TITLE | AUTHOR | Subject | ScienceDirect Links |
Descriptive Inorganic Chemistry | House, James | Chemitry | https://www.sciencedirect.com/science/book/9780128046975 |
Computers as Components | Wolf, Marilyn | Computer Science | https://www.sciencedirect.com/science/book/9780128053874 |
Introduction to Data Compression | Sayood, Khalid | Computer Science | https://www.sciencedirect.com/book/9780128094747 |
Programming Massively Parallel Processors | Kirk, David | Computer Science | https://www.sciencedirect.com/science/book/9780128119860 |
Parallel Programming | Schmidt, Bertil | Computer Science | https://www.sciencedirect.com/book/9780128498903 |
Wireless Public Safety Networks Volume 1 | Camara, Daniel | Computer science 2016 | https://www.sciencedirect.com/science/book/9781785480225 |
The Basics of Cyber Safety | Sammons, John | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780124166509 |
Discover Digital Libraries | Xie, Iris | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780124171121 |
RIoT Control | Macaulay, Tyson | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780124199712 |
Threat Forecasting | Pirc, John | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128000069 |
Heterogeneous System Architecture | Hwu, Wen-mei | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128003862 |
Physically Based Rendering | Pharr, Matt | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128006450 |
Communications for Control in Cyber Physical Systems | Li, Husheng | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128019504 |
Building a Practical Information Security Program | Andress, Jason | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128020425 |
Network Function Virtualization | Nadeau, Thomas | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128021194 |
Introduction to Statistical Machine Learning | Sugiyama, Masashi | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128021217 |
Foundations of Quantum Programming | Ying, Mingsheng | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128023068 |
The Data and Analytics Playbook | Fryman, Lowell | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128023075 |
Quantifying the User Experience | Sauro, Jeff | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128023082 |
Universal UX Design | Ferreira, Alberto | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128024072 |
CISSP Study Guide | Conrad, Eric | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128024379 |
Malware Diffusion Models for Modern Complex Networks | Karyotis, Vasileios | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128027141 |
Multiscreen UX Design | Nagel, Wolfram | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128027295 |
Hidden Semi-Markov Models | Sheng Zheng, Yu | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128027677 |
Managing Trade-offs in Adaptable Software Architectures | Mistrik, Ivan | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128028551 |
Mobile Data Loss | Raggo, Michael | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128028643 |
Automating Open Source Intelligence | Layton, Robert | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128029169 |
Continuous Architecture | Pureur, Pierre | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128032848 |
Windows Registry Forensics | Carvey, Harlan | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128032916 |
DNS Security | Liska, Allan | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128033067 |
Hiding Behind the Keyboard | Shavers, Brett | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128033401 |
Data Breach Preparation and Response | Fowler, Kevvie | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128034514 |
Smart Cities and Homes | Obaidat, Mohammad | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128034545 |
Multi-Dimensional Summarization in Cyber-Physical Society | Zhuge, Hai | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128034552 |
Network Performance and Security | Chapman, Chris | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128035849 |
Sustainable Wireless Network-on-Chip Architectures | Murray, Jacob | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128036259 |
Formative Assessment, Learning Data Analytics and Gamification | Caballé, Santi | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128036372 |
Pervasive Computing | Dobre, Ciprian | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128036631 |
Shared Memory Application Programming | Alessandrini, Victor | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128037614 |
Handbook of System Safety and Security | Griffor, Edward | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128037737 |
Data Simplification | Berman, Jules | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128037812 |
Cyber-Physical Systems | Song, Houbing | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128038017 |
The Visual Imperative | Ryan, Lindy | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128038444 |
Complex Systems and Clouds | Marinescu, Dan | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128040416 |
Emerging Trends in Applications and Infrastructures for Computational Biology, Bioinformatics, and Systems Biology | Arabnia, Hamid | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128042038 |
Perspectives on Data Science for Software Engineering | Menzies, Tim | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128042069 |
Dissecting the Hack | Street, Jayson | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128042786 |
Protecting Patient Information | Cerrato, Paul | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128043929 |
Relational Database Design and Implementation | Harrington, Jan | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128043998 |
Quantum Inspired Computational Intelligence | Bhattacharyya, Siddhartha | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044094 |
Sentiment Analysis in Social Networks | Pozzi, Federico | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044124 |
Data Hiding Techniques in Windows OS | Hassan, Nihad | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044490 |
Cybersecurity and Applied Mathematics | Metcalf, Leigh | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044520 |
Implementing Digital Forensic Readiness | Sachowski, Jason | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044544 |
OS X Incident Response | Bradley, Jaron | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044568 |
Practical Deployment of Cisco Identity Services Engine (ISE) | Richter, Andy | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128044575 |
Optimizing the Display and Interpretation of Data | Warner, Robert | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128045138 |
Intelligent Data Analysis for e-Learning | Miguel, Jorge | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128045350 |
Mobile Security and Privacy | Au, Man Ho | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128046296 |
Deploying Secure Containers for Training and Development | Schipp, Jon | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128047170 |
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework | Dalziel, Henry | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128047187 |
Cyber Security Awareness for CEOs and Management | Willson, David | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128047545 |
Building Intelligent Information Systems Software | Feigenbaum, Thomas | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051016 |
GPU Programming in MATLAB | Ploskas, Nikolaos | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051320 |
Building the Agile Enterprise | Cummins, Fred | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051603 |
Data Mapping for Data Warehouse Design | Shahbaz, Qamar | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051856 |
Successes and Failures of Knowledge Management | Liebowitz, Jay | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051870 |
Cyber Guerilla | Van Haaster, Jelle | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128051979 |
Systems Analysis and Synthesis | Dwyer, Barry | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128053041 |
Big Data | Buyya, Rajkumar | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128053942 |
Internet of Things | Buyya, Rajkumar | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128053959 |
Intel Xeon Phi Processor High Performance Programming | Jeffers, James | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128091944 |
Business Intelligence Strategy and Big Data Analytics | Author, Author | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128091982 |
Intelligent Vehicular Networks and Communications | Rho, Seungmin | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128092668 |
Preserving Electronic Evidence for Trial | Zeigler, Ann | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128093351 |
GPU-based Parallel Implementation of Swarm Intelligence Algorithms | Tan, Ying | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128093627 |
Information Security Science | Young, Carl | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128096437 |
Eleventh Hour CISSP® | Conrad, Eric | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128112489 |
Audio Content Security | Amiri, I.S. | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128113837 |
Temporal Data Mining via Unsupervised Ensemble Learning | Yang, Yun | Computer Science 2016 | https://www.sciencedirect.com/science/book/9780128116548 |
Wireless Public Safety Networks 2 | Camara, Daniel | Computer Science 2016 | https://www.sciencedirect.com/science/book/9781785480522 |
Certifiable Software Applications 1 | Jean-Louis, Boulanger | Computer Science 2016 | https://www.sciencedirect.com/science/book/9781785481178 |
Machine Learning | Gori, Marco | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780081006597 |
Parallel Programming with OpenACC | Farber, Rob | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780124103979 |
Three-Dimensional Integrated Circuit Design | Pavlidis, Vasilis | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780124105010 |
FTTx Networks | Farmer, James | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780124201378 |
Network Routing | Medhi, Deepankar | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128007372 |
Contextual Design | Holtzblatt, Karen | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128008942 |
Mobile Sensors and Context-Aware Computing | Gajjar, Manish | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128016602 |
Penetration Tester's Open Source Toolkit | Faircloth, Jeremy | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128021491 |
Rugged Embedded Systems | Vega, Augusto | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128024591 |
Silicon Photonics | Inniss, Daryl | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128029756 |
Usability Testing for Survey Research | Geisen, Emily | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128036563 |
Advances in GPU Research and Practice | Azad, Hamid | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128037386 |
Cognitive Information Systems in Management Sciences | Ogiela, Lidia | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128038031 |
Computer and Information Security Handbook | Vacca, John | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128038437 |
Network Storage | O'Reilly, James | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128038635 |
Application Performance Management (APM) in the Digital Enterprise | Sturm, Rick | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128040188 |
Embedded Computing for High Performance | Cardoso, João | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128041895 |
Securing the Internet of Things | Li, Shancang | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128044582 |
Designing User Interfaces for an Aging Population | Johnson, Jeff | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128044674 |
Software Defined Networks | Goransson, Paul | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128045558 |
Adaptive Mobile Computing | Migliardi, Mauro | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128046036 |
Hacking Wireless Access Points | Kurtz, Jennifer | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128053157 |
Peering Carrier Ethernet Networks | Kangovi, Sachidananda | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128053195 |
Research Methods for Cyber Security | Edgar, Thomas | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128053492 |
OCEB 2 Certification Guide | Weilkiens, Tim | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128053522 |
Research Methods in Human-Computer Interaction | Lazar, Jonathan | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128053904 |
Software Architecture for Big Data and the Cloud | Mistrik, Ivan | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128054673 |
Coding for Penetration Testers | Andress, Jason | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128054727 |
Topological UML Modeling | Osis, Janis | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128054765 |
Evolution of Knowledge Science | Ahamed, Syed | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128054789 |
Advanced Persistent Security | Winkler, Ira | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128093160 |
Big Data Analytics for Sensor-Network Collected Intelligence | Hsu, Hui-Huang | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128093931 |
OCUP 2 Certification Guide | Chonoles, Michael | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128096406 |
Mobile Cloud Computing | Wu, Huijun | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128096413 |
Federal Cloud Computing | Metheny, Matthew | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128097106 |
Managing the Web of Things | Sheng, Michael | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128097649 |
Smart Sensors Networks | Xhafa, FatosXhafa, Fatos | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128098592 |
Deep Learning for Medical Image Analysis | Zhou, KevinZhou, Kevin | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128104088 |
Statistical Shape and Deformation Analysis | Zheng, Guoyan | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128104934 |
The Illustrated Network | Goralski, Walter | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128110270 |
Lossless Information Hiding in Images | Lu, Zhe-Ming | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128120064 |
Big Data and Smart Service Systems | Liu, Xiwei | Computer Science 2017 | https://www.sciencedirect.com/science/book/9780128120132 |
Wireless Public Safety Networks 3 | Camara, Daniel | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785480539 |
Certifiable Software Applications 2 | Boulanger, Jean-Louis | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785481185 |
ESD Protection Methodologies | Bafleur, Marise | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785481222 |
Flash Memory Integration | Boukhobza, Jalil | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785481246 |
Distributed Systems | Perrin, Matthieu | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785482267 |
Safety of Web Applications | Quinton, Eric | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785482281 |
Cognitive Approach to Natural Language Processing | Sharp, Bernadette | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785482533 |
Computational Frameworks | Traore, Mamadou Kaba | Computer Science 2017 | https://www.sciencedirect.com/science/book/9781785482564 |
Digital Design and Computer Architecture | Harris, Sarah | Computing | https://www.sciencedirect.com/science/book/9780128000564 |