-08-26, Hardcover)
  233. Data Mining : Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems) - Ian H. Witten (2005-06-08, Paperback)
  234. Data Modeling Essentials, Third Edition - Graeme Simsion (2004-11-04, Paperback)
  235. Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems) , by Dorian Pyle (Paperback, 15 March, 1999)
  236. Data Quality : The Accuracy Dimension (The Morgan Kaufmann Series in Data Management Systems) , by Jack E. Olson (Paperback, 26 December, 2002)
  237. Database Concepts (2nd Edition) , by David M. Kroenke (Paperback, 10 March, 2004)
  238. Database Concepts (3rd Edition) - David Kroenke (2007-01-24, Paperback)
  239. Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1) , by Sikha Bagui , Richard Earp (Hardcover, 27 June, 2003)
  240. Database Management Systems - Raghu Ramakrishnan (2002-08-14, Hardcover)
  241. Database Modeling and Design : Logical Design, 4th Edition (The Morgan Kaufmann Series in Data Management Systems) , by Toby J. Teorey , Sam S. Lightstone , Tom Nadeau (Paperback, 06 September, 2005)
  242. Database Nation : The Death of Privacy in the 21st Century , by Simson Garfinkel (Paperback, January, 2001)
  243. Database Systems : A Practical Approach to Design, Implementation and Management (4th Edition) (International Computer Science Series) - Thomas M. Connolly (2004-05-27, Paperback)
  244. Database Systems : An Application Oriented Approach, Compete Version (2nd Edition) - Michael Kifer (2005-03-16, Hardcover)
  245. Day Trade Futures Online (Wiley Online Trading for a Living) , by Larry Williams (Hardcover, 29 May, 2000)
  246. Day Trade Online , by Christopher A. Farrell (Hardcover, 31 March, 1999)
  247. DB2 Developer's Guide (5th Edition) , by Craig S. Mullins (Paperback, 11 May, 2004)
  248. DB2 UDB V8.1 Certification Exam 700 Study Guide , by Roger E. Sanders (Paperback, 17 September, 2003)
  249. Defend I.T. : Security by Example , by Ajay Gupta , Scott Laliberte (Paperback, 19 May, 2004)
  250. Defense and Detection Strategies against Internet Worms , by Jose Nazario (Hardcover, November, 2003)
  251. Definitive Guide to LEGO MINDSTORMS, Second Edition , by Dave Baum (Paperback, 30 March, 2006)
  252. Deleteyourbroker.com : Using the Internet to Beat the Pros on Wall Street , by Christopher Byron (Hardcover, January, 2001)
  253. Delta-Sigma Data Converters : Theory, Design, and Simulation , by Steven R. Norsworthy , Richard Schreier , Gabor C. Temes (Hardcover, 14 October, 1996)
  254. Demystifying the Ipsec Puzzle (Artech House Computer Security Series) , by Sheila Frankel (Hardcover, 01 May, 2001)
  255. Deploying Secure 802.11 Wireless Networks with Microsoft Windows , by Joseph Davies (Paperback, 13 August, 2003)
  256. Design Companion for the Digital Artist , by Against the Clock (Paperback, 15 October, 2001)
  257. Design for Test for Digital Ic's and Embedded Core Systems , by Alfred L. Crouch (Hardcover, 15 June, 1999)
  258. Design of Analog Filters , by Rolf Schaumann , Mac E. Van Valkenburg (Hardcover, 15 January, 2001)
  259. Design Rules, Vol. 1 : The Power of Modularity , by Carliss Y. Baldwin , Kim B. Clark (Hardcover, 15 March, 2000)
  260. Designing a Digital Portfolio (VOICES) - Cynthia Baron (2003-12-18, Paperback)
  261. Designing and Programming CICS Applications , by John Horswill , Members of the CICS Development Team at IBM Hursley (Paperback, 31 July, 2000)
  262. Designing BSD Rootkits : An Introduction to Kernel Hacking , by Joseph Kong (Paperback, 10 April, 2007)
  263. Designing Effective Database Systems , by Rebecca M. Riordan (Paperback, ..)
  264. Designing Embedded Hardware , by John Catsoulis (Paperback, 01 May, 2005)
  265. Designing Microsoft Windows 2000 Network Security (Academic Learning Series) , by Microsoft Corporation (Hardcover, 01 July, 2001)
  266. Designing Mobile Autonomous Robots : Inside the Mind of an Intelligent Machine , by John M. Holland (Paperback, 01 January, 2004)
  267. Designing Network Security, Second Edition , by Merike Kaeo (Hardcover, 29 October, 2003)
  268. Designing Sociable Robots (Intelligent Robotics and Autonomous Agents) , by Cynthia L. Breazeal (Hardcover, 04 May, 2002)
  269. Designing Storage Area Networks : A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition , by Tom Clark (Paperback, 21 March, 2003)
  270. Designing with FPGAs and CPLDs , by Bob Zeidman (Paperback, September, 2002)
  271. Detecting the World : Capturing Physical Measurements With C++ , by David McCombs (Paperback, February, 1999)
  272. Developer's Guide to Web Application Security , by Michael Cross (Paperback, 01 January, 2007)
  273. Developing Drivers with the Windows Driver Foundation - Penny Orwick (2007-04-25, Paperback)
  274. Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer) , by Dominick Baier (Paperback, 25 October, 2006)
  275. Developing Solutions with Microsoft InfoPath (Pro - Developer) , by Vani Mandava Teredesai , Patrick Halstead , Matthew Blain (Paperback, 24 November, 2004)
  276. Digital Certificates : Applied Internet Security , by Jalal Feghhi , Peter Williams (Paperback, 15 October, 1998)
  277. Digital Character Design and Painting : The Photoshop CS Edition (Graphics Series) (Graphics Series) , by Don Seegmiller (Paperback, August, 2004)
  278. Digital Control System Analysis and Design (3rd Edition) , by Charles L. Phillips , H. Troy Nagle (Hardcover, 07 November, 1994)
  279. Digital Control System Design , by Mohammed S. Santina , Allen R. Stubberud , Gene H. Hostetter (Hardcover, 01 January, 1994)
  280. Digital Defense : What You Should Know About Protecting Your Company's Assets , by Thomas J. Parenty (Hardcover, September, 2003)
  281. Digital Design - Frank Vahid (2006-07-28, Hardcover)
  282. Digital Design (4th Edition) - M. Morris Mano (2006-12-15, Hardcover)
  283. Digital Design , by Paolo Martegani , Riccardo Montenegro , Paulo Martegani (Paperback, 01 December, 2000)
  284. Digital Design : Principles and Practices (4th Edition) , by John F. Wakerly (Hardcover, 21 July, 2005)
  285. Digital Design : Principles and Practices and Xilinx 4.2i Student Package (3rd Edition) , by John F. Wakerly (Hardcover, 19 July, 2002)
  286. Digital Design : Principles and Practices Package (4th Edition) - John F. Wakerly (2005-07-27, Hardcover)
  287. Digital Design and Computer Architecture , by David Harris , Sarah Harris (Paperback, 02 March, 2007)
  288. Digital Design Media (Architecture) , by William J. Mitchell , Malcolm McCullough (Paperback, 18 October, 1994)
  289. Digital Design with CPLD Applications and VHDL, 2E , by Robert Dueck (Hardcover, 08 June, 2004)
  290. Digital Designing in the Programmable Logic Devices , by John W. Carter (Paperback, 03 June, 1996)
  291. Digital Drawing for Designers : A Visual Guide to AutoCAD - Douglas R. Seidler (2007-02-28, Paperback)
  292. Digital Evidence and Computer Crime, Second Edition - Eoghan Casey (2004-03-08, Hardcover)
  293. Digital Identity , by Phillip J Windley (Paperback, 01 August, 2005)
  294. Digital Layout for the Internet and Other Media (E-Design) , by David Skopec (Paperback, 28 April, 2004)
  295. Digital Library Use : Social Practice in Design and Evaluation , by Ann Peterson Bishop , Nancy A. VanHouse , Barbara P. Buttenfield (Hardcover, 01 November, 2003)
  296. Digital Logic : Applications and Design , by John M. Yarbrough (Spiral-bound, 11 September, 1996)
  297. Digital Logic Circuit Analysis and Design , by Victor P. Nelson , H. Troy Nagle , Bill D. Carroll , David Irwin (Hardcover, 08 March, 1995)
  298. Digital People : From Bionic Humans to Androids , by Sidney Perkowitz (Hardcover, 01 April, 2004)
  299. Digital Principles and Design with CD-ROM , by Donald D. Givone (Hardcover, 10 July, 2002)
  300. Digital Retro : The Evolution and Design of the Personal Computer , by Gordon Laing (Paperback, 21 September, 2004)
  301. Digital System Design with VHDL (2nd Edition) , by Mark Zwolinski (Paperback, 30 December, 2003)
  302. Digital Systems Design Using VHDL , by Jr., Charles H. Roth (Hardcover, 14 January, 1998)
  303. Digital Systems Design with VHDL and Synthesis : An Integrated Approach , by K.C. Chang (Hardcover, 27 April, 1999)
  304. Digital Systems Engineering , by William J. Dally , John W. Poulton (Hardcover, 28 June, 1998)
  305. Disappearing Cryptography, Second Edition - Information Hiding : Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) , by Peter Wayner (Paperback, 29 April, 2002)
  306. Discrete Systems Laboratory Using MATLAB« , by Martin Schetzen , Vinay K. Ingle (Paperback, 02 December, 1999)
  307. Discrete Time Control Problems Using MATLAB« , by Dean, K. Fredrick , Nicolas, W. Chbat , Joe H. Chow , Dean K. Frederick , Nicholas W. Chbat (Paperback, 07 October, 2002)
  308. Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems) , by Nancy A. Lynch (Hardcover, ..)
  309. Distributed Computing : Fundamentals, Simulations, and Advanced Topics (Wiley Series on Parallel and Distributed Computing) , by Hagit Attiya , Jennifer Welch (Hardcover, 12 March, 2004)
  310. Documenting Software Architectures : Views and Beyond , by Paul Clements , Felix Bachmann , Len Bass , David Garlan , James Ivers , Reed Little , Robert Nord , Judith Stafford (Hardcover, 26 September, 2002)
  311. Don't Click on the Blue E! : Switching to Firefox , by Scott Granneman (Paperback, 25 April, 2005)
  312. Dos/VSE JCL , by Steve Eckols , Michele Milnes (Paperback, 01 February, 1989)
  313. Dot.Con : How America Lost Its Mind and Money in the Internet Era , by John Cassidy (Paperback, 13 May, 2003)
  314. Dr. Tom Shinder's Configuring ISA Server 2004 , by Thomas W. Shinder , Debra Littlejohn Shinder , Martin Grasdal (Paperback, 01 August, 2004)
  315. Dr. Tom Shinder's ISA Server and Beyond with CDROM , by Thomas W. Shinder , Martin Grasdal , Debra Littlejohn Shinder (Hardcover, 10 November, 2002)
  316. Dreamweaver 8 Design and Construction (O'Reilly Digital Studio) , by Marc Campbell (Paperback, 27 January, 2006)
  317. E-Commerce : A Control and Security Guide , by Gordon E. Smith (Hardcover, 19 December, 2003)
  318. E-on Software's Vue 6 Revealed - Richard H. Schrand (2006-12-19, Paperback)
  319. Effective Oracle Database 10g Security by Design , by David Knox , McGraw-Hill (Paperback, 10 June, 2004)
  320. Electronic Day Trading 101 (Wiley Online Trading for a Living) , by Sunny J. Harris (Hardcover, 22 October, 1999)
  321. Electronic Payment Systems for E-Commerce , by Donal O'Mahony , Michael Peirce , Hitesh Tewari , O'Mahony Donal (Hardcover, 15 August, 2001)
  322. Embedded C (With CD-ROM) , by Michael J Pont (Paperback, 15 April, 2002)
  323. Embedded Control Systems in C/C++ : An Introduction for Software Developers Using Matlab , by Jim Ledin (Paperback, 01 January, 2004)
  324. Embedded Linux System Design and Development , by P. Raghavan , Amol Lad , Sriram Neelakandan (Hardcover, 21 December, 2005)
  325. Embedded Robotics : Mobile Robot Design and Applications with Embedded Systems , by Thomas Braunl (Hardcover, 26 August, 2004)
  326. Embedded Systems Architecture : A Comprehensive Guide for Engineers and Programmers (Embedded Technology) - Tammy Noergaard (2005-02-10, Hardcover)
  327. Embedded Systems Building Blocks : Complete and Ready-to-Use Modules in C , by Jean J. Labrosse (Hardcover, 12 January, 1999)
  328. Ending Spam : Bayesian Content Filtering and the Art of Statistical Language Classification , by Jonathan A Zdziarski (Paperback, 01 July, 2005)
  329. Enduring Love : A Novel , by Ian Mcewan (Paperback, 29 December, 1998)
  330. Enemy at the Water Cooler : Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures , by Brian Contos , Dave Kleiman (Paperback, 23 August, 2006)
  331. Engineering a Compiler , by Keith Cooper , Linda Torczon (Hardcover, September, 2003)
  332. Engineering of Mind : An Introduction to the Science of Intelligent Systems , by James S. Albus , Alexander M. Meystel , James S. Albus (Hardcover, 07 September, 2001)
  333. Enhanced IP Services for CISCO Networks : A Practical Resource for Deploying Quality of Service, Security, IP Routing, and VPN Services , by Donald C. Lee (Hardcover, 15 October, 1999)
  334. Eniac : The Triumphs & Tragedies of the World's First Computer , by Scott McCartney , Adams Morgan (Audio Cassette, 01 May, 2000)
  335. Enterprise Architecture Planning : Developing a Blueprint for Data, Applications, and Technology , by Steven H. Spewak (Paperback, September, 1993)
  336. Enterprise Integration : An Architecture for Enterprise Application and Systems Integration , by Fred A. Cummins (Paperback, 01 February, 2002)
  337. Enterprise Integration with Ruby , by Maik Schmidt (Paperback, 25 April, 2006)
  338. Enterprise Knowledge Management : The Data Quality Approach (The Morgan Kaufmann Series in Data Management Systems) , by David Loshin (Paperback, 22 January, 2001)
  339. Enterprise Security , by Robert C. Newman (Hardcover, 26 September, 2002)
  340. Enterprise Security Architecture : A Business-Driven Approach , by John Sherwood , Andrew Clark , David Lynas (Hardcover, 12 November, 2005)
  341. Enterprise Service Bus : Theory in Practice , by David Chappell (Paperback, June, 2004)
  342. Enterprise SOA : Designing IT for Business Innovation , by Dan Woods , Thomas Mattern (Paperback, 28 April, 2006)
  343. Enterprise SOA : Service-Oriented Architecture Best Practices (The Coad Series) - Dirk Krafzig (2004-11-09, Paperback)
  344. Error Control Systems for Digital Communication and Storage , by Stephen B. Wicker (Hardcover, 15 January, 1995)
  345. Essential Business Process Modeling , by Michael Havey (Paperback, 18 August, 2005)
  346. Essential Check Point FireWall-1 NG : An Installation, Configuration, and Troubleshooting Guide , by Dameon D. Welch-Abernathy (Paperback, 21 January, 2004)
  347. Essential COM , by Don Box (Paperback, 22 December, 1997)
  348. Essential PHP Security , by Chris Shiflett (Paperback, 13 October, 2005)
  349. Essential SNMP, Second Edition - Douglas Mauro (2005-09-21, Paperback)
  350. Essential SourceSafe , by Larry C. Whipple , Ted Roche (Paperback, 01 June, 2001)
  351. Evaluating Software Architectures : Methods and Case Studies , by Paul Clements , Rick Kazman , Mark Klein (Hardcover, ..)
  352. Evolutionary Robotics : The Biology, Intelligence, and Technology of Self-Organizing Machines (Intelligent Robotics and Autonomous Agents) , by Stefano Nolfi , Dario Floreano (Paperback, 01 March, 2004)
  353. Exploiting Online Games : Cheating Massively Distributed Systems (Addison-Wesley Software Security Series) - Greg Hoglund (2007-07-09, Paperback)
  354. Exploiting Software : How to Break Code (Addison-Wesley Software Security Series) , by Greg Hoglund , Gary McGraw (Paperback, 17 February, 2004)
  355. Exploring Requirements : Quality Before Design - Donald C. Gause (1989-09-01, Hardcover)
  356. Extreme Mindstorms : an Advanced Guide to Lego Mindstorms , by Dave Baum , Michael Gasperi , Ralph Hempel , Luis Villa , David Baum (Paperback, October, 2000)
  357. Extreme NXT : Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action) - Michael Gasperi (2007-04-09, Paperback)
  358. Extrusion Detection : Security Monitoring for Internal Intrusions , by Richard Bejtlich (Paperback, 08 November, 2005)
  359. FAB : The Coming Revolution on Your Desktop--From Personal Computers to Personal Fabrication , by Neil Gershenfeld (Hardcover, 12 April, 2005)
  360. Fab : The Coming Revolution on Your Desktop-from Personal Computers to Personal Fabrication , by Neil Gershenfeld (Paperback, 05 February, 2007)
  361. Father, Son & Co. : My Life at IBM and Beyond , by Thomas J. Watson , Peter Petre (Perfect Paperback, 29 February, 2000)
  362. Feedback Control Problems Using MATLAB« and the Control System Toolbox , by Dean K. Frederick , Joe Chow (Paperback, 31 August, 1999)
  363. Fibre Channel Storage Area Networks , by The Fibre Channel Industry Association (Paperback, 15 August, 2001)
  364. File System Forensic Analysis - Brian Carrier (2005-03-17, Paperback)
  365. Financial Freedom Through Electronic Day Trading , by Van K. Tharp , Brian June (Hardcover, 18 December, 2000)
  366. Find It Online, Fourth Edition : The Complete Guide to Online Research (Find It Online : The Complete Guide to Online Research) , by Alan M. Schlein (Paperback, 25 August, 2004)
  367. Firefox and Thunderbird Garage (The Garage Series) , by Chris Hofmann , Marcia Knous , John Hedtke (Paperback, 08 April, 2005)
  368. Firefox For Dummies (For Dummies (Computer/Tech)) , by Blake Ross (Paperback, 11 January, 2006)
  369. Firefox Hacks : Tips & Tools for Next-Generation Web Browsing (Hacks) , by Nigel McFarlane (Paperback, 14 March, 2005)
  370. Firefox Secrets : A Need-To-Know Guide , by Cheah Yeow (Paperback, 15 June, 2005)
  371. Firewall Architecture for the Enterprise , by Norbert Pohlmann , Tim Crothers , Norbert Pohlmann , Tim Crothers (Paperback, 08 July, 2002)
  372. Firewall Fundamentals , by Wes Noonan , Ido Dubrawsky (Paperback, 02 June, 2006)
  373. Firewalls for Dummies, Second Edition , by Brian Komar , Ronald Beekelaar , Joern Wettern (Paperback, 27 June, 2003)
  374. FireWire(R) System Architecture : IEEE 1394A (2nd Edition) , by Inc. MindShare , Don Anderson (Paperback, 17 December, 1998)
  375. Fluid Concepts and Creative Analogies , by Douglas Hofstadter (Paperback, 09 August, 2005)
  376. Forensic Discovery , by Dan Farmer , Wietse Venema (Hardcover, 31 December, 2004)
  377. Foundations of Analog and Digital Electronic Circuits (The Morgan Kaufmann Series in Computer Architecture and Design) , by Anant Agarwal , Jeffrey Lang (Paperback, 15 July, 2005)
  378. Foundations of BizTalk Server 2006 (Foundations) , by Daniel Woolston (Paperback, 29 January, 2007)
  379. Foundations of Multithreaded, Parallel, and Distributed , by Gregory R. Andrews (Paperback, 22 October, 1999)
  380. Foundations of Security : What Every Programmer Needs to Know (Expert's Voice) - Neil Daswani (2007-02-16, Paperback)
  381. FPGA-Based System Design , by Wayne Wolf (Hardcover, 15 June, 2004)
  382. Free Expression in the Age of the Internet : Social and Legal Boundaries , by Jeremy Lipschultz (Paperback, 01 November, 1999)
  383. From P2P to Web Services and Grids : Peers in a Client/Server World , by Ian J. Taylor (Paperback, 21 October, 2004)
  384. Fundamentals of Database Systems (5th Edition) , by Ramez Elmasri , Shamkant B. Navathe (Hardcover, 07 March, 2006)
  385. Fundamentals of Database Systems, Fourth Edition - Ramez Elmasri (2003-07-23, Hardcover)
  386. Fundamentals of Digital Logic and Microcomputer Design : Includes Verilog & VHDL -- Fourth Edition , by Mohamed Rafiquzzaman , M. Rafiquzzaman (Hardcover, 27 December, 2002)
  387. Fundamentals of Digital Logic with Verilog Design - Stephen Brown (2002-08-20, Hardcover)
  388. Fundamentals of Digital Logic with VHDL Design with CD-ROM (McGraw-Hill Series in Electrical and Computer Engineering) - Stephen Brown (2004-07-15, Hardcover)
  389. Fundamentals of Logic Design (with CD-ROM) - Jr., Charles H. Roth (2003-06-11, Hardcover)
  390. Fundamentals of Network Security , by Eric Maiwald , Eric Maiwald (Paperback, 07 November, 2003)
  391. Fuzzing : Brute Force Vulnerability Discovery - Michael Sutton (2007-06-29, Paperback)
  392. Fuzzy and Neural Approaches in Engineering (Adaptive and Learning Systems for Signal Processing, Communications and Control Series) , by Lefteri H. Tsoukalas , Robert E. Uhrig (Hardcover, January, 1997)
  393. Geek House : 10 Hardware Hacking Projects for Around Home (ExtremeTech) , by Barry Press , Marcia Press (Paperback, 06 May, 2005)
  394. Getting Started in Online Day Trading , by Kassandra Bentley (Paperback, 15 January, 2000)
  395. Going Public in Good Times and Bad , by Robert G. Heim (Paperback, 15 January, 2002)
  396. Google : The Missing Manual , by Sarah Milstein , Jude Biersdorfer , Rael Dornfest , Matthew MacDonald (Paperback, 01 August, 2005)
  397. Google : The Missing Manual , by Sarah Milstein , Rael Dornfest (Paperback, May, 2004)
  398. Google and the Myth of Universal Knowledge : A View from Europe , by Jean-Noel Jeanneney , Ian Wilson , Teresa Lavender Fagan (Hardcover, 01 November, 2006)
  399. Google Hacking for Penetration Testers, Volume 1 , by Johnny Long , Ed Skoudis , Alrik van Eijkelenborg (Paperback, 06 February, 2005)
  400. Google Hacks (Hacks) , by Tara Calishain , Rael Dornfest (Paperback, 01 December, 2004)
  401. Google Hacks : Tips & Tools for Finding and Using the World's Information (Hacks) - Rael Dornfest (2006-08-03, Paperback)
  402. Google Powered : Productivity with Online Tools , by Jerri L. Ledford (Paperback, 23 January, 2007)
  403. Googlepedia : The Ultimate Google Resource , by Michael Miller (Paperback, 11 July, 2006)
  404. Gray Hat Hacking : The Ethical Hacker's Handbook - Shon Harris (2004-11-09, Paperback)
  405. Grid Computing (On Demand Series) , by Joshy Joseph , Craig Fellenstein (Paperback, 30 December, 2003)
  406. Guerrilla Capacity Planning : A Tactical Approach to Planning for Highly Scalable Applications and Services , by Neil J. Gunther (Hardcover, 19 December, 2006)
  407. Guide to Disaster Recovery - Michael Erbschloe (2003-03-10, Paperback)
  408. Guide to Enterprise IT Architecture , by Col Perks , Tony Beveridge (Hardcover, 31 October, 2002)
  409. Guide to Firewalls and Network Security : Intrusion Detection and VPNs , by Greg Holden (Paperback, 15 April, 2003)
  410. Guide to Network Defense and Countermeasures - Randy Weaver (2006-01-09, Paperback)
  411. Hack Attacks Denied : A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Edition , by John Chirillo (Paperback, 06 September, 2002)
  412. Hack Attacks Revealed : A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition , by John Chirillo (Paperback, 21 August, 2002)
  413. Hack I.T. : Security Through Penetration Testing , by T. J. Klevinsky , Scott Laliberte , Ajay Gupta (Paperback, February, 2002)
  414. Hack Proofing ColdFusion , by Steve Casco , Rob Rusher , Greg Meyer , Sarge , David Vaccaro , David An (Paperback, April, 2002)
  415. Hack Proofing Linux : A Guide to Open Source Security , by James Stanger , Patrick T. Lane (Paperback, 10 July, 2001)
  416. Hack Proofing Sun Solaris 8 , by Wyman Miles , Ed Mitchell , F. William Lynch , Randy Cook , Ido Dubrawsky (Paperback, 15 October, 2001)
  417. Hack Proofing Your Network (Second Edition) , by Ryan Russell , Dan Kaminsky , Rain Forest Puppy , Joe Grand , K2 , David Ahmad , Hal Flynn , Ido Dubrawsky , Steve W. Manzuik , Ryan Permeh (Paperback, March, 2002)
  418. Hack the Stack : Using Snort and Ethereal to Master the 8 Layers of an Insecure Network , by Michael Gregg (Paperback, 17 October, 2006)
  419. Hacker's Challenge 2 : Test Your Network Security & Forensic Skills , by Mike Schiffman , Bill Pennington , David Pollino , Adam J. O'Donnell (Paperback, 18 December, 2002)
  420. Hacker's Challenge 3 , by David Pollino , Bill Pennington , Tony Bradley , Himanshu Dwivedi (Paperback, 25 April, 2006)
  421. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace , by David Chanoff , Ejovi Nuwere (Paperback, 16 December, 2003)
  422. Hacker Disassembling Uncovered (Uncovered series) , by Kris Kaspersky (Paperback, 01 February, 2007)
  423. Hacker Proof , by Kris Jamsa (Paperback, 01 February, 2002)
  424. Hackers : Crime in the Digital Sublime , by Paul A. Taylor , Paul Taylor (Paperback, September, 1999)
  425. Hackers and Painters : Big Ideas from the Computer Age - Paul Graham (2004-05, Hardcover)
  426. Hackers Beware : The Ultimate Guide to Network Security , by Eric Cole (Paperback, 13 August, 2001)
  427. Hacking : The Art of Exploitation - Jon Erickson (2003-10, Paperback)
  428. Hacking Exposed 5th Edition (Hacking Exposed) - Stuart McClure (2005-04-19, Paperback)
  429. Hacking Exposed Cisco Networks (Hacking Exposed) , by Andrew Vladimirov , Konstantin Gavrilenko , Andrei Mikhailovsky (Paperback, 15 December, 2005)
  430. Hacking Exposed Computer Forensics (Hacking Exposed) , by Chris Davis , Aaron Philipp , David Cowen (Paperback, 22 November, 2004)
  431. Hacking Exposed VoIP : Voice Over IP Security Secrets & Solutions (Hacking Exposed) , by David Endler , Mark Collier (Paperback, 28 November, 2006)
  432. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) - Joel Scambray (2006-06-05, Paperback)
  433. Hacking Exposed Wireless (Hacking Exposed) - Johnny Cache (2007-03-26, Paperback)
  434. Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech) , by Mel Reyes (Paperback, 05 August, 2005)
  435. Hacking For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2006-10-30, Paperback)
  436. Hacking GMail (ExtremeTech) , by Ben Hammersley (Paperback, 19 December, 2005)
  437. Hacking Movable Type (ExtremeTech) , by Jay Allen , Brad Choate , Ben Hammersley , Matthew Haughey , Ben Trott , Mena Trott , David Raynes (Paperback, 22 July, 2005)
  438. Hacking Roomba : ExtremeTech , by Tod E. Kurt (Paperback, 20 November, 2006)
  439. Hacking RSS and Atom , by Leslie M. Orchard (Paperback, 09 September, 2005)
  440. Hacking the Code : ASP.NET Web Application Security , by Mark Burnett (Paperback, May, 2004)
  441. Hacking the Xbox : An Introduction to Reverse Engineering , by Andrew Huang (Paperback, July, 2003)
  442. Hacking Web Services (Internet Series) , by Shreeraj Shah (Paperback, 02 August, 2006)
  443. Hacking Windows Vista : ExtremeTech - Steve Sinchak (2007-05-29, Paperback)
  444. Hacking Windows XP (ExtremeTech) - Steve Sinchak (2004-08-06, Paperback)
  445. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2005-09-13, Paperback)
  446. HackNotes(tm) Network Security Portable Reference , by Michael Horton , Clinton Mugge (Paperback, 25 July, 2003)
  447. HackNotes(tm) Web Security Pocket Reference , by Mike Shema (Paperback, 30 June, 2003)
  448. Handbook of Digital Techniques for High-Speed Design : Design Examples, Signaling and Memory Technologies, Fiber Optics, Modeling, and Simulation to Ensure ... (Prentice Hall Modern Semiconductor Design) , by Tom Granberg (Hardcover, ..)
  449. Handbook of Relational Database Design , by Candace C. Fleming , Barbara von Halle (Paperback, ..)
  450. Handbook on Enterprise Architecture (International Handbooks on Information Systems) , by Peter Bernus , Laszlo Nemes , Gunter Schmidt (Hardcover, 05 November, 2003)
  451. Hands-on AI with Java : Smart Gaming, Robots, and More , by Edwin Wise , Edwin Wise (Paperback, 16 January, 2004)
  452. Hardening Apache , by Tony Mobily (Paperback, 17 May, 2004)
  453. Hardening Cisco Routers (O'Reilly Networking) , by Thomas Akin (Paperback, February, 2002)
  454. Hardening Linux , by James Turnbull (Paperback, 01 February, 2005)
  455. Hardening Network Infrastructure (Hardening) , by Wes Noonan (Paperback, 07 May, 2004)
  456. Hardening Windows Systems (Hardening) , by Roberta Bragg (Paperback, 11 May, 2004)
  457. Hardware Hacking : Have Fun While Voiding Your Warranty , by Joe Grand , Ryan Russell , Kevin Mitnick (Editor) (Paperback, 01 January, 2004)
  458. Hardware Hacking Projects for Geeks , by Scott Fullam (Paperback, 01 November, 2003)
  459. HDL Programming Fundamentals : VHDL and Verilog (Davinci Engineering) , by Nazeih M Botros (Hardcover, 18 November, 2005)
  460. High-Speed Digital Design : A Handbook of Black Magic , by Howard Johnson (Hardcover, 08 April, 1993)
  461. High-Speed Digital System Design : A Handbook of Interconnect Theory and Design Practices , by Stephen H. Hall , Garrett W. Hall , James A. McCall (Hardcover, 25 August, 2000)
  462. High-Tech Crimes Revealed : Cyberwar Stories from the Digital Front , by Steven Branigan (Paperback, 27 August, 2004)
  463. High Performance Cluster Computing : Architectures and Systems , by Rajkumar Buyya (Paperback, 15 June, 1999)
  464. High Performance Memories : New Architecture DRAMs and SRAMs - Evolution and Function , by Betty Prince (Hardcover, 27 July, 1999)
  465. Highly Available Storage for Windows Servers , by Paul Massiglia (Hardcover, 15 December, 2001)
  466. Holy Grail of Data Storage Management, The , by Jon William Toigo , Margaret Romao Toigo , Jon W. Toigo (Hardcover, 16 August, 1999)
  467. Home Hacking Projects for Geeks (Hacks) , by Tony Northrup , Eric Faulkner (Paperback, 01 December, 2004)
  468. Home Networking Annoyances : How to Fix the Most Annoying Things about Your Home Network (Annoyances) , by Kathy Ivens (Paperback, 26 January, 2005)
  469. Home Networking For Dummies (For Dummies (Computer/Tech)) , by Kathy Ivens (Paperback, 26 March, 2007)
  470. Home Theater Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Brett McLaughlin (Paperback, 01 November, 2004)
  471. Honeypots : Tracking Hackers , by Lance Spitzner (Paperback, 10 September, 2002)
  472. Honeypots for Windows (The Experts Voice) , by Roger A. Grimes (Paperback, 14 February, 2005)
  473. Host Integrity Monitoring Using Osiris and Samhain , by Brian Wotring , Bruce Potter , Marcus Ranum (Paperback, 01 June, 2005)
  474. How Computers Work (8th Edition) (How It Works) , by Ron White , Timothy Edward Downs (Paperback, 09 November, 2005)
  475. How I Trade for a Living (Wiley Online Trading for a Living) , by Gary Smith (Hardcover, 26 October, 1999)
  476. How I Trade Options (Wiley Trading) , by Jon Najarian (Hardcover, 15 January, 2000)
  477. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN , by Lee Barken (Paperback, 29 August, 2003)
  478. How to Break Software Security , by James A. Whittaker , Herbert H. Thompson , Herbert Thompson (Paperback, ..)
  479. How to Break Web Software : Functional and Security Testing of Web Applications and Web Services. Book & CD - Mike Andrews (2006-02-02, Paperback)
  480. How to Build a Multi-Level Money Machine , by Randy Gage (Paperback, December, 2001)
  481. How to Cheat at Configuring ISA Server 2004 , by Dr Thomas Shinder , Debra Littlejohn Shinder (Paperback, 14 February, 2006)
  482. How to Cheat at Managing Information Security , by Mark Osborne , Paul M Summitt (Paperback, ..)
  483. How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware (How to Do Everything) , by Ken Feinstein (Paperback, 27 July, 2004)
  484. How To Get Started In Electronic Day Trading , by David S. Nassar (Paperback, 01 October, 2001)
  485. How to Survive in the Jungle of Enterprise Architecture Frameworks : Creating or Choosing an Enterprise Architecture Framework , by Jaap Schekkerman (Paperback, 06 July, 2006)
  486. HP-UX 11i Security , by Chris Wong (Paperback, 24 September, 2001)
  487. Hunting Security Bugs , by Tom Gallagher , Lawrence Landauer , Bryan Jeffries (Paperback, 09 June, 2006)
  488. HyperTransport System Architecture , by MindShare Inc. , Jay Trodden , Don Anderson , Inc. MindShare (Paperback, 11 February, 2003)
  489. I Found It on the Internet : Coming of Age Online , by Frances Jacobson Harris (Paperback, 01 April, 2005)
  490. I, Cyborg , by Kevin Warwick (Paperback, 30 October, 2004)
  491. I.T. Wars : Managing the Business-Technology Weave in the New Millennium , by David Scott (Paperback, 27 March, 2006)
  492. IBM's 360 and Early 370 Systems (History of Computing) , by Emerson W. Pugh , Lyle R. Johnson , John H. Palmer (Hardcover, 04 January, 1991)
  493. Implementing Backup and Recovery : The Readiness Guide for the Enterprise , by David B Little , David A. Chapa (Paperback, 16 May, 2003)
  494. Implementing CIFS : The Common Internet File System , by Christopher Hertel , Christopher R. Hertel (Paperback, 14 August, 2003)
  495. Implementing Database Security and Auditing : Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase , by Ron Ben Natan (Paperback, 18 April, 2005)
  496. Implementing SSH : Strategies for Optimizing the Secure Shell , by Himanshu Dwivedi (Paperback, 17 October, 2003)
  497. Improving .NET Application Performance and Scalability (Patterns & Practices) , by Microsoft Corporation (Paperback, 28 July, 2004)
  498. Improving Web Application Security : Threats and Countermeasures , by Microsoft Corporation (Paperback, 24 September, 2003)
  499. Improvisational Design : Continuous, Responsive Digital Communication , by Suguru Ishizaki (Hardcover, 16 September, 2002)
  500. In Search of Clusters (2nd Edition) , by Gregory Pfister (Paperback, 12 December, 1997)
  501. Incident Response : A Strategic Guide to Handling System and Network Security Breaches , by E. Eugene Schultz , Russell Shumway (Paperback, 15 January, 2002)
  502. Incident Response : Computer Forensics Toolkit , by Douglas Schweitzer (Paperback, 11 April, 2003)
  503. Incident Response and Computer Forensics, Second Edition - Chris Prosise (2003-07-17, Paperback)
  504. Industrial Strength Parallel Computing , by Alice E. Koniges (Hardcover, 15 January, 2000)
  505. Information Architecture : Blueprints for the Web - Christina Wodtke (2002-10-16, Paperback)
  506. Information Architecture for the World Wide Web : Designing Large-Scale Web Sites - Louis Rosenfeld (2006-11-27, Paperback)
  507. Information Architecture for the World Wide Web : Designing Large-Scale Web Sites , by Louis Rosenfeld , Peter Morville (Paperback, ..)
  508. Information Literacy and Technology - Carla List-Handley (2005-05-01, Paperback)
  509. Information Retrieval : Algorithms and Heuristics (The Information Retrieval Series)(2nd Edition) , by David A. Grossman , Ophir Frieder (Paperback, 23 January, 2006)
  510. Information Security : Principles and Practices (Security) , by Mark Merkow , James Breithaupt (Paperback, 19 August, 2005)
  511. Information Security Illuminated (Jones and Barlett Illuminated) , by Michael G. Solomon , Mike Chapple (Paperback, 25 April, 2005)
  512. Information Security Risk Analysis, Second Edition , by Thomas R. Peltier (Hardcover, 26 April, 2005)
  513. Information Storage and Retrieval , by Robert R. Korfhage (Hardcover, 27 May, 1997)
  514. Information Systems Today : Managing in the Digital World (3rd Edition) - Leonard Jessup (2007-03-29, Hardcover)
  515. Information Warfare & Security , by Dorothy E. Denning (Paperback, 10 December, 1998)
  516. Information Warfare Principles and Operations , by Edward Waltz (Hardcover, August, 1998)
  517. Innocent Code : A Security Wake-Up Call for Web Programmers , by Sverre H. Huseby (Paperback, 05 February, 2004)
  518. Inside Internet Security : What Hackers Don't Want You To Know , by Jeff Crume (Paperback, 25 August, 2000)
  519. Inside Java 2 Platform Security : Architecture, API Design, and Implementation (2nd Edition) , by Li Gong , Gary Ellison , Mary Dageforde (Paperback, 27 May, 2003)
  520. Inside Microsoft Dynamics AX 4.0 - Arthur Greef (2006-08-09, Paperback)
  521. Inside Microsoft SQL Server (tm) 2005 : The Storage Engine - Kalen Delaney (2006-11-08, Paperback)
  522. Inside Network Perimeter Security (2nd Edition) (Inside) , by Stephen Northcutt , Lenny Zeltser , Scott Winters , Karen Kent , Ronald W. Ritchey (Paperback, 04 March, 2005)
  523. Inside Network Security Assessment : Guarding Your IT Infrastructure , by Michael Gregg , David Kim (Paperback, 18 November, 2005)
  524. Inside the Machine : An Illustrated Introduction to Microprocessors and Computer Architecture - Jon Stokes (2006-11-30, Hardcover)
  525. Inside the Security Mind : Making the Tough Decisions , by Kevin Day (Paperback, 20 February, 2003)
  526. Inside the Spam Cartel : Trade Secrets from the Dark Side , by Spammer-X , Jeffrey Posluns (Editor) , Stu Sjouwerman (Foreword) (Paperback, 09 November, 2004)
  527. Inside Windows Storage : Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond , by Dilip C. Naik , Dilip Naik (Paperback, 15 July, 2003)
  528. Intelligent Systems : Architecture, Design, Control , by James S. Albus , James S. Albus (Hardcover, 07 August, 2001)
  529. Interactive TV Standards : A Guide to MHP, OCAP, and JavaTV , by Steven Morris , Anthony Smith-Chaigneau (Hardcover, 21 April, 2005)
  530. International IT Governance : An Executive Guide to ISO 17799/ISO 27001 , by Alan Calder , Steve Watkins (Paperback, 31 August, 2006)
  531. Internet Annoyances : How to Fix the Most Annoying Things about Going Online (Annoyances) , by Preston Gralla (Paperback, 01 January, 2005)
  532. Internet Cryptography , by Richard E. Smith (Paperback, 15 January, 1997)
  533. Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) , by Jelena Mirkovic , Sven Dietrich , David Dittrich , Peter Reiher (Paperback, 30 December, 2004)
  534. Internet Forensics , by Robert Jones (Paperback, 07 October, 2005)
  535. Internet Routing Architectures (2nd Edition) , by Sam Halabi (Hardcover, 15 January, 2000)
  536. Internet Security : A Jumpstart for Systems Administrators and IT Managers , by Tim Speed , Juanita Ellis (Paperback, May, 2003)
  537. Internet Security Made Easy , by Douglas Schweitzer (Paperback, 15 December, 2001)
  538. Introduction to Autonomous Mobile Robots (Intelligent Robotics and Autonomous Agents) - Roland Siegwart (2004-04-01, Hardcover)
  539. Introduction to Commercial Design Using Autodesk Revit Building 9 - Daniel John Stine (2006-06-01, Paperback)
  540. Introduction to Communication Electronic Warfare Systems (Artech House Information Warfare Library) , by Richard Poisel (Hardcover, 01 March, 2002)
  541. Introduction to Computer Security - Matt Bishop (2004-10-26, Hardcover)
  542. Introduction to Computing Systems : From bits & gates to C & beyond - Yale N. Patt (2003-08-05, Hardcover)
  543. Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems) , by Khalid Sayood (Hardcover, ..)
  544. Introduction to Data Mining, (First Edition) - Pang-Ning Tan (2005-05-02, Hardcover)
  545. Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization) , by Gianpaolo Ghiani , Gilbert Laporte , Roberto Musmanno (Paperback, 09 January, 2004)
  546. Introduction to Modern Information Retrieval - G. G. Chowdhury (2003-12-01, Paperback)
  547. Introduction to Online Investment Research , by Jan Davis (Hardcover, 15 February, 2004)
  548. Introduction to Process Algebra (Texts in Theoretical Computer Science) , by Wan Fokkink , W. Brauer , G. Rozenberg , A. Salomaa , W. Fokkink (Hardcover, 01 January, 2000)
  549. Introduction to Robotics : Analysis, Systems, Applications , by Saeed B. Niku , Saeed B Niku (Hardcover, 20 July, 2001)
  550. Introduction to Robotics : Mechanics and Control (3rd Edition) , by John J. Craig (Hardcover, ..)
  551. Introduction to Robotics in CIM Systems (5th Edition) , by James A. Rehg (Hardcover, 08 March, 2002)
  552. Introduction to RPG IV , by Robert Cozzi , Bob Cozzi (Paperback, December, 1997)
  553. Intrusion Detection with Snort , by Jack Koziol (Paperback, 20 May, 2003)
  554. Intrusion Detection with SNORT : Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID , by Rafeeq Rehman (Paperback, 08 May, 2003)
  555. Intrusion Prevention and Active Response : Deploying Network and Host IPS , by Michael Rash , Angela D. Orebaugh , Graham Clark , Becky Pinkard , Jake Babbin (Paperback, 15 February, 2005)
  556. Intrusion Prevention Fundamentals , by Earl Carter , Jonathan Hogue (Paperback, 18 January, 2006)
  557. Intrusion Signatures and Analysis , by Mark Cooper , Stephen Northcutt , Matt Fearnow , Karen Frederick (Paperback, 29 January, 2001)
  558. Investing Online for Dummies Quick Reference , by Thomas S. Gray (Plastic Comb, 21 June, 2000)
  559. IPSec : The New Security Standard for the Internet, Intranets, and Virtual Private Networks , by Naganand Doraswamy , Dan Harkins (Paperback, 13 March, 2003)
  560. IPSec VPN Design , by Vijay Bollapragada , Mohamed Khalid , Scott Wainner (Paperback, 29 March, 2005)
  561. IPv6 Essentials , by Silvia Hagen (Paperback, 17 May, 2006)
  562. IRC Hacks , by Paul Mutton (Paperback, 27 July, 2004)
  563. ISA System Architecture (3rd Edition) , by Inc. MindShare , Don Anderson , Tom Shanley (Paperback, 07 April, 1995)
  564. ISP Liability Survival Guide : Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations , by Timothy D. Casey (Paperback, 08 May, 2000)
  565. IT Architecture Toolkit (Harris Kern's Enterprise Computing Institute Series) , by Jane Carbone (Hardcover, 10 May, 2004)
  566. IT Architectures and Middleware : Strategies for Building Large, Integrated Systems (2nd Edition) (Unisys Series) , by Chris Britton , Peter Bye (Paperback, 24 May, 2004)
  567. IT Auditing : Using Controls to Protect Information Assets , by Chris Davis , Mike Schiller , Kevin Wheeler (Paperback, 22 December, 2006)
  568. IT Security : Risking the Corporation , by Linda McCarthy (Paperback, 24 February, 2003)
  569. Itanium Architecture for Programmers : Understanding 64-Bit Processors and EPIC Principles , by James S. Evans , Gregory L. Trimper (Paperback, 02 May, 2003)
  570. J2EE Connector Architecture and Enterprise Application Integration , by Rahul Sharma , Beth Stearns , Tony Ng (Paperback, 14 December, 2001)
  571. Java Concurrency in Practice , by Brian Goetz , Tim Peierls , Joshua Bloch , Joseph Bowbeer , David Holmes , Doug Lea (Paperback, 02 June, 2006)
  572. Java Security (2nd Edition) , by Scott Oaks (Paperback, 17 May, 2001)
  573. Java Security Solutions , by Rich Helton , Johennie Helton , Rich Helton , Johennie Helton (Paperback, 01 May, 2002)
  574. Java Thread Programming , by Paul Hyde (Paperback, 20 August, 1999)
  575. Java Threads , by Scott Oaks , Henry Wong (Paperback, 10 September, 2004)
  576. Java(tm) for S/390 and AS/400 COBOL Programmers , by Phil Coulthard , George Farr (Paperback, 06 June, 2000)
  577. Jeff Duntemann's Wi-Fi Guide, Second Edition , by Jeff Duntemann (Paperback, April, 2004)
  578. Joe Celko's SQL for Smarties : Advanced SQL Programming Third Edition (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 15 August, 2005)
  579. Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems) , by Joe Celko (Paperback, 21 September, 2006)
  580. Karel The Robot : A Gentle Introduction to the Art of Programming, 2nd Edition , by Richard E. Pattis (Paperback, 11 July, 1994)
  581. Karel++ : A Gentle Introduction to the Art of Object-Oriented Programming , by Joseph Bergin , Mark Stehlik , Jim Roberts , Richard E. Pattis (Paperback, 02 October, 1996)
  582. Kerberos : A Network Authentication System , by Brian Tung (Paperback, 04 May, 1999)
  583. Kerberos : The Definitive Guide , by Jason Garman (Paperback, 26 August, 2003)
  584. Knoppix Pocket Reference , by Kyle Rankin (Paperback, 10 June, 2005)
  585. Know Your Enemy : Learning about Security Threats (2nd Edition) , by Honeynet Project The (Paperback, 17 May, 2004)
  586. Lab Manual For Security + Guide To Network Security Fundamentals - Paul Cretaro (2004-08-19, Paperback)
  587. Ldap Metadirectory Provisioning Methodology : A Step by Step Method to Implementing Ldap Based Metadirectory Provisioning & Identity Management Systems , by Marlin Pohlman (Paperback, March, 2003)
  588. Learning from Data : Concepts, Theory, and Methods (Adaptive and Learning Systems for Signal Processing, Communications and Control Series) , by Vladimir Cherkassky , Filip Mulier (Hardcover, 20 March, 1998)
  589. Learning Red Hat Enterprise Linux and Fedora , by Bill McCarty (Paperback, 01 April, 2004)
  590. LEGO Mindstorms for Dummies , by Michael Meadhra , Peter J. Stouffer (Paperback, 15 October, 2000)
  591. LEGO Mindstorms Masterpieces : Building Advanced Robots , by Mario Ferrari , Giulio Ferrari , Kevin Clague , J. P. Brown , Ralph Hempel (Paperback, February, 2003)
  592. LEGO Mindstorms NXT : The Mayan Adventure (Technology in Action) , by Jim Kelly (Paperback, 11 December, 2006)
  593. LEGO Software Power Tools, With LDraw, MLCad, and LPub , by Kevin Clague , Miguel Agullo , Lars C. Hassing (Paperback, January, 2003)
  594. LEGO Spybotics Secret Agent Training Manual , by Ralph Hempel (Paperback, 22 November, 2002)
  595. Leo Laporte's PC Help Desk (Laporte Press) , by Leo Laporte , Mark Edward Soper (Paperback, 06 September, 2005)
  596. Lifehacker : 88 Tech Tricks to Turbocharge Your Day - Gina Trapani (2006-12-18, Paperback)
  597. Linear System Theory and Design (Oxford Series in Electrical and Computer Engineering) - Chi-Tsong Chen (1998-08-14, Hardcover)
  598. Linksys WRT54G Ultimate Hacking , by Paul Asadoorian , Larry Pesce (Paperback, 15 May, 2007)
  599. Linux Appliance Design : A Hands-On Guide to Building Linux Appliances , by Bob Smith , John Hardin , Graham Phillips , Bill Pierce (Paperback, 31 March, 2007)
  600. Linux Enterprise Cluster : Build a Highly Available Cluster with Commodity Hardware and Free Software , by Karl Kopper (Paperback, 15 May, 2005)
  601. Linux Firewalls (3rd Edition) (Novell Press) , by Steve Suehring , Robert Ziegler (Paperback, 14 September, 2005)
  602. Linux iptables Pocket Reference , by Gregor N. Purdy (Paperback, November, 2004)
  603. Linux Network Security (Administrator's Advantage Series) , by Peter G. Smith (Paperback, March, 2005)
  604. Linux Pocket Guide - Daniel J. Barrett (2004-03-01, Paperback)
  605. Linux Security (Craig Hunt Linux Library) , by Ramon J. Hontanon (Paperback, 14 June, 2001)
  606. Linux Security Cookbook , by Daniel J. Barrett , Richard E. Silverman , Robert G. Byrnes (Paperback, June, 2003)
  607. Linux Server Security , by Michael D Bauer (Paperback, 18 January, 2005)
  608. Load Balancing Servers, Firewalls, * Caches , by Chandra Kopparapu (Hardcover, 25 January, 2002)
  609. Logic and Computer Design Fundamentals (4th Edition) - M. Morris Mano (2007-06-07, Hardcover)
  610. Logic in Computer Science : Modelling and Reasoning about Systems , by Michael Huth , Mark Ryan (Paperback, 30 August, 2004)
  611. Malicious Cryptography : Exposing Cryptovirology , by Adam Young , Moti Yung (Paperback, 27 February, 2004)
  612. Malicious Mobile Code : Virus Protection for Windows (O'Reilly Computer Security) , by Roger Grimes (Paperback, August, 2001)
  613. Malware : Fighting Malicious Code - Ed Skoudis (2003-11-09, Paperback)
  614. Managing A Network Vulnerability Assessment , by Thomas Peltier , Justin Peltier , John A. Blackley (Paperback, 28 May, 2003)
  615. Managing Enterprise Content : A Unified Content Strategy - Ann Rockley (2002-10-17, Paperback)
  616. Managing Gigabytes : Compressing and Indexing Documents and Images (The Morgan Kaufmann Series in Multimedia and Information Systems) , by Ian H. Witten , Alistair Moffat , Timothy C. Bell (Hardcover, 15 May, 1999)
  617. Managing Security with Snort and IDS Tools , by Christopher Gerg , Kerry J. Cox (Paperback, August, 2004)
  618. Mapping Hacks : Tips & Tools for Electronic Cartography (Hacks) , by Schuyler Erle , Rich Gibson , Jo Walsh (Paperback, 09 June, 2005)
  619. Mapping Security : The Corporate Security Sourcebook for Today's Global Economy , by Tom Patterson , Scott Gleeson Blue (Paperback, 14 December, 2004)
  620. Mastering Autodesk Architectural Desktop 2007 , by Paul F. Aubin (Paperback, 15 September, 2006)
  621. Mastering Data Warehouse Design : Relational and Dimensional Techniques , by Claudia Imhoff , Nicholas Galemmo , Jonathan G. Geiger (Paperback, 08 August, 2003)
  622. Mastering Network Security , by Chris Brenton , Cameron Hunt (Paperback, 07 October, 2002)
  623. Mastering the AS/400 : A Practical Hands-On Guide, Third Edition , by Jerry Fottral (Paperback, June, 2000)
  624. Mastering Web Services Security , by Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto , Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto (Paperback, 06 January, 2003)
  625. MATLAB 6.1 Supplement to accompany Control Systems Engineering , by Norman S. Nise (Paperback, 19 April, 2002)
  626. Maximum Apache Security , by Anonymous (Paperback, 15 June, 2002)
  627. Maximum Lego NXT : Building Robots with Java Brains , by Brian Bagnall (Paperback, 01 January, 2007)
  628. Maximum Mac OS X Security , by John Ray , William C. Ray (Paperback, 13 May, 2003)
  629. Maximum PC Guide to Extreme PC Mods (Maximum PC Guide To...) , by Paul Capello , Jon Phillips (Paperback, 21 December, 2004)
  630. MCAD/MCSD Self-Paced Training Kit : Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET (Pro-Certification) , by Anthony Northrup (Hardcover, 08 September, 2004)
  631. MCSA/MCSE : Windows 2000 Network Security Administration Study Guide (70-214) , by Bill English , Russ Kaufman , Russ Kaufmann (Hardcover, 05 May, 2003)
  632. MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) , by Bill Ferguson , Don Poulton , Diane Barrett (Paperback, 19 May, 2004)
  633. MCSA/MCSE Implementing and Administering Security in a Windows 2000 Network Exam Cram 2 (Exam Cram 70-214) , by Roberta Bragg (Paperback, 19 May, 2003)
  634. MCSA/MCSE Self-Paced Training Kit (Exam 70-299) : Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Pro-Certification) - Tony Northrup (2004-04-21, Hardcover)
  635. MCSA/MCSE Self-Paced Training Kit (Exam 70-350) : Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification) , by Stan Reimer , Orin Thomas (Hardcover, 13 April, 2005)
  636. MCSA/MCSE Self-Paced Training Kit : Implementing and Managing Security in a Microsoft Windows 2000 Network Infrastructure, Exam 70-214 , by Microsoft Corporation , Matthew Strebe , Microsoft Corporation (Hardcover, 12 February, 2003)
  637. MCSE : ISA Server 2000 Administration Study Guide : Exam 70 227 with CDROM , by William Heldman (Hardcover, 15 November, 2001)
  638. MCSE : Windows Server 2003 Network Security Design Study Guide (70-298) , by Brian Reisman , Mitch Ruebush , Sybex (Paperback, 19 May, 2004)
  639. MCSE Designing Security for a Microsoft Windows Server 2003 Network Exam Cram 2 (Exam Cram 70-298) , by Ed Tittel , Bill Ferguson (Paperback, 12 November, 2003)
  640. MCSE Designing Security for a Windows Server 2003 Network : Exam 70-298 , by Elias Khasner , Laura E. Hunter (Hardcover, 01 February, 2004)
  641. MCSE Self-Paced Training Kit (Exam 70-298) : Designing Security for a Microsoft Windows Server 2003 Network (Training Kit) - Roberta Bragg (2004-02-04, Hardcover)
  642. MCSE Training Guide (70-220) : Windows 2000 Network Security Design, Second Edition , by Roberta Bragg (Paperback, 14 October, 2002)
  643. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network : Study Guide and DVD Training System (Exam 70-214) , by Will Schmied , Thomas W. Shinder (Hardcover, February, 2003)
  644. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide and DVD Training System (Exam 70-214) , by Tony Piltzecker (Digital, 24 January, 2003)
  645. MCTS Self-Paced Training Kit (Exam 70-536) : Microsoft .NET Framework 2.0 Application Development Foundation - Tony Northrup (2006-06-05, Hardcover)
  646. MDA Explained : The Model Driven Architecture--Practice and Promise , by Anneke Kleppe , Jos Warmer , Wim Bast (Paperback, 25 April, 2003)
  647. MicroC OS II : The Real Time Kernel (With CD-ROM) , by Jean J. Labrosse (Hardcover, 15 June, 2002)
  648. Microsoft Access 2003 Forms, Reports, and Queries (Business Solutions) - Paul McFedries (2004-08-18, Paperback)
  649. Microsoft ADO.NET (Core Reference) , by David Sceppa (Hardcover, 15 May, 2002)
  650. Microsoft Encyclopedia of Security , by Mitch Tulloch (Paperback, 16 July, 2003)
  651. Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant (Pro-Administrator's Pocket Consultant) , by Bud Ratliff , Jason Ballard (Paperback, 11 January, 2006)
  652. Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed , by Michael Noel (Paperback, 24 August, 2005)
  653. Microsoft ISA Configuration and Administration , by Curt Simmons (Paperback, 01 May, 2001)
  654. Microsoft ISA Server 2000 , by Zubair Alexander (Paperback, 05 December, 2001)
  655. Microsoft ISA Server 2006 Unleashed - Michael Noel (2007-12-05, Paperback)
  656. Microsoft Log Parser Toolkit , by Gabriele Giuseppini , Mark Burnett , Jeremy Faircloth , Dave Kleiman (Paperback, 10 February, 2005)
  657. Microsoft Windows Security Resource Kit, Second Edition (Resource Kit) , by Ben Smith , Brian Komar , The Microsoft Security Team (Paperback, 27 April, 2005)
  658. Microsoft Windows Server 2003 PKI and Certificate Security (Pro - One-Offs) , by Brian Komar , Microsoft Corporation (Paperback, 07 July, 2004)
  659. Microsoft Windows XP Networking and Security Inside Out : Also Covers Windows 2000 (Inside Out) , by Ed Bott , Carl Siechert (Paperback, 28 September, 2005)
  660. Mike Meyers' CISSP(R) Certification Passport - Shon Harris (2002-10-17, Paperback)
  661. Mike Meyers' Security+ Certification Passport (Passport) , by Trevor Kay (Paperback, 06 January, 2003)
  662. Mind Children : The Future of Robot and Human Intelligence , by Hans Moravec (Paperback, 01 March, 1990)
  663. Mind Hacks : Tips & Tricks for Using Your Brain (Hacks) - Tom Stafford (2004-11-22, Paperback)
  664. Mining the Web : Discovering Knowledge from Hypertext Data , by Soumen Chakrabarti (Hardcover, 15 August, 2002)
  665. MIPS Assembly Language Programming , by Robert Britton (Paperback, ..)
  666. MIPS RISC Architecture (2nd Edition) , by Gerry Kane , Joe Heinrich (Paperback, 01 September, 1991)
  667. Mission-Critical Microsoft Exchange 2003 : Designing and Building Reliable Exchange Servers (Digital Press Storage Technologies) , by Jerry Cochran (Paperback, 26 November, 2003)
  668. Mission-Critical Security Planner : When Hackers Won't Take No for an Answer , by Eric Greenberg , Eric Greenberg (Paperback, January, 2003)
  669. Model Driven Architecture : Applying MDA to Enterprise Computing , by David S. Frankel (Paperback, 17 January, 2003)
  670. Modern Control Systems (10th Edition) - Richard C. Dorf (2004-04-08, Hardcover)
  671. Modern Cryptography : Theory and Practice , by Wenbo Mao (Hardcover, 25 July, 2003)
  672. Modern Database Management (8th Edition) , by Jeffrey A. Hoffer , Mary Prescott , Fred McFadden (Hardcover, 10 March, 2006)
  673. Modern Digital Control Systems (Electrical and Computer Engineering) , by Raymond G. Jacquot (Hardcover, 13 September, 1994)
  674. Modular Low-Power, High-Speed CMOS Analog-To-Digital Converter for Embedded Systems (Kluwer International Series in Engineering and Computer Science,) , by Lenn W. Schramm , Keh-La Lin , Bedrich J. Hosticka (Hardcover, 01 April, 2003)
  675. Motion Design : Moving Graphics for Television, Music, Video, Cinema and Digital Interfaces , by Matt Woolman (Hardcover, 01 December, 2004)
  676. MPI : The Complete Reference (Vol. 2), Vol. 2 - The MPI-2 Extensions , by William Gropp , Steven Huss-Lederman , Andrew Lumsdaine , Ewing Lusk , Bill Nitzberg , William Saphir , Marc Snir (Paperback, 19 September, 1998)
  677. MPLS and VPN Architectures, Vol. 1 , by Ivan Pepelnjak , Jim Guichard (Hardcover, October, 2000)
  678. MPLS and VPN Architectures, Vol. 2 , by Ivan Pepelnjak , Jim Guichard , Jeff Apcar (Hardcover, 06 June, 2003)
  679. MPLS VPN Security , by Michael H. Behringer , Monique J. Morrow (Paperback, 08 June, 2005)
  680. Multiple Streams of Internet Income , by Robert G. Allen (Hardcover, 15 March, 2001)
  681. Multiple View Geometry in Computer Vision - Richard Hartley (2004-04-19, Paperback)
  682. Murach's CICS for the COBOL Programmer , by Raul Menendez , Doug Lowe (Paperback, 15 January, 2001)
  683. Murach's Mainframe COBOL , by Mike Murach , Anne Prince , Raul Menendez (Paperback, 31 August, 2004)
  684. Nagios : System and Network Monitoring , by Wolfgang Barth (Paperback, 30 May, 2006)
  685. Nessus Network Auditing (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) , by Renaud Deraison , Noam Rathaus , HD Moore , Raven Alder , George Theall , Andy Johnston , Jimmy Alderson (Paperback, 01 September, 2004)
  686. Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security) , by Neil Archibald , Gilbert Ramirez , Noam Rathaus , Josh Burke , Brian Caswell , Renaud Deraison (Paperback, 01 August, 2005)
  687. Network Intrusion Detection (3rd Edition) - Stephen Northcutt (2002-08-27, Paperback)
  688. Network Security : A Beginner's Guide, Second Edition (Beginner's Guide) , by Eric Maiwald (Paperback, 28 May, 2003)
  689. Network Security : A Hacker's Perspective , by Ankit Fadia (Paperback, 18 December, 2002)
  690. Network Security : Private Communication in a Public World, Second Edition - Charlie Kaufman (2002-04-15, Hardcover)
  691. Network Security : The Complete Reference - Mark Rhodes-Ousley (2003-11-17, Paperback)
  692. Network Security Architectures , by Sean Convery (Hardcover, 19 April, 2004)
  693. Network Security Assessment , by Chris McNab (Paperback, 01 March, 2004)
  694. Network Security Bible , by Eric Cole , Ronald L. Krutz , James Conley (Paperback, ..)
  695. Network Security Essentials : Applications and Standards (3rd Edition) - William Stallings (2006-07-19, Paperback)
  696. Network Security Evaluation Using the NSA IEM , by Russ Rogers , Ed Fuller , Greg Miles , Matthew Hoagberg , Travis Schack , Ted Dykstra , Bryan Cunningham , Chuck Little (Paperback, 09 August, 2005)
  697. Network Security First-Step (First-Step) , by Thomas M. Thomas (Paperback, 21 May, 2004)
  698. Network Security for Dummies , by Chey Cobb (Paperback, 10 October, 2002)
  699. Network Security Fundamentals , by Gert DeLaet , Gert Schauwers (Paperback, 08 September, 2004)
  700. Network Security Hacks , by Andrew Lockhart (Paperback, 01 April, 2004)
  701. Network Security Hacks : Tips & Tools for Protecting Your Privacy (Hacks) , by Andrew Lockhart (Paperback, 30 October, 2006)
  702. Network Security JumpStart , by Matthew Strebe (Paperback, 15 August, 2002)
  703. Network Security Principles and Practices (CCIE Professional Development) , by Saadat Malik (Hardcover, 15 November, 2002)
  704. Network Security Tools : Writing, Hacking, and Modifying Security Tools , by Nitesh Dhanjani , Justin Clarke (Paperback, 04 April, 2005)
  705. Network Security with OpenSSL , by John Viega , Matt Messier , Pravir Chandra (Paperback, 15 June, 2002)
  706. Network Service Investment Guide : Maximizing ROI in Uncertain Times (Networking Council) , by Mark Gaynor , Mark Gaynor (Paperback, 03 January, 2003)
  707. Network Warrior - Gary Donahue (2007-06-21, Paperback)
  708. Networks, Security And Complexity : The Role of Public Policy in Critical Infrastructure Protection , by Sean P. Gorman (Hardcover, 05 September, 2005)
  709. Neural Networks for Modelling and Control of Dynamic Systems : A Practitioner's Handbook (Advanced Textbooks in Control and Signal Processing) , by Magnus Nrgaard , O. Ravn , N. K. Poulsen , L. K. Hansen , M. Nrgaard (Paperback, 01 March, 2000)
  710. Neural Networks in Finance : Gaining Predictive Edge in the Market (Academic Press Advanced Finance Series) , by Paul D. McNelis (Hardcover, 22 December, 2004)
  711. NHibernate in Action , by Pierre Kuate , Christian Bauer , Gavin King (Paperback, 01 July, 2007)
  712. Nokia Network Security Solutions Handbook , by Doug Maxwell (Paperback, October, 2002)
  713. Non-Repudiation in Electronic Commerce , by Jianying Zhou (Hardcover, 15 August, 2001)
  714. Norton Internet Security For Dummies , by Greg Holden (Paperback, 08 October, 2004)
  715. Novell's BorderManager Administrator's Handbook , by Laura Y. Pan (Paperback, September, 1999)
  716. Novell's Guide to Storage Area Networks and Cluster Services , by Stephen C. Payne , Robert Wipfel (Paperback, 15 January, 2002)
  717. Numerical Recipes in Fortran 90, Vol. 2 , by William H. Press , Saul A. Teukolsky , William T. Vetterling , Brian P. Flannery , Michael Metcalf (Hardcover, 15 January, 1996)
  718. Object Design : Roles, Responsibilities, and Collaborations , by Rebecca Wirfs-Brock , Alan McKean (Paperback, 08 November, 2002)
  719. Observers in Control Systems : A Practical Guide , by George Ellis (Hardcover, October, 2002)
  720. Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series) - (2006-11-14, Hardcover)
  721. Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press) , by Diana-Lynn Contesti , Douglas Andre , Eric Waxvik , Paul A. Henry , Bonnie A. Goins (Hardcover, 27 April, 2007)
  722. Online Investing Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Bonnie Biafore (Paperback, 17 June, 2004)
  723. Online Marketing Success Stories : Insider Secrets, from the Experts Who Are Making Millions on the Internet Today - Rene V. Richards (2006-09-12, Paperback)
  724. Open Networks, Closed Regimes : The Impact of the Internet on Authoritarian Rule , by Shanthi Kalathil , Taylor C. Boas (Paperback, 01 January, 2003)
  725. Open Source Security Tools : Practical Guide to Security Applications, A (Bruce Perens Open Source) , by Tony Howlett (Paperback, 29 July, 2004)
  726. OpenGL(R) Programming Guide : The Official Guide to Learning OpenGL(R), Version 2 (5th Edition) (OpenGL) - OpenGL Architecture Review Board (2005-08-01, Paperback)
  727. OpenVPN : Building and Integrating Virtual Private Networks , by M Feilner (Paperback, 14 February, 2006)
  728. Operating .NET Framework-based Applications (Patterns & Practices) , by Microsoft Corporation (Paperback, 09 July, 2003)
  729. Optimizing Compilers for Modern Architectures : A Dependence-based Approach , by Randy Allen , Ken Kennedy (Hardcover, 22 October, 2001)
  730. Origins of the Crash : The Great Bubble and Its Undoing , by Roger Lowenstein (Paperback, 28 December, 2004)
  731. Oversampling Delta-Sigma Data Converters : Theory, Design, and Simulation , by James C. Candy , Gabor C. Temes (Hardcover, 19 August, 1991)
  732. Parallel and Distributed Programming Using C++ , by Cameron Hughes , Tracey Hughes , Tracy Hughes (Hardcover, 29 August, 2003)
  733. Parallel and Distributed Simulation Systems (Wiley Series on Parallel and Distributed Computing) , by Richard M. Fujimoto (Hardcover, 17 December, 1999)
  734. Parallel Computer Architecture : A Hardware/Software Approach , by David Culler , J.P. Singh , Anoop Gupta (Hardcover, 01 August, 1998)
  735. Parallel Programming : Techniques and Applications Using Networked Workstations and Parallel Computers (2nd Edition) , by Barry Wilkinson , Michael Allen (Paperback, 04 March, 2004)
  736. Parallel Programming in OpenMP , by Rohit Chandra , Ramesh Menon , Leo Dagum , David Kohr , Dror Maydan , Jeff McDonald (Paperback, October, 2000)
  737. Parallel Programming With MPI - Peter Pacheco (1996-10-01, Paperback)
  738. Parallel Scientific Computing in C++ and MPI : A Seamless Approach to Parallel Algorithms and their Implementation , by George Em Karniadakis , Robert M. Kirby II (Paperback, 16 June, 2003)
  739. Pattern-Oriented Software Architecture Volume 1 : A System of Patterns - Frank Buschmann (1996-08-08, Hardcover)
  740. Pattern-Oriented Software Architecture Volume 2 : Patterns for Concurrent and Networked Objects , by Douglas Schmidt , Michael Stal , Hans Rohnert , Frank Buschmann (Hardcover, 14 September, 2000)
  741. Pattern-Oriented Software Architecture Volume 3 : Patterns for Resource Management , by Michael Kircher , Prashant Jain (Hardcover, 25 June, 2004)
  742. Patterns of Enterprise Application Architecture - Martin Fowler (2002-11-05, Hardcover)
  743. Payment Technologies for E-Commerce , by Weidong Kou (Hardcover, 15 February, 2003)
  744. PC Hardware in a Nutshell, 3rd Edition , by Robert Bruce Thompson , Barbara Fritchman Thompson (Paperback, 30 July, 2003)
  745. PC Hardware Interfaces : A Developer's Reference , by Michael Gook (Paperback, 01 January, 2004)
  746. PC Magazine Fighting Spyware, Viruses, and Malware , by Ed Tittel (Paperback, 31 December, 2004)
  747. PC Magazine Windows XP Security Solutions (PC Magazine) , by Dan DiNicolo (Paperback, 05 December, 2005)
  748. PCI-X System Architecture (With CD-ROM) , by MindShare Inc. , Tom Shanley (Paperback, 15 January, 2001)
  749. PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance - (2007-06-01, Paperback)
  750. PCI Express System Architecture - Don Anderson (2003-09-04, Paperback)
  751. PCI System Architecture (4th Edition) , by MindShare Inc. , Tom Shanley , Don Anderson (Paperback, 10 June, 1999)
  752. PCMCIA System Architecture : 16-Bit PC Cards (2nd Edition) , by Inc. MindShare , Don Anderson (Paperback, 25 September, 1995)
  753. Peer-to-Peer : Harnessing the Power of Disruptive Technologies , by Andy Oram (Hardcover, 15 March, 2001)
  754. Penetration Tester's Open Source Toolkit , by Charl Van Der Walt , HD Moore , Roelof Temmingh , Haroon Meer , Johnny Long , Chris Hurley , James Foster (Paperback, 01 June, 2005)
  755. Penetration Testing and Network Defense (Networking Technology) , by Andrew Whitaker , Daniel Newman (Paperback, 31 October, 2005)
  756. Pentium Processor System Architecture (2nd Edition) , by MindShare Inc. , Don Anderson , Tom Shanley (Paperback, 06 April, 1995)
  757. People Who Care About You : The Support Assets (The Adding Assets Series for Kids) , by Pamela Espeland , Elizabeth Verdick (Paperback, 30 October, 2004)
  758. PGP & GPG : Email for the Practical Paranoid , by Michael W Lucas (Paperback, 01 April, 2006)
  759. Phishing : Cutting the Identity Theft Line , by Rachael Lininger , Russell Dean Vines (Paperback, 22 April, 2005)
  760. Photoshop Photo Effects Cookbook : 61 Easy-to-Follow Recipes for Digital Photographers, Designers, and Artists - Tim Shelbourne (2005-11-07, Paperback)
  761. php|architect's Guide to PHP Security| , by Ilia Alshanetsky , Rasmus Lerdorf (Paperback, 05 September, 2005)
  762. Physical Database Design : the database professional's guide to exploiting indexes, views, storage, and more (The Morgan Kaufmann Series in Data Management ... Kaufmann Series in Data Management Systems) , by Sam S. Lightstone , Toby J. Teorey , Tom Nadeau (Paperback, 21 March, 2007)
  763. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues , by Kapil Raina (Paperback, 11 April, 2003)
  764. Planning for PKI : Best Practices Guide for Deploying Public Key Infrastructure , by Russ Housley , Tim Polk , Russ Housley , Tim Polk (Paperback, 13 March, 2001)
  765. Planning for Survivable Networks , by Annlee A. Hines (Paperback, 26 July, 2002)
  766. Pocket Guide to Digital Prepress (Pocket Guide) , by Frank Romano (Paperback, 29 June, 1995)
  767. Pocket PC (Visual QuickStart Guide) , by C. P. Collins , Tracy Brown (Paperback, 06 February, 2004)
  768. Podcasting Hacks , by Jack Herrington (Paperback, 19 August, 2005)
  769. Policy-Based Network Management : Solutions for the Next Generation (Morgan Kaufmann Series in Networking) , by John Strassner (Hardcover, 25 August, 2003)
  770. Practical Cryptography , by Niels Ferguson , Bruce Schneier (Paperback, 28 March, 2003)
  771. Practical IDL Programming , by Liam E. Gumley (Paperback, 07 August, 2001)
  772. Practical Intrusion Detection Handbook , by Paul E. Proctor (Paperback, August, 2000)
  773. Practical Low Power Digital Vlsi Design , by Gary Yeap (Hardcover, 01 November, 1997)
  774. Practical Packet Analysis : Using Wireshark to Solve Real-World Network Problems - Chris Sanders (2007-05-23, Paperback)
  775. Practical VoIP Security , by Thomas Porter , Jan Kanclirz Jr. (Paperback, 30 March, 2006)
  776. Preventing Web Attacks with Apache , by Ryan C. Barnett (Paperback, 27 January, 2006)
  777. Principles and Practice of Information Security , by Linda Volonino , Stephen R. Robinson (Paperback, 02 September, 2003)
  778. Principles of Computer Architecture , by Miles Murdocca , Vincent P. Heuring (Hardcover, 29 November, 1999)
  779. Principles of Computer Hardware (With CD-ROM) , by Alan Clements (Hardcover, 15 July, 2000)
  780. Principles of Data Conversion System Design , by Behzad Razavi (Hardcover, 28 November, 1994)
  781. Principles of Digital Design , by Daniel D. Gajski (Hardcover, ..)
  782. Pro Apache, Third Edition (Expert's Voice) - Peter Wainwright (2004-01-19, Paperback)
  783. Pro PHP Security , by Chris Snyder , Michael Southwell (Paperback, 29 August, 2005)
  784. Pro SQL Server 2005 - Thomas Rizzo (2005-10-24, Paperback)
  785. Pro SQL Server 2005 Reporting Services , by Rodney Landrum , Walter J. Voytek II (Paperback, 26 October, 2005)
  786. Pro WCF : Practical Microsoft SOA Implementation (Pro) - Chris Peiris (2007-01-11, Paperback)
  787. Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides) , by Stefan Schackow (Paperback, 31 January, 2006)
  788. Professional Electronic Trading , by David James Norman , David James Norman (Hardcover, 15 June, 2002)
  789. Professional Pen Testing for Web Applications (Programmer to Programmer) , by Andres Andreu (Paperback, 05 July, 2006)
  790. Programmable Logic Controllers, Fourth Edition , by W. Bolton (Paperback, 30 August, 2006)
  791. Programming .NET Components, 2nd Edition - Juval Lowy (2005-07-27, Paperback)
  792. Programming .NET Security , by Adam Freeman , Allen Jones (Paperback, June, 2003)
  793. Programming .NET Web Services , by Alex Ferrara , Matthew MacDonald (Paperback, 15 October, 2002)
  794. Programming Embedded Systems : With C and GNU Development Tools, 2nd Edition - Michael Barr (2006-10-01, Paperback)
  795. Programming Erlang : Software for a Concurrent World - Joe Armstrong (2007-07-11, Paperback)
  796. Programming in RPG IV, Second Edition , by Bryan Meyers , Judy Yaeger (Paperback, 15 July, 2000)
  797. Programming Language Pragmatics, Second Edition - Michael L. Scott (2005-11-07, Paperback)
  798. Protect Your Windows Network : From Perimeter to Data (Microsoft Technology) , by Jesper M. Johansson , Steve Riley (Paperback, ..)
  799. Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation , by Miriam B. Kahn , Miriam Kahn (Paperback, 01 February, 2004)
  800. Protocols for Authentication and Key Establishment , by Colin Boyd , Anish Mathuria (Hardcover, 15 June, 2003)
  801. Protocols for Secure Electronic Commerce, Second Edition , by Mostafa Hashem Sherif (Hardcover, 01 November, 2003)
  802. Pthreads Programming : A POSIX Standard for Better Multiprocessing (O'Reilly Nutshell) , by Bradford Nichols , Dick Buttlar , Jacqueline Proulx Farrell (Paperback, 01 September, 1996)
  803. Pure Corba , by Fintan Bolton (Paperback, 16 July, 2001)
  804. PVM : Parallel Virtual Machine : A Users' Guide and Tutorial for Network Parallel Computing (Scientific and Engineering Computation) , by Al Geist , Adam Beguelin , Jack Dongarra , Weicheng Jiang , Robert Manchek , Vaidyalingam S. Sunderam (Paper
  805. Quantum Computation and Quantum Information , by Michael A. Nielsen , Isaac L. Chuang (Paperback, September, 2000)
  806. Radius , by Jonathan Hassell (Paperback, 08 October, 2002)
  807. Rails Cookbook (Cookbooks (O'Reilly)) , by Rob Orsini (Paperback, 01 January, 2007)
  808. Rails for Java Developers , by Stuart Halloway , Justin Gehtland (Paperback, 13 February, 2007)
  809. Randomized Algorithms (Cambridge International Series on Parallel Computation) , by Rajeev Motwani , Prabhakar Raghavan (Hardcover, 25 August, 1995)
  810. Readings in Database Systems, 4th Edition , by Joseph M. Hellerstein , Michael Stonebraker (Paperback, 07 January, 2005)
  811. Real 802.11 Security : Wi-Fi Protected Access and 802.11i , by Jon Edney , William A. Arbaugh (Paperback, 15 July, 2003)
  812. Real Digital Forensics : Computer Security and Incident Response - Keith J. Jones (2005-09-23, Paperback)
  813. Real World Microsoft Access Database Protection and Security , by Garry Robinson (Paperback, 17 October, 2003)
  814. Reasoning about Rational Agents (Intelligent Robotics and Autonomous Agents) , by Michael Wooldridge (Hardcover, 14 July, 2000)
  815. Relational Database Design Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems) , by Jan L. Harrington (Paperback, ..)
  816. Repairing and Upgrading Your PC , by Robert Thompson , Barbara Fritchman Thompson (Paperback, 02 March, 2006)
  817. Requirements Analysis : From Business Views to Architecture , by David C. Hay (Hardcover, 23 August, 2002)
  818. Research and Documentation in the Electronic Age - Diana Hacker (2005-12-28, Spiral-bound)
  819. Researching Online for Dummies (with CD-ROM) , by Reva Basch , Mary Ellen Bates (Paperback, 15 February, 2000)
  820. Reshaping National Intelligence for an Age of Information (RAND Studies in Policy Analysis) , by Gregory F. Treverton , Jr., Charles Wolf (Paperback, 03 March, 2003)
  821. Residential Design Using Autodesk Revit Building 9 , by Daniel John Stine (Paperback, 30 May, 2006)
  822. Resilient Storage Networks : Designing Flexible Scalable Data Infrastructures (Digital Press Storage Technology (Paperback)) , by Greg Schulz (Paperback, 07 April, 2004)
  823. RESTful Web Services - Leonard Richardson (2007-05-08, Paperback)
  824. Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy , by Stefan A. Brands (Hardcover, 28 August, 2000)
  825. Risk Management for Computer Security, First Edition : Protecting Your Network & Information Assets , by Andy Jones , Debi Ashenden (Paperback, 15 March, 2005)
  826. Robo sapiens : Evolution of a New Species , by Peter Menzel , Faith D'Aluisio (Hardcover, 01 September, 2000)
  827. Robot Builder's Sourcebook : Over 2,500 Sources for Robot Parts , by Gordon McComb (Paperback, 15 August, 2002)
  828. Robot Building for Beginners - David Cook (2002-01-18, Paperback)
  829. Robot Programming : A Practical Guide to Behavior-Based Robotics - Joe Jones (2003-12-12, Paperback)
  830. Robot Vision (MIT Electrical Engineering and Computer Science) , by Berthold K. P. Horn (Hardcover, 13 March, 1986)
  831. Robotic Explorations : An Introduction to Engineering Through Design , by Fred G. Martin (Hardcover, 07 December, 2000)
  832. Robots and Manufacturing Automation, 2nd Edition , by C. Ray Asfahl (Hardcover, 03 January, 1992)
  833. Robots for Kids : Exploring New Technologies for Learning , by Allison Druin , James Hendler (Paperback, April, 2000)
  834. Rootkits : Subverting the Windows Kernel (Addison-Wesley Software Security Series) - Greg Hoglund (2005-07-22, Paperback)
  835. Rpg IV by Example , by George Farr , Shailan Towpiwala (Paperback, April, 1996)
  836. RT Essentials , by Jesse Vincent , Robert Spier , Dave Rolsky , Darren Chamberlain , Richard Foley (Paperback, 18 August, 2005)
  837. Run Your Own Web Server Using Linux & Apache , by Stuart Langridge , Tony Steidler-Dennison (Paperback, 01 December, 2005)
  838. Running Linux - Matthias Dalheimer (2005-12-22, Paperback)
  839. Safety Net : Protecting Your Business on the Internet , by Kathleen Sindell (Hardcover, 15 March, 2002)
  840. Sams Teach Yourself OpenOffice.org 2, Firefox and Thunderbird for Windows All in One (Sams Teach Yourself) , by Greg Perry (Paperback, 07 July, 2005)
  841. SANS GIAC Certification : Security Essentials Toolkit (GSEC) , by Eric Cole , Mathew Newfield , John M. Millican , Stephen Northcutt , Matthew Newfield (Paperback, 18 March, 2002)
  842. SAP Security : SAP Security Essentials , by Jim Stewart (Paperback, 30 December, 2005)
  843. Sarbanes-Oxley Guide for Finance and Information Technology Professionals , by Sanjay Anand (Hardcover, 24 March, 2006)
  844. Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools , by Christian Lahti , Roderick Peterson , Steve Lanza (Paperback, 01 August, 2005)
  845. Scalable Internet Architectures (Developer's Library) , by Theo Schlossnagle (Paperback, 21 July, 2006)
  846. Scene of the Cybercrime : Computer Forensics Handbo , by Debra Littlejohn Shinder , Ed Tittel (Paperback, 10 August, 2002)
  847. Schaum's Outline of Computer Architecture , by Nick Carter (Paperback, 26 December, 2001)
  848. Scheduling and Load Balancing in Parallel and Distributed Systems , by Behrooz A. Shirazi , Ali R. Hurson , Krishna M. Kavi (Paperback, 30 April, 1995)
  849. Scripting VMware : Power Tools for Automating Virtual Infrastructure Administration , by Al Muller (Paperback, 31 October, 2006)
  850. Search Engine Advertising : Buying Your Way to the Top to Increase Sales (VOICES) , by Catherine Seda (Paperback, 24 February, 2004)
  851. Search Engine Optimization : An Hour a Day - Jennifer Grappone (2006-06-13, Paperback)
  852. Search Engine Optimization For Dummies, Second Edition (For Dummies (Computer/Tech)) , by Peter Kent (Paperback, 08 May, 2006)
  853. Search Engine Visibility (2nd Edition) (Voices That Matter) - Shari Thurow (2007-08-29, Paperback)
  854. Search Engine Visibility , by Shari Thurow (Paperback, 30 December, 2002)
  855. Searching & Researching on the Internet & World Wide Web, 4th Edition , by Karen Hartman , Ernest Ackermann (Paperback, July, 2004)
  856. Secrets and Lies : Digital Security in a Networked World - Bruce Schneier (2004-01-30, Paperback)
  857. Secrets of Computer Espionage : Tactics and Countermeasures , by Joel McNamara (Paperback, 02 June, 2003)
  858. Secrets of SOA : An Enterprise View on Service-Oriented Architecture Deployment Revealed , by Larstan Editors (Paperback, 18 October, 2006)
  859. Secure Architectures with OpenBSD , by Brandon Palmer , Jose Nazario (Paperback, ..)
  860. Secure Electronic Commerce : Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) , by Warwick Ford , Michael S. Baum (Paperback, 04 December, 2000)
  861. Securing E-Business Systems : A Guide for Managers and Executives , by Timothy Braithwaite (Hardcover, 12 April, 2002)
  862. Securing IM and P2P Applications for the Enterprise , by Paul Piccard , Brian Baskin , George Spillman , Marcus Sachs (Paperback, 30 November, 2005)
  863. Securing Storage : A Practical Guide to SAN and NAS Security , by Himanshu Dwivedi (Hardcover, 11 November, 2005)
  864. Securing Systems with the Solaris Toolkit , by Alex Noordergraaf , Glenn Brunette , Brunette Glenn (Paperback, 27 June, 2003)
  865. Securing the Network from Malicious Code : A Complete Guide to Defending Against Viruses, Worms, and Trojans , by Douglas Schweitzer (Paperback, 19 September, 2002)
  866. Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption , by Jothy Rosenberg , David Remy (Paperback, 12 May, 2004)
  867. Securing Windows NT/2000 Servers for the Internet , by Stefan Norberg (Paperback, November, 2000)
  868. Securing Windows Server 2003 , by Mike Danseglio (Paperback, 01 November, 2004)
  869. Securing Your Business with Cisco ASA and PIX Firewalls (Networking Technology) , by Greg Abelar (Paperback, 27 May, 2005)
  870. Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills , by Michael Gregg , David Miller (Paperback, 05 February, 2007)
  871. Security Assessment : Case Studies for Implementing the NSA IAM , by Russ Rogers , Greg Miles , Ed Fuller , Ted Dykstra (Paperback, 01 January, 2004)
  872. Security Awareness : Applying Practical Security in Your World - Mark Ciampa (2006-02-07, Paperback)
  873. Security Complete , by Sybex Inc. , Sybex Inc (Paperback, 12 September, 2002)
  874. Security Controls for Sarbanes-Oxley Section 404 IT Compliance : Authorization, Authentication, and Access , by Dennis C. Brewer (Paperback, 21 October, 2005)
  875. Security Engineering : A Guide to Building Dependable Distributed Systems - Ross J. Anderson (2001-01-22, Paperback)
  876. Security in Computing (4th Edition) - Charles P. Pfleeger (2006-10-13, Hardcover)
  877. Security in Computing, Third Edition , by Charles P. Pfleeger , Shari Lawrence Pfleeger (Hardcover, 02 December, 2002)
  878. Security Metrics : Replacing Fear, Uncertainty, and Doubt - Andrew Jaquith (2007-03-26, Paperback)
  879. Security Policies and Procedures : Principles and Practices (Security) , by Sari Greene (Paperback, 18 July, 2005)
  880. Security Power Tools - Bryan Burns (2007-08-27, Paperback)
  881. Security Sage's Guide to Hardening the Network Infrastructure , by Erik Pace Birkholz , Brian Kenyon , Steven Andres (Paperback, 01 March, 2004)
  882. Security Threat Mitigation and Response : Understanding Cisco Security MARS (Networking Technology) , by Dale Tesch , Greg Abelar (Paperback, 28 September, 2006)
  883. Security Warrior - Cyrus Peikari (2004-02-01, Paperback)
  884. Security, Id Systems and Locks : The Book on Electronic Access Control , by Joel Konicek , Karen Little (Paperback, 01 May, 1997)
  885. Security+ Certification All-in-One Exam Guide , by Gregory White (Hardcover, 27 June, 2003)
  886. Security+ Certification for Dummies , by Lawrence H. Miller , Peter H. Gregory (Paperback, 17 February, 2003)
  887. Security+ Certification Training Kit , by Microsoft Corporation , Andy Ruth , Kurt Hudson , Microsoft Corporation (Hardcover, 29 January, 2003)
  888. Security+ Exam Cram 2 (Exam Cram SYO-101) , by Kirk Hausman , Diane Barrett , Martin Weiss , Ed Tittel (Paperback, 10 April, 2003)
  889. Security+ Fast Pass , by James Michael Stewart (Paperback, 19 October, 2004)
  890. Security+ Practice Questions Exam Cram 2 (Exam SYO-101) (Exam Cram 2) , by Hans B. Sparbel , Ed Tittel (Paperback, 09 March, 2004)
  891. See MIPS Run, Second Edition , by Dominic Sweetman (Paperback, 17 October, 2006)
  892. SELinux : NSA's Open Source Security Enhanced Linux , by Bill McCarty (Paperback, 11 October, 2004)
  893. SELinux by Example : Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) , by Frank Mayer , Karl MacMillan , David Caplan (Paperback, 27 July, 2006)
  894. sendmail Milters : A Guide for Fighting Spam , by Bryan Costales , Marcia Flynt (Paperback, 24 January, 2005)
  895. Service-Oriented Architecture (SOA) : A Planning and Implementation Guide for Business and Technology - Eric A. Marks (2006-04-28, Hardcover)
  896. Service-Oriented Architecture (SOA) : Concepts, Technology, and Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl) - Thomas Erl (2005-08-02, Hardcover)
  897. Service-Oriented Architecture (SOA) Compass : Business Value, Planning, and Enterprise Roadmap (The developerWorks Series) , by Norbert Bieberstein , Sanjay Bose , Marc Fiammante , Keith Jones , Rawn Shah (Hardcover, 25 October, 2005)
  898. Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services - Thomas Erl (2004-04-16, Paperback)
  899. Service Oriented Architecture For Dummies (For Dummies (Computer/Tech)) - Judith Hurwitz (2006-11-06, Paperback)
  900. Share Your Story : Blogging with MSN Spaces , by Katherine Murray , Michael Torres (Paperback, 15 March, 2006)
  901. Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks - Michal Zalewski (2005-04-15, Paperback)
  902. Skype Me! : From Single User to Small Enterprise and Beyond , by Bill Campbell , Michael Gough , Joshua Brashars , Dan Douglass (Paperback, 07 December, 2005)
  903. Slamming Spam : A Guide for System Administrators , by Robert Haskins , Dale Nielsen (Paperback, 20 December, 2004)
  904. Smart Client Architecture and Design Guide (Patterns & Practices) , by Microsoft Corporation (Paperback, 13 October, 2004)
  905. Smart Home Hacks : Tips & Tools for Automating Your House (Hacks) , by Gordon Meyer (Paperback, 25 October, 2004)
  906. Snort 2.0 Intrusion Detection , by Brian Caswell , Jay Beale , James C. Foster , Jeremy Faircloth (Paperback, February, 2003)
  907. Snort 2.1 Intrusion Detection, Second Edition , by Jay Beale , Caswell (Paperback, May, 2004)
  908. Snort Cookbook , by Angela D Orebaugh , Simon Biles , Jacob Babbin (Paperback, 01 April, 2005)
  909. Snort for Dummies , by Charlie Scott , Paul Wolfe , Bert Hayes (Paperback, 09 July, 2004)
  910. Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security) , by Brian Caswell , Jay Beale , Andrew Baker (Paperback, 01 February, 2007)
  911. SOA in Practice : The Art of Distributed System Design (Theory in Practice) - Nicolai M. Josuttis (2007-08-24, Paperback)
  912. SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl) - Thomas Erl (2007-07-18, Hardcover)
  913. SOA Using Java Web Services - Mark D. Hansen (2007-05-09, Paperback)
  914. Socially Intelligent Agents - Creating Relationships with Computers and Robots (MULTIAGENT SYSTEMS, ARTIFICIAL SOCIETIES, AND SIMULATED , by Kerstin Dautenhahn , Alan H. Bond , Lola Canamero , Bruce Edmonds (Hardcover, 01 May, 2002)
  915. Sockets, Shellcode, Porting, & Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals , by James C. Foster , Stuart McClure (Paperback, 12 April, 2005)
  916. Software Architecture in Practice (2nd Edition) (The SEI Series in Software Engineering) - Len Bass (2003-04-09, Hardcover)
  917. Software Design Methods for Concurrent and Real-Time Systems (Sei Series in Software Engineering) , by Hassan Gomaa (Hardcover, 31 July, 1993)
  918. Software Engineering Economics (Prentice-Hall Advances in Computing Science & Technology Series) , by Barry W. Boehm (Paperback, 22 October, 1981)
  919. Software Exorcism : A Handbook for Debugging and Optimizing Legacy Code , by Bill Blunden (Hardcover, September, 2003)
  920. Software Product Lines : Practices and Patterns , by Paul Clements , Linda Northrop , Linda M. Northrop (Hardcover, 20 August, 2001)
  921. Software Radio Architecture : Object-Oriented Approaches to Wireless Systems Engineering , by Joseph Mitola (Hardcover, 15 January, 2000)
  922. Software Security : Building Security In (Addison-Wesley Software Security Series) - Gary McGraw (2006-01-23, Paperback)
  923. Software Security Library Boxed Set, First Edition , by Gary McGraw , John Viega , Greg Hoglund (Paperback, 10 February, 2006)
  924. Software Systems Architecture : Working With Stakeholders Using Viewpoints and Perspectives - Nick Rozanski (2005-04-20, Hardcover)
  925. Spam Kings : The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements , by Brian S. McWilliams (Hardcover, September, 2004)
  926. Spam Wars : Our Last Best Chance to Defeat Spammers, Scammers & Hackers , by Danny Goodman (Paperback, November, 2004)
  927. SpamAssassin , by Alan Schwartz (Paperback, July, 2004)
  928. SpamAssassin : A Practical Guide to Integration and Configuration , by Alistair McDonald (Paperback, 30 September, 2004)
  929. Spatial Databases : With Application to GIS (The Morgan Kaufmann Series in Data Management Systems) , by Philippe Rigaux , Michel Scholl , Agnès Voisard (Hardcover, 18 May, 2001)
  930. Spidering Hacks , by Kevin Hemenway , Tara Calishain (Paperback, 01 November, 2003)
  931. Spyware , by Gregory D. Evans (Paperback, March, 2005)
  932. SQL : The Complete Reference, Second Edition , by James R Groff , Paul N. Weinberg (Paperback, 28 August, 2002)
  933. SQL/400 by Example , by James Coolbaugh (Paperback, 08 February, 1999)
  934. SQL/400 Developer's Guide , by Paul Conte , Mike Cravitz (Paperback, September, 2000)
  935. Squeak : Learn Programming with Robots (Technology in Action) , by Stephane Ducasse (Paperback, 20 June, 2005)
  936. SSH, The Secure Shell : The Definitive Guide , by Daniel J. Barrett , Richard E. Silverman , Robert G. Byrnes (Paperback, 10 May, 2005)
  937. SSL and TLS : Designing and Building Secure Systems , by Eric Rescorla (Paperback, 13 October, 2000)
  938. Starter Kit for the IBM iSeries and AS/400 , by Gary Guthrie , Wayne Madden (Paperback, 15 April, 2001)
  939. Steal This Computer Book 3 : What They Won't Tell You About the Internet , by Wallace Wang (Paperback, May, 2003)
  940. Steal This Computer Book 4.0 : What They Won't Tell You About the Internet , by Wallace Wang (Paperback, 15 April, 2006)
  941. Stealing the Network : How to Own a Continent , by FX , Paul Craig , Joe Grand , Tim Mullen , Fyodor , Ryan Russell , Jay Beale (Paperback, May, 2004)
  942. Stealing the Network : How to Own an Identity (Stealing the Network) , by Raven Alder , Chris Hurley , Tom Parker , Ryan Russell , Jay Beale , Riley Eller , Brian Hatch , Jeff Moss (Paperback, 01 August, 2005)
  943. Stealing the Network : How to Own the Box , by Ryan Russell , Ido Dubrawsky , FX , Joe Grand , Tim Mullen (Paperback, 01 April, 2003)
  944. Stiquito Controlled! : Making a Truly Autonomous Robot (Systems) , by James M. Conrad (Paperback, ..)
  945. Storage Area Networks for Dummies - Christopher Poelker (2003-02-17, Paperback)
  946. Storage Network Performance Analysis , by Huseyin Simitci (Paperback, 11 April, 2003)
  947. Storage Networking Fundamentals : An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems (Fundamentals) , by Marc Farley (Paperback, 09 December, 2004)
  948. Storage Networks Explained : Basics and Application of Fibre Channel SAN, NAS iSCSI and InfiniBand , by Ulf Troppens , Rainer Erkens , Wolfgang Muller (Hardcover, 15 September, 2004)
  949. Storage Security : Protecting, SANs, NAS and DAS , by John Chirillo , Scott Blaul (Paperback, 20 December, 2002)
  950. Storage Virtualization : Technologies for Simplifying Data Storage and Management , by Tom Clark (Paperback, 14 March, 2005)
  951. Strategic Information Security , by John Wylder (Hardcover, 01 November, 2003)
  952. Structure and Interpretation of Computer Programs - 2nd Edition (MIT Electrical Engineering and Computer Science) , by Harold Abelson , Gerald Jay Sussman (Hardcover, 25 July, 1996)
  953. Structured Computer Organization (5th Edition) - Andrew S. Tanenbaum (2005-06-15, Hardcover)
  954. Subversion Version Control : Using the Subversion Version Control System in Development Projects (Bruce Perens' Open Source Series) , by William Nagel (Paperback, 16 May, 2005)
  955. Succeeding with SOA : Realizing Business Value Through Total Architecture , by Paul C. Brown (Paperback, 24 April, 2007)
  956. Sun Certified Enterprise Architect for J2EE Study Guide (Exam 310-051) , by Paul Allen , Joseph Bambara (Paperback, 27 March, 2003)
  957. Sun Certified Enterprise Architect for Java EE Study Guide (Exam 310-051) (Certification Press) - Paul Allen (2007-07-12, Paperback)
  958. Sun Performance and Tuning : Java and the Internet (2nd Edition) , by Adrian Cockcroft , Richard Pettit , Sun Microsystems Press (Paperback, 07 April, 1998)
  959. Super Searchers Make It on Their Own : Top Independent Information Professionals Share Their Secrets for Starting and Running a Research Business (Super Searchers series) , by Suzanne Sabroski , Reva Basch (Paperback, 01 June, 2002)
  960. Super Searchers on Wall Street : Top Investment Professionals Share Their Online Research Secrets , by Amelia Kassel , Reva Basch (Paperback, 15 January, 2000)
  961. Surviving Security : How to Integrate People, Process, and Technology, Second Edition , by Amanda Andress (Hardcover, 18 December, 2003)
  962. Symbian OS Internals : Real-time Kernel Programming (Symbian Press) , by Jane Sales (Paperback, 18 November, 2005)
  963. Synthesis of Arithmetic Circuits : FPGA, ASIC and Embedded Systems , by Jean-Pierre Deschamps , Gery J.A. Bioul , Gustavo D. Sutter (Hardcover, 10 March, 2006)
  964. Systems Analysis and Design, Sixth Edition , by Gary B. Shelly , Thomas J. Cashman , Harry J. Rosenblatt (Paperback, 16 March, 2005)
  965. Take Back Your Life! Special Edition : Using Microsoft Outlook to Get Organized and Stay Organized (Bpg-Other) , by Sally McGhee (Paperback, 22 June, 2005)
  966. Teach Yourself Investing Online , by Thomas S. Gray , Claire Mencke (Paperback, 10 January, 2000)
  967. Teaching Every Student in the Digital Age : Universal Design for Learning - David H. Rose (2002-04, Paperback)
  968. Teaching Web Search Skills : Techniques And Strategies Of Top Trainers , by Greg R. Notess (Paperback, 29 October, 2006)
  969. Technical Trading Online (Wiley Online Trading for a Living Series) , by Jerold Roth , Trader X (Hardcover, 08 December, 2000)
  970. Terror on the Internet : The New Arena, the New Challenges , by Gabriel Weimann (Hardcover, March, 2006)
  971. Testing Web Security : Assessing the Security of Web Sites and Applications , by Steven Splaine (Paperback, 11 October, 2002)
  972. Text Information Retrieval Systems, Third Edition (Library and Information Science) (Library and Information Science) - Charles T. Meadow (2007-03-26, Hardcover)
  973. Text Mining : Predictive Methods for Analyzing Unstructured Information , by Sholom Weiss , Nitin Indurkhya , Tong Zhang , Fred Damerau (Hardcover, 25 October, 2004)
  974. Text Mining Application Programming (Programming Series) , by Manu Konchady (Paperback, 04 May, 2006)
  975. The .NET Developer's Guide to Directory Services Programming (Microsoft .NET Development Series) , by Joe Kaplan , Ryan Dunn (Paperback, 08 May, 2006)
  976. The .NET Developer's Guide to Windows Security (Microsoft .NET Development Series) , by Keith Brown (Paperback, 27 September, 2004)
  977. The 8051/8052 Microcontroller : Architecture, Assembly Language, And Hardware Interfacing , by Craig Steiner (Paperback, 30 August, 2005)
  978. The Architecture of Computer Hardware and Systems Software : An Information Technology Approach - Irv Englander (2003-01-20, Hardcover)
  979. The Art of Computer Virus Research and Defense (Symantec Press) , by Peter Szor (Paperback, 03 February, 2005)
  980. The Art of Deception : Controlling the Human Element of Security - Kevin D. Mitnick (2003-10-17, Paperback)
  981. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers - Kevin D. Mitnick (2005-12-27, Paperback)
  982. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , by Kevin D. Mitnick , William L. Simon (Hardcover, 04 March, 2005)
  983. The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities , by Mark Dowd , John McDonald , Justin Schuh (Paperback, 20 November, 2006)
  984. The Art of Software Security Testing : Identifying Software Security Flaws (Symantec Press) , by Chris Wysopal , Lucas Nelson , Dino Dai Zovi , Elfriede Dustin (Paperback, 17 November, 2006)
  985. The Art of Systems Architecting, Second Edition - Mark W. Maier (2000-06-28, Hardcover)
  986. The Best Damn Cisco Internetworking Book Period , by Charles Riley (Paperback, July, 2003)
  987. The Best Damn Firewall Book Period , by Cherie Amon , Thomas W. Shinder , Anne Carasik-Henmi (Paperback, June, 2003)
  988. The Business Case for Storage Networks (Network Business) , by Bill Williams (Paperback, 19 October, 2004)
  989. The Case of the Killer Robot : Stories about the Professional, Ethical, and Societal Dimensions of Computing , by Richard G. Epstein (Paperback, August, 1996)
  990. The CERT Guide to System and Network Security Practices , by Julia H. Allen (Paperback, 07 June, 2001)
  991. The CISM Prep Guide : Mastering the Five Domains of Information Security Management , by Ronald L. Krutz , Russell Dean Vines (Paperback, ..)
  992. The CISSP and CAP Prep Guide : Platinum Edition , by Ronald L. Krutz , Russell Dean Vines (Hardcover, 06 November, 2006)
  993. The CISSP Prep Guide : Gold Edition - Ronald L. Krutz (2002-10-31, Hardcover)
  994. The Compleat Guide to Day Trading Stocks , by Jake Bernstein (Hardcover, 30 August, 2000)
  995. The Complete Cisco VPN Configuration Guide (Networking Technology) , by Richard Deal (Paperback, 15 December, 2005)
  996. The Complete Guide to Online Stock Market Investing , by Alexander Davidson (Paperback, 01 March, 2007)
  997. The CRM Handbook : A Business Guide to Customer Relationship Management (Addison-Wesley Information Technology Series) - Jill Dyche (2001-08-09, Paperback)
  998. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , by Cliff Stoll (Paperback, 13 September, 2005)
  999. The Database Hacker's Handbook : Defending Database Servers , by David Litchfield , Chris Anley , John Heasman , Bill Grindlay (Paperback, 14 July, 2005)
  1000. The Day Trader's Survival Guide : How to Be Consistently Profitable in Short-Term Markets , by Christopher A. Farrell (Hardcover, 01 November, 2000)
  1001. The Definitive Guide to Apache mod_rewrite (Definitive Guide) , by Rich Bowen (Hardcover, 08 February, 2006)
  1002. The Definitive Guide to Building Java Robots (The Definitive Guide to) , by Scott Preston (Hardcover, 11 November, 2005)
  1003. The Definitive Guide to Interwoven TeamSite (Definitive Guides) , by Brian Hastings , Justin McNeal (Hardcover, 04 August, 2006)
  1004. The Definitive Guide to Stellent Content Server Development , by Brian Huff (Hardcover, 26 June, 2006)
  1005. The Design Warrior's Guide to FPGAs (Edn Series for Design Engineers) - Clive Max Maxfield (2004-04-12, Paperback)
  1006. The Designer's Guide to VHDL (Systems on Silicon) - Peter J. Ashenden (2002-05, Paperback)
  1007. The Digital Designer's Bible : The Print and Web Designers' Toolkit for Stress-Free Working Practice , by Alistair Dabbs , Alastair Campbell (Paperback, 01 February, 2005)
  1008. The Digital Designer : 101 Graphic Design Projects for Print, the Web, Multimedia, and Motion Graphics , by Stephen Pite (Paperback, 11 October, 2002)
  1009. The Electronic Day Trader : Successful Strategies for On-line Trading , by George West (Paperback, 24 August, 2000)
  1010. The Essentials of Computer Organization And Architecture - Linda Null (2006-02-15, Hardcover)
  1011. The Executive Guide to Information Security : Threats, Challenges, and Solutions (Symantec Press) , by Mark Egan , Tim Mather (Paperback, 30 November, 2004)
  1012. The Feynman Processor : Quantum Entanglement and the Computing Revolution (Helix Books Series) , by G. J. Milburn , Gerard J. Milburn (Paperback, 01 December, 1999)
  1013. The First Computers--History and Architectures (History of Computing) , by Raul Rojas , Ulf Hashagen (Paperback, 07 August, 2002)
  1014. The Fugitive Game : Online with Kevin Mitnick , by Jonathan Littman (Paperback, 01 January, 1997)
  1015. The Good the Spam and the Ugly , by Steve H. Graham (Paperback, 01 March, 2007)
  1016. The Graphic Designer's Digital Toolkit - Allan Wood (2005-09-28, Paperback)
  1017. THE GRAPHIC DESIGNER'S DIGITAL TOOLKIT , by Alan Wood (Paperback, 15 December, 2003)
  1018. The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks , by Susan Young , Dave Aitel (Hardcover, 24 November, 2003)
  1019. The Hacker Crackdown : Law And Disorder On The Electronic Frontier , by Bruce Sterling (Mass Market Paperback, 01 November, 1993)
  1020. The Hacker Diaries : Confessions of Teenage Hackers , by Dan Verton (Hardcover, 26 March, 2002)
  1021. The HCS12/9S12 : An Introduction to Hardware and Software Interfacing - Han-Way Huang (2005-07-26, Hardcover)
  1022. The Holy Grail of Network Storage Management , by Jon William Toigo (Paperback, 31 October, 2003)
  1023. The Internet Security Guidebook : From Planning to Deployment , by Juanita Ellis , Tim Speed , William P. Crowell (Paperback, 15 February, 2001)
  1024. The Invisible Web : Uncovering Information Sources Search Engines Can't See (A CyberAge Book) , by Chris Sherman , Gary Price (Paperback, September, 2001)
  1025. The Mac mini Guidebook , by David Coursey (Paperback, 09 June, 2005)
  1026. The Nasdaq Trader's Toolkit , by M. Rogan LaBier (Hardcover, 15 December, 2000)
  1027. The New Capital Market Revolution : The Winners, Losers and the Future of Finance , by Patrick L. Young (Hardcover, February, 2003)
  1028. The New Craft of Intelligence : Personal, Public, & Political--Citizen's Action Handbook for Fighting Terrorism, Genocide, Disease, Toxic Bombs, & Corruption , by Robert David Steele (Hardcover, 08 April, 2002)
  1029. The Non-Designer's Design Book - Robin Williams (1994-01-15, Paperback)
  1030. The Non-Designer's Design Book, Second Edition , by Robin Williams (Paperback, 15 September, 2003)
  1031. The OpenBSD PF Packet Filter Book , by Jeremy, C. Reed (Paperback, 18 August, 2006)
  1032. The Option Advisor : Wealth-Building Techniques Using Equity & Index Options (A Marketplace Book) , by Bernie Schaeffer (Hardcover, October, 1997)
  1033. The Organization of Information : Second Edition (Library and Information Science Text Series) - Arlene G. Taylor (2003-11-30, Paperback)
  1034. The Pentium Chronicles : The People, Passion, and Politics Behind Intel's Landmark Chips (Practitioners) , by Robert P. Colwell (Paperback, 23 December, 2005)
  1035. The Physics of Quantum Information : Quantum Cryptography, Quantum Teleportation, Quantum Computation , by Dirk Bouwmeester , Artur K. Ekert , Anton Zeilinger (Hardcover, 15 April, 2000)
  1036. The Practical Guide to Enterprise Architecture , by James McGovern , Scott W. Ambler , Michael E. Stevens , James Linn , Elias K. Jo , Vikas Sharan (Paperback, 15 November, 2003)
  1037. The Practice of Network Security : Deployment Strategies for Production Environments , by Allan Liska (Hardcover, 26 December, 2002)
  1038. The Process of Network Security , by Thomas A. Wadlow (Paperback, 02 March, 2000)
  1039. The Robosapien Companion : Tips, Tricks, and Hacks (Technology in Action) , by Jamie Samans (Paperback, 22 August, 2005)
  1040. The Savage Truth On Money , by Terry Savage (Paperback, 18 May, 2001)
  1041. The Security Development Lifecycle , by Michael Howard , Steve Lipner (Paperback, 28 June, 2006)
  1042. The Security+ Exam Guide (Testtaker's Guide Series) , by Christopher A. Crayton (Paperback, 18 February, 2003)
  1043. The Shellcoder's Handbook : Discovering and Exploiting Security Holes , by Jack Koziol , David Litchfield , Dave Aitel , Chris Anley , Sinan noir Eren , Neel Mehta , Riley Hassell (Paperback, 02 April, 2004)
  1044. The Software Vulnerability Guide (Programming Series) (Programming Series) , by Herbert H Thompson , Scott G Chase (Paperback, 03 June, 2005)
  1045. The Soul of a New Machine (Modern Library) , by Tracy Kidder (Hardcover, 24 June, 1997)
  1046. The Soul Of A New Machine , by Tracy Kidder (Paperback, 01 June, 2000)
  1047. The Sourcebook of Parallel Computing (The Morgan Kaufmann Series in Computer Architecture and Design) , by William Gropp , Ken Kennedy , Linda Torczon , Andy White , Jack Dongarra , Ian Foster , Geoffrey C. Fox (Hardcover, 11 November, 2002)
  1048. The SSCP Prep Guide : Mastering the Seven Key Areas of System Security , by Debra S. Isaac , Michael J. Isaac (Paperback, 11 April, 2003)
  1049. The Symantec Guide to Home Internet Security , by Andrew Conry-Murray , Vincent Weafer (Paperback, 24 August, 2005)
  1050. The Tao of Network Security Monitoring : Beyond Intrusion Detection - Richard Bejtlich (2004-07-12, Paperback)
  1051. The Total CISSP Exam Prep Book : Practice Questions, Answers, and Test Taking Tips and Techniques , by Thomas R. Peltier , Patrick D. Howard (Paperback, 20 June, 2002)
  1052. The Ultimate Security+ Certification Exam Cram 2 Study Kit (Exam SYO-101) (Exam Cram 2) - Que Certification (2004-03-16, Paperback)
  1053. The Unabridged Pentium 4 : IA32 Processor Genealogy (PC System Architecture) , by Tom Shanley (Paperback, 26 July, 2004)
  1054. The Unofficial Guide to Ethical Hacking , by Ankit Fadia (Paperback, 02 February, 2002)
  1055. The Web of Politics : The Internet's Impact on the American Political System , by Richard Davis (Paperback, February, 1999)
  1056. The WiMAX Seminar : Triple-Play, Quadruple Play, IPTV, VoIP, IMS and Mobility for Next Generation Networks , by Frank, D. Ohrtman (Digital, ..)
  1057. Thinking About GIS : Geographic Information System Planning for Managers , by Roger Tomlinson (Paperback, 01 May, 2005)
  1058. Threat Modeling (Microsoft Professional) , by Frank Swiderski , Window Snyder (Paperback, 14 July, 2004)
  1059. To Catch a Predator : Protecting Your Kids from Online Enemies Already in Your Home - Chris Hansen (2007-03-15, Hardcover)
  1060. Tools and Tactics for the Master DayTrader : Battle-Tested Techniques for Day, Swing, and Position Traders - Oliver Velez (2000-06-29, Hardcover)
  1061. Trade Options Online (Wiley Online Trading for a Living) , by George A. Fontanills (Hardcover, 27 October, 2000)
  1062. Trading on the Edge : Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets , by Guido J. Deboeck (Hardcover, March, 1994)
  1063. Traffic Engineering with MPLS , by Eric Osborne , Ajay Simha (Hardcover, 17 July, 2002)
  1064. Transaction Processing : Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems) , by Jim Gray , Andreas Reuter (Hardcover, 1993)
  1065. Transactional Information Systems : Theory, Algorithms, and the Practice of Concurrency Control (The Morgan Kaufmann Series in Data Management Systems) , by Gerhard Weikum , Gottfried Vossen (Hardcover, 24 May, 2001)
  1066. Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code , by Michael Erbschloe (Paperback, 16 August, 2004)
  1067. Troubleshooting Linux(R) Firewalls , by Michael Shinn , Scott Shinn (Paperback, 14 December, 2004)
  1068. Tru64 UNIX File System Administration Handbook , by Steven M. Hancock (Paperback, 24 November, 2000)
  1069. Trust and Risk in Internet Commerce , by L. Jean Camp (Hardcover, 18 April, 2000)
  1070. Turtles, Termites, and Traffic Jams : Explorations in Massively Parallel Microworlds (Complex Adaptive Systems) , by Mitchel Resnick (Paperback, 10 January, 1997)
  1071. Ultimate Internet Outlaw : How Surfers Steal Sex, Software, Cds, Games, And More Top-Secret Stuff On The Information Superhighway , by Robert Merkle (Paperback, May, 1999)
  1072. UMTS Security , by Valtteri Niemi , Kaisa Nyberg , Valtteri Niemi , Kaisa Nyberg (Hardcover, 13 March, 2003)
  1073. Understanding AS/400 System Operations , by Mike Dawson , Marge Hohly (Paperback, 15 June, 2000)
  1074. Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition , by Carlisle Adams , Steve Lloyd (Hardcover, 06 November, 2002)
  1075. Understanding Search Engines : Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition , by Michael W. Berry , Murray Browne (Paperback, 28 April, 2005)
  1076. Understanding Terror Networks - Marc Sageman (2004-05-01, Hardcover)
  1077. Universal Meta Data Models , by David Marco , Michael Jennings (Paperback, 09 April, 2004)
  1078. Universal Serial Bus System Architecture (2nd Edition) , by MindShare Inc. , Don Anderson (Paperback, 03 April, 2001)
  1079. Unix in a Nutshell (In a Nutshell) , by Arnold Robbins (Paperback, 01 October, 2005)
  1080. UNIX(R) Systems for Modern Architectures : Symmetric Multiprocessing and Caching for Kernel Programmers , by Curt Schimmel (Paperback, 30 June, 1994)
  1081. USB Mass Storage : Designing and Programming Devices and Embedded Hosts - Jan Axelson (2006-09-01, Paperback)
  1082. Using and Managing PPP , by Andrew Sun (Paperback, March, 1999)
  1083. Using MPI - 2nd Edition : Portable Parallel Programming with the Message Passing Interface (Scientific and Engineering Computation) , by William Gropp , Ewing Lusk , Anthony Skjellum (Paperback, 26 November, 1999)
  1084. Using Query/400 , by Patrice Gapen , Catherine Stoughton (Paperback, 01 January, 1996)
  1085. Using SANs and NAS - W. Curtis Preston (2002-02, Paperback)
  1086. Verilog Digital Computer Design : Algorithms Into Hardware , by Mark Arnold (Paperback, 29 June, 1998)
  1087. Virtual Honeypots : From Botnet Tracking to Intrusion Detection - Niels Provos (2007-07-16, Paperback)
  1088. Virtual Machines : Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design) , by Jim Smith , Ravi Nair (Hardcover, 03 June, 2005)
  1089. Virtual Office Tools for a High Margin Practice : How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours , by David J. Drucker , Joel P. Bruckenstein (Paperback, October, 2002)
  1090. Virtual Private Networks for Dummies , by Mark S. Merkow (Paperback, 15 November, 1999)
  1091. Virtual Private Networks, 2nd Edition (O'Reilly Nutshell) , by Charlie Scott , Paul Wolfe , Mike Erwin (Paperback, December, 1998)
  1092. Virtualization with Microsoft Virtual Server 2005 , by Rogier Dittner , David Rule , Ken Majors , Matthijs Ten Seldam , Twan Grotenhuis (Paperback, 27 September, 2006)
  1093. Virtualization with VMware ESX Server - Al Muller (2005-08-09, Paperback)
  1094. Visual Design Fundamentals, Second Edition : A Digital Approach (Graphics Series) - Alan Hashimoto (2006-08-23, Paperback)
  1095. VLSI Digital Signal Processing Systems : Design and Implementation , by Keshab K. Parhi (Hardcover, 04 January, 1999)
  1096. Voice-Enabling the Data Network : H.323, MGCP, SIP, QoS, SLAs, and Security , by James F. Durkin (Hardcover, 25 September, 2002)
  1097. Voice over Internet Protocol (VoIP) Security , by PhD, CISM, CISSP, James F. Ransome , PhD, CISM, John Rittinghouse (Paperback, 19 November, 2004)
  1098. Wardriving & Wireless Penetration Testing , by Chris Hurley , Russ Rogers , Frank Thornton , Daniel Connelly , Brian Baker (Paperback, 31 October, 2006)
  1099. WarDriving : Drive, Detect, Defend, A Guide to Wireless Security , by Chris Hurley , Michael Puchol , Russ Rogers , Frank Thornton (Paperback, 01 April, 2004)
  1100. Web Data Mining : Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications) , by Bing Liu (Hardcover, 28 December, 2006)
  1101. Web Dragons : Inside the Myths of Search Engine Technology (The Morgan Kaufmann Series in Multimedia and Information Systems) , by Ian H. Witten , Marco Gori , Teresa Numerico (Paperback, 03 November, 2006)
  1102. Web Hacking : Attacks and Defense , by Stuart McClure , Saumil Shah , Shreeraj Shah (Paperback, 08 August, 2002)
  1103. Web Metrics : Proven Methods for Measuring Web Site Success , by Jim Sterne (Paperback, 15 June, 2002)
  1104. Web of Deception : Misinformation on the Internet , by Anne P. Mintz (Paperback, 01 September, 2002)
  1105. Web Performance Tuning, 2nd Edition (O'Reilly Internet) , by Patrick Killelea (Paperback, March, 2002)
  1106. Web Privacy with P3P , by Lorrie Faith Cranor (Paperback, September, 2002)
  1107. Web Security : A Step-by-Step Reference Guide , by Lincoln D. Stein (Paperback, 31 December, 1997)
  1108. Web Security Field Guide , by Steve Kalman (Paperback, 08 November, 2002)
  1109. Web Services Security , by Mark O'Neill (Paperback, 31 January, 2003)
  1110. Webbots, Spiders, and Screen Scrapers : A Guide to Developing Internet Agents with PHP/CURL - Michael Schrenk (2007-03-30, Paperback)
  1111. WebSphere Application Server : Step by Step (Step-by-Step series) , by Rama Turaga , Owen Cline , Peter Van Sickel (Paperback, 01 May, 2006)
  1112. White-Hat Security Arsenal : Tackling the Threats , by Aviel D. Rubin (Paperback, 21 June, 2001)
  1113. Who Goes There? : Authentication Through the Lens of Privacy , by Stephen T. Kent , Lynette I. Millett (Paperback, 01 October, 2003)
  1114. Wi-Foo : The Secrets of Wireless Hacking - Andrew Vladimirov (2004-06-28, Paperback)
  1115. Windows 2000 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 29 August, 2001)
  1116. Windows 2000 Server Security for Dummies , by Paul Sanna (Paperback, 21 December, 1999)
  1117. Windows Forensic Analysis Including DVD Toolkit - Harlan Carvey (2007-04-24, Paperback)
  1118. Windows Forensics : The Field Guide for Corporate Computer Investigations , by Chad Steel (Paperback, 15 May, 2006)
  1119. Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series) , by Harlan Carvey (Paperback, 21 July, 2004)
  1120. Windows Internet Security , by Seth Fogie , Cyrus Peikari (Paperback, September, 2001)
  1121. Windows Server 2003 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 27 October, 2003)
  1122. Windows Server 2003 Security : A Technical Reference (Microsoft Windows Server System Series) , by Roberta Bragg (Paperback, 26 May, 2005)
  1123. Windows Server 2003 Security Bible , by Blair Rampling (Paperback, 15 July, 2002)
  1124. Windows Server 2003 Security Cookbook (Cookbooks (O'Reilly)) , by Mike Danseglio , Robbie Allen (Paperback, 01 December, 2005)
  1125. Windows Server Cookbook for Windows Server 2003 and Windows 2000 , by Robbie Allen (Paperback, 23 March, 2005)
  1126. Wireless Hacking : Projects for Wi-Fi Enthusiasts , by Lee Barken , Eric Bermel , John Eder , Matt Fanady , Alan Koebrick , Michael Mee , Marc Palumbo (Paperback, 01 October, 2004)
  1127. Wireless Hacks : Tips & Tools for Building, Extending, and Securing Your Network (Hacks) - Rob Flickenger (2005-11-22, Paperback)
  1128. Wireless Security : Models, Threats, and Solutions , by Randall K. Nichols , Panos C. Lekkas (Paperback, 13 December, 2001)
  1129. Wireless Security End to End , by Brian Carter , Russell Shumway (Paperback, 15 August, 2002)
  1130. Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) - Angela Orebaugh (2006-11-30, Paperback)
  1131. Write Great Code, Volume 2 : Thinking Low-Level, Writing High-Level , by Randall Hyde (Paperback, 18 March, 2006)
  1132. Writing Secure Code, Second Edition , by Michael Howard , David C. LeBlanc (Paperback, 04 December, 2002)
  1133. Writing Security Tools and Exploits , by James Foster (Paperback, 21 December, 2005)

Link to more stores on our main index page ...