Networking in 2007
Unix: The Complete Reference, Second Edition
by
Rosen, Kenneth H., Host, Douglas A., Klee, Rachel
Secure Your Network for Free
by
Seagren, Eric
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
by
Contos, Brian T.
Microsoft Sharepoint Interview Questions: Share Point Certification Review
by
Sanchez-Clark, Tery
Linux Kernel in a Nutshell: A Desktop Quick Reference
by
Kroah-Hartman, Greg
Cisco IOS Cookbook: Field-Tested Solutions to Cisco Router Problems
by
Dooley, Kevin, Brown, Ian
Foundations of BizTalk Server 2006
by
Woolston, Daniel
Practical .Net 2.0 Networking Projects
by
Lee, Wei-Meng
Dynamic Pricing and Automated Resource Allocation for Complex Information Services: Reinforcement Learning and Combinatorial Auctions
by
Schwind, Michael
SharePoint 2007 User's Guide: Learning Microsoft's Collaboration and Productivity Platform
by
Smith, Tony, Bates, Seth
Using Samba: A File & Print Server for Linux, UNIX & Mac OS X
by
Carter, Gerald, Ts, Jay, Eckstein, Robert
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
by
Walther, Henrik
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators [With CDROM]
by
Wiles, Jack, Rogers, Russ, Long, Johnny
Multi-Objective Optimization in Computer Networks Using Metaheuristics
by
Donoso, Yezid, Fabregat, Ramon
Digitale Hardware/Software-Systeme: Synthese Und Optimierung
by
Haubelt, Christian, Teich, Jürgen
A Distributed Pi-Calculus
by
Hennessy, Matthew
Power Analysis Attacks: Revealing the Secrets of Smart Cards
by
Mangard, Stefan, Oswald, Elisabeth, Popp, Thomas
Objektorientierte Systementwicklung: Vom Geschäftsprozess Zum Java-Programm
by
Rau, Karl-Heinz
The Complete April Fools' Day Rfcs
by
Limoncelli, Thomas A., Salus, Peter H.
Pro Apache Tomcat 6
by
Moodie, Matthew, Mittal, Kunal
Data Communications Network Auditing
by
Griffis, Bruce
How to Cheat at VoIP Security
by
Gough, Michael, Porter, Thomas Cissp
Home Networking for Dummies
by
Ivens, Kathy
Managing the Linux kernel with AgentX- Design and Implementation
by
Wellnitz, Oliver
A+, Network+, Security+ Exams in a Nutshell
by
Bhardwaj, Pawan K.
Physical and Logical Security Convergence: Powered by Enterprise Security Management
by
Contos, Brian T., Derodeff, Colby, Crowell, William P.
Designing for Networked Communications: Strategies and Development
by
Heilesen, Simon B.
Internet Retailing
by
Yan, Ruiliang
Network Security
by
Serpanos, Dimitrios N., Douligeris, Christos
Mobile Inter-Networking with Ipv6: Concepts, Principles and Practices
by
Perkins, Charles E., Koodli, Rajeev S.
Ethernet Networking for the Small Office and Professional Home Office
by
Harrington, Jan L.
Virtual Knowledge Communities
by
Trier, Matthias
Security Convergence: Managing Enterprise Security Risk
by
Tyson, Dave
Practical Rails Social Networking Sites
by
Bradburne, Alan
Wi-Fi(tm), Bluetooth(tm), Zigbee(tm) and Wimax(tm)
by
Afifi, Hossam, De Santis, Costantino, Labiod, Houda
Optimizing and Testing WLANs: Proven Techniques for Maximum Performance
by
Alexander, Tom
Learning WCF: A Hands-On Guide
by
Bustamante, Michele LeRoux
Web Engineering: 7th International Conference, ICWE 2007 Como, Italy, July 16-20, 2007 Proceedings
by
Online Business Security Systems
by
Williams, Godfried B.
Peer-To-Peer-Netzwerke: Algorithmen Und Methoden
by
Schindelhauer, Christian, Mahlmann, Peter
Gays in (Cyber-) Space
by
Fox, Ragan
Netzwerke und deren Sicherheit
by
Protic, Dea Ana
Synchronizing Internet Protocol Security (Sipsec)
by
Shoniregun, Charles A.
Online Social Support: The Interplay of Social Networks and Computer-Mediated Communication
by
Bambina, Antonina D.
Forensic Computing
by
Sammes, Anthony, Jenkinson, Brian
Sequence Data Mining
by
Pei, Jian, Dong, Guozhu
Efficient Wireless MAC Protocols- Analyzing Quality of Service in Wireless Networks
by
Mueller, Alexander
Guide to UNIX Using Linux [With CDROM]
by
Palmer, Michael
Design of Information Flow for Networked Control Systems
by
Gupta, Vijay
Bluetooth Essentials for Programmers
by
Huang, Albert S., Rudolph, Larry
Concurrent Programming in ML
by
Reppy, John H.
Chatting to Learn: The Changing Psychology and Evolving Pedagogy of Online Learning
by
Hudson, James M., Hudson, Jim, Hudson, J. M.
Social Networks and the Semantic Web
by
Mika, Peter
An Introduction to Wireless Sensor Networks
by
Bauer, Fred
How to Cheat at Administering Office Communications Server 2007
by
Piltzecker, Anthony
Machine Learning for Multimedia Content Analysis
by
Gong, Yihong, Xu, Wei
Network-Aware Security for Group Communications
by
Sun, Yan, Liu, K. J. Ray, Trappe, Wade
Educational Algebra: A Theoretical and Empirical Approach
by
Rojano, Teresa, Puig, Luis, Filloy, Eugenio
Privacy-Respecting Intrusion Detection
by
Flegel, Ulrich
Introduction to Reconfigurable Computing: Architectures, Algorithms, and Applications
by
Bobda, Christophe
Microsoft(r) Office Sharepoint(r) Server 2007: The Complete Reference
by
Sterling, David
Network-Centric Service Oriented Enterprise
by
Chang, William Y.
Peer-To-Peer Video Streaming
by
Girod, Bernd, Setton, Eric
Windows Home Server User's Guide
by
Edney, Andrew
SharePoint 2007: The Definitive Guide: Using, Customizing, and Managing SharePoint 2007
by
Fox, Bob, Buechler, Christopher M., Pyles, James
Semantic Web: Grundlagen
by
Hitzler, Pascal, Krötzsch, Markus, Rudolph, Sebastian
Voice Over WLANS
by
Flick
How to Cheat at Configuring VmWare ESX Server
by
Rule, David
The Best Damn Server Virtualization Book Period: Including VMware, Xen, and Microsoft Virtual Server
by
Dittner, Rogier, Rule, David
Microsoft Windows Server 2008 Administration
by
Seguis, Steve
Virtualization for Dummies
by
Golden, Bernard
It Disaster Recovery Planning for Dummies
by
Gregory, Peter H.
Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN
by
Adhikari, Prasanna, Chen, Nan, Kasim, Abdul
Scheduling and Flow-Related Problems in Networks
by
Hall, Alexander
Dissemination of Information in Optical Networks: From Technology to Algorithms
by
Bandyopadhyay, Subir