|
Title |
Link |
|
Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119010258 |
|
Advanced Penetration Testing: Hacking the World's Most Secure Networks |
http://onlinelibrary.wiley.com/book/10.1002/9781119367741 |
|
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams |
http://onlinelibrary.wiley.com/book/10.1002/9781119183587 |
|
Applied Microsoft Business Intelligence |
http://onlinelibrary.wiley.com/book/10.1002/9781119183570 |
|
Artificial Immune System: Applications in Computer Security |
http://onlinelibrary.wiley.com/book/10.1002/9781119076582 |
|
Artificial Neural Network Applications for Software Reliability Prediction |
http://onlinelibrary.wiley.com/book/10.1002/9781119223931 |
|
Asymmetric Alliances Management via Information Systems: Issues and Prospects |
http://onlinelibrary.wiley.com/book/10.1002/9781119335689 |
|
AutoCAD 2017 and AutoCAD LT 2017 Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119415558 |
|
AutoCAD and AutoCAD LT Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119414124 |
|
Autodesk Revit 2017 for Architecture No Experience Required |
http://onlinelibrary.wiley.com/book/10.1002/9781119415589 |
|
Beginning Android Programming with Android Studio |
http://onlinelibrary.wiley.com/book/10.1002/9781119419334 |
|
Beginning Java Programming: The Object-Oriented Approach |
http://onlinelibrary.wiley.com/book/10.1002/9781119209416 |
|
Beginning JavaScript, 5th Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209423 |
|
Beginning Software Engineering |
http://onlinelibrary.wiley.com/book/10.1002/9781119209515 |
|
Belief and Misbelief Asymmetry on the Internet |
http://onlinelibrary.wiley.com/book/10.1002/9781119261544 |
|
Beyond Cybersecurity: Protecting Your Digital Business |
http://onlinelibrary.wiley.com/book/10.1002/9781119055228 |
|
Big Data MBA: Driving Business Strategies with Data Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119238881 |
|
Brain-Computer Interfaces 2: Technology and Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119332428 |
|
Building Responsive Data Visualization for the Web |
http://onlinelibrary.wiley.com/book/10.1002/9781119209560 |
|
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119419372 |
|
CISA - Certified Information Systems Auditor Study Guide, Fourth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119419211 |
|
Cloud Computing - Business Trends and Technologies |
http://onlinelibrary.wiley.com/book/10.1002/9781118736074 |
|
Cloud Services, Networking, and Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119042655 |
|
COBOL Software Modernization |
http://onlinelibrary.wiley.com/book/10.1002/9781119073147 |
|
Cognitive Computing and Big Data Analytics |
http://onlinelibrary.wiley.com/book/10.1002/9781119183648 |
|
Collaborative Annotation for Reliable Natural Language Processing: Technical and Sociological Aspects |
http://onlinelibrary.wiley.com/book/10.1002/9781119306696 |
|
Collective Intelligence and Digital Archives: Towards Knowledge Ecosystem |
http://onlinelibrary.wiley.com/book/10.1002/9781119384694 |
|
Communication Practices in Engineering, Manufacturing, and Research for Food and Water Safety |
http://onlinelibrary.wiley.com/book/10.1002/9781118886373 |
|
Content Delivery Networks: Fundamentals, Design, and Evolution |
http://onlinelibrary.wiley.com/book/10.1002/9781119249924 |
|
Cyber-Risk Informatics: Engineering Evaluation with Data Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119087540 |
|
Cybersecurity Law |
http://onlinelibrary.wiley.com/book/10.1002/9781119231899 |
|
Data as a Service: A Framework for Providing Reusable Enterprise Data Services |
http://onlinelibrary.wiley.com/book/10.1002/9781119055143 |
|
Data Mining and Learning Analytics: Applications in Educational Research |
http://onlinelibrary.wiley.com/book/10.1002/9781118998205 |
|
Data Mining and Machine Learning in Building Energy Analysis: Towards High Performance Computing |
http://onlinelibrary.wiley.com/book/10.1002/9781118577691 |
|
Data Science & Big Data Analytics:nalyzing, Visualizing and Presenting Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119183686 |
|
Decision-Making and the Information System |
http://onlinelibrary.wiley.com/book/10.1002/9781119102663 |
|
Designing Interactive Hypermedia Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119388272 |
|
Digital Transformation: Information System Governance |
http://onlinelibrary.wiley.com/book/10.1002/9781119377986 |
|
DNS Security Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119328292 |
|
E-mail and Behavioral Changes: Uses and Misuses of Electronic Communications |
http://onlinelibrary.wiley.com/book/10.1002/9781119285106 |
|
Enablers for Smart Cities |
http://onlinelibrary.wiley.com/book/10.1002/9781119329954 |
|
Enterprise Content and Search Management for Building Digital Platforms |
http://onlinelibrary.wiley.com/book/10.1002/9781119206842 |
|
ERP and Information Systems: Integration or Disintegration |
http://onlinelibrary.wiley.com/book/10.1002/9781119232643 |
|
Evolutionary Algorithms |
http://onlinelibrary.wiley.com/book/10.1002/9781119136378 |
|
Evolutionary Computation in Gene Regulatory Network Research |
http://onlinelibrary.wiley.com/book/10.1002/9781119079453 |
|
Excel 2016 Power Programming with VBA |
http://onlinelibrary.wiley.com/book/10.1002/9781119415503 |
|
Expert Android Studio |
http://onlinelibrary.wiley.com/book/10.1002/9781119419310 |
|
Foundations of Coding: Compression, Encryption, Error Correction |
http://onlinelibrary.wiley.com/book/10.1002/9781119005940 |
|
From Big Data to Smart Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119116189 |
|
From Photon to Pixel: The Digital Camera Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119238447 |
|
Functional Software Size Measurement Methodologywith Effort Estimation and Performance Indication |
http://onlinelibrary.wiley.com/book/10.1002/9781119238126 |
|
Fundamentals of Big Data Network Analysis for Research and Industry |
http://onlinelibrary.wiley.com/book/10.1002/9781119015451 |
|
Games with a Purpose (GWAPS) |
http://onlinelibrary.wiley.com/book/10.1002/9781119136309 |
|
Graph Analysis and Visualization:iness Opportunity in Linked Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119183662 |
|
Hacking the Hacker: Learn From the Experts Who Take Down Hackers |
http://onlinelibrary.wiley.com/book/10.1002/9781119396260 |
|
Incremental Software Architecture: A Method for Saving Failing IT Implementations |
http://onlinelibrary.wiley.com/book/10.1002/9781119125365 |
|
Information and Knowledge Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119116165 |
|
Information and Recommender Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119102779 |
|
Information Warfare, 2nd edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119004721 |
|
Interactions on Digital Tablets in the Context of3D Geometry Learning: Contributions and Assessments |
http://onlinelibrary.wiley.com/book/10.1002/9781119330288 |
|
Introduction to Lattice Theory with Computer Science Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119069706 |
|
Introduction to Network Security: Theory and Practice |
http://onlinelibrary.wiley.com/book/10.1002/9781119113102 |
|
Java Programming 24-Hour Trainer, Second Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209522 |
|
JMP Connections: The Art of Utilizing Connections In Your Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119453680 |
|
Large-Scale Distributed Systems and Energy Efficiency: A Holistic View |
http://onlinelibrary.wiley.com/book/10.1002/9781118981122 |
|
Lean Computing for the Cloud |
http://onlinelibrary.wiley.com/book/10.1002/9781119232353 |
|
Learning Computer Architecture with Raspberry Pi ( US) |
http://onlinelibrary.wiley.com/book/10.1002/9781119415534 |
|
Linux Bible, Ninth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209539 |
|
Linux Command Line and Shell Scripting Bible, Third Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209409 |
|
Linux Server Security: Hack and Defend |
http://onlinelibrary.wiley.com/book/10.1002/9781119283096 |
|
Machine Learning in Python:for Predictive Analysis |
http://onlinelibrary.wiley.com/book/10.1002/9781119183600 |
|
Mastering AutoCAD 2017 and AutoCAD LT 2017 |
http://onlinelibrary.wiley.com/book/10.1002/9781119415510 |
|
Mastering AutoCAD and AutoCAD LT |
http://onlinelibrary.wiley.com/book/10.1002/9781119414179 |
|
Mastering Autodesk Revit 2017 for Architecture |
http://onlinelibrary.wiley.com/book/10.1002/9781119415565 |
|
Mastering Autodesk Revit 2018 |
http://onlinelibrary.wiley.com/book/10.1002/9781119414315 |
|
Medical Information Systems Ethics |
http://onlinelibrary.wiley.com/book/10.1002/9781119178224 |
|
Memory and Action Selection in Human-Machine Interaction |
http://onlinelibrary.wiley.com/book/10.1002/9781119268628 |
|
Model-Based Testing Essentials - Guide to the ISTQ B® Certified Model - Based Tester Foundation Level |
http://onlinelibrary.wiley.com/book/10.1002/9781119130161 |
|
MOOCs: Design, Use and Business Models |
http://onlinelibrary.wiley.com/book/10.1002/9781119081364 |
|
Network Attacks & Exploitation: A Framework |
http://onlinelibrary.wiley.com/book/10.1002/9781119183440 |
|
Network Forensics |
http://onlinelibrary.wiley.com/book/10.1002/9781119329190 |
|
Network Reliability: Measures and Evaluation |
http://onlinelibrary.wiley.com/book/10.1002/9781119224006 |
|
New Challenges for Knowledge: Access and Sharing |
http://onlinelibrary.wiley.com/book/10.1002/9781119378112 |
|
Organizational Design for Knowledge Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119277385 |
|
Penetration Testing Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119419358 |
|
Performance Evaluation by Simulation and Analysiswith Applications to Computer Networks |
http://onlinelibrary.wiley.com/book/10.1002/9781119006190 |
|
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails |
http://onlinelibrary.wiley.com/book/10.1002/9781119183624 |
|
Practical Microcontroller Engineering with ARM® Technology |
http://onlinelibrary.wiley.com/book/10.1002/9781119058397 |
|
Professional AngularJS |
http://onlinelibrary.wiley.com/book/10.1002/9781119209546 |
|
Professional Clojure |
http://onlinelibrary.wiley.com/book/10.1002/9781119281306 |
|
Professional Git |
http://onlinelibrary.wiley.com/book/10.1002/9781119285021 |
|
Professional Hadoop |
http://onlinelibrary.wiley.com/book/10.1002/9781119281320 |
|
Professional Scala |
http://onlinelibrary.wiley.com/book/10.1002/9781119281313 |
|
Programming Multicore and Many-core Computing Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119332015 |
|
Prospective Ergonomics |
http://onlinelibrary.wiley.com/book/10.1002/9781119475149 |
|
Raspberry Pi User Guide 4E |
http://onlinelibrary.wiley.com/book/10.1002/9781119415572 |
|
Reliable JavaScript: How to code safely in the world's most dangerous language |
http://onlinelibrary.wiley.com/book/10.1002/9781119209553 |
|
Secure Connected Objects |
http://onlinelibrary.wiley.com/book/10.1002/9781119426639 |
|
Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119226079 |
|
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges |
http://onlinelibrary.wiley.com/book/10.1002/9781119183617 |
|
Sequencing Apple's DNA |
http://onlinelibrary.wiley.com/book/10.1002/9781119261575 |
|
Service-Oriented Modeling: Service Analysis, Design, and Architecture |
http://onlinelibrary.wiley.com/book/10.1002/9781119198864 |
|
Software Project Estimation: The Fundamentals for Providing High Quality Information to Decision Makers |
http://onlinelibrary.wiley.com/book/10.1002/9781118959312 |
|
Space Strategy |
http://onlinelibrary.wiley.com/book/10.1002/9781119413585 |
|
Spark: Big Data Cluster Computing in Production |
http://onlinelibrary.wiley.com/book/10.1002/9781119254805 |
|
SPSS Statistics for Data Analysis and Visualization |
http://onlinelibrary.wiley.com/book/10.1002/9781119183426 |
|
Supply Chain Management and its Applications in Computer Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119261469 |
|
Swift in the Cloud |
http://onlinelibrary.wiley.com/book/10.1002/9781119201076 |
|
The Antivirus Hacker's Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119183525 |
|
The Art of War in the Network Age: Back to the Future |
http://onlinelibrary.wiley.com/book/10.1002/9781119361312 |
|
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise |
http://onlinelibrary.wiley.com/book/10.1002/9781119310778 |
|
The IEEE Guide to Writing in the Engineering and Technical Fields |
http://onlinelibrary.wiley.com/book/10.1002/9781119070269 |
|
The Image-Interface: Graphical Supports for Visual Information |
http://onlinelibrary.wiley.com/book/10.1002/9781119474166 |
|
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence, 2nd Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119228912 |
|
The Mobile Application Hacker's Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119183655 |
|
The Network Security Test Lab: A Step-by-Step Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119183433 |
|
The Official (ISC)2® Guide to the CCSP® CBK |
http://onlinelibrary.wiley.com/book/10.1002/9781119419198 |
|
The Official (ISC)2® Guide to the SSCP® CBK, Fourth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119419327 |
|
The Official BBC micro:bit User Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119413752 |
|
The Uncertain Digital Revolution |
http://onlinelibrary.wiley.com/book/10.1002/9781119341277 |
|
Transformation of Collective Intelligences: Perspective of Transhumanism |
http://onlinelibrary.wiley.com/book/10.1002/9781119370901 |
|
Wearable Android: Android Wear & Google FIT App Development |
http://onlinelibrary.wiley.com/book/10.1002/9781119051091 |
|
Web Development with jQuery |
http://onlinelibrary.wiley.com/book/10.1002/9781119209430 |
|
WHOIS Running the Internet: Protocol, Policy, and Privacy |
http://onlinelibrary.wiley.com/book/10.1002/9781118985786 |
|
Windows 10 Anniversary Update Bible |
http://onlinelibrary.wiley.com/book/10.1002/9781119416999 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework |
http://onlinelibrary.wiley.com/book/10.1002/9781119183457 |