Title |
Link |
Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119010258 |
Advanced Penetration Testing: Hacking the World's Most Secure Networks |
http://onlinelibrary.wiley.com/book/10.1002/9781119367741 |
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams |
http://onlinelibrary.wiley.com/book/10.1002/9781119183587 |
Applied Microsoft Business Intelligence |
http://onlinelibrary.wiley.com/book/10.1002/9781119183570 |
Artificial Immune System: Applications in Computer Security |
http://onlinelibrary.wiley.com/book/10.1002/9781119076582 |
Artificial Neural Network Applications for Software Reliability Prediction |
http://onlinelibrary.wiley.com/book/10.1002/9781119223931 |
Asymmetric Alliances Management via Information Systems: Issues and Prospects |
http://onlinelibrary.wiley.com/book/10.1002/9781119335689 |
AutoCAD 2017 and AutoCAD LT 2017 Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119415558 |
AutoCAD and AutoCAD LT Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119414124 |
Autodesk Revit 2017 for Architecture No Experience Required |
http://onlinelibrary.wiley.com/book/10.1002/9781119415589 |
Beginning Android Programming with Android Studio |
http://onlinelibrary.wiley.com/book/10.1002/9781119419334 |
Beginning Java Programming: The Object-Oriented Approach |
http://onlinelibrary.wiley.com/book/10.1002/9781119209416 |
Beginning JavaScript, 5th Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209423 |
Beginning Software Engineering |
http://onlinelibrary.wiley.com/book/10.1002/9781119209515 |
Belief and Misbelief Asymmetry on the Internet |
http://onlinelibrary.wiley.com/book/10.1002/9781119261544 |
Beyond Cybersecurity: Protecting Your Digital Business |
http://onlinelibrary.wiley.com/book/10.1002/9781119055228 |
Big Data MBA: Driving Business Strategies with Data Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119238881 |
Brain-Computer Interfaces 2: Technology and Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119332428 |
Building Responsive Data Visualization for the Web |
http://onlinelibrary.wiley.com/book/10.1002/9781119209560 |
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119419372 |
CISA - Certified Information Systems Auditor Study Guide, Fourth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119419211 |
Cloud Computing - Business Trends and Technologies |
http://onlinelibrary.wiley.com/book/10.1002/9781118736074 |
Cloud Services, Networking, and Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119042655 |
COBOL Software Modernization |
http://onlinelibrary.wiley.com/book/10.1002/9781119073147 |
Cognitive Computing and Big Data Analytics |
http://onlinelibrary.wiley.com/book/10.1002/9781119183648 |
Collaborative Annotation for Reliable Natural Language Processing: Technical and Sociological Aspects |
http://onlinelibrary.wiley.com/book/10.1002/9781119306696 |
Collective Intelligence and Digital Archives: Towards Knowledge Ecosystem |
http://onlinelibrary.wiley.com/book/10.1002/9781119384694 |
Communication Practices in Engineering, Manufacturing, and Research for Food and Water Safety |
http://onlinelibrary.wiley.com/book/10.1002/9781118886373 |
Content Delivery Networks: Fundamentals, Design, and Evolution |
http://onlinelibrary.wiley.com/book/10.1002/9781119249924 |
Cyber-Risk Informatics: Engineering Evaluation with Data Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119087540 |
Cybersecurity Law |
http://onlinelibrary.wiley.com/book/10.1002/9781119231899 |
Data as a Service: A Framework for Providing Reusable Enterprise Data Services |
http://onlinelibrary.wiley.com/book/10.1002/9781119055143 |
Data Mining and Learning Analytics: Applications in Educational Research |
http://onlinelibrary.wiley.com/book/10.1002/9781118998205 |
Data Mining and Machine Learning in Building Energy Analysis: Towards High Performance Computing |
http://onlinelibrary.wiley.com/book/10.1002/9781118577691 |
Data Science & Big Data Analytics:nalyzing, Visualizing and Presenting Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119183686 |
Decision-Making and the Information System |
http://onlinelibrary.wiley.com/book/10.1002/9781119102663 |
Designing Interactive Hypermedia Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119388272 |
Digital Transformation: Information System Governance |
http://onlinelibrary.wiley.com/book/10.1002/9781119377986 |
DNS Security Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119328292 |
E-mail and Behavioral Changes: Uses and Misuses of Electronic Communications |
http://onlinelibrary.wiley.com/book/10.1002/9781119285106 |
Enablers for Smart Cities |
http://onlinelibrary.wiley.com/book/10.1002/9781119329954 |
Enterprise Content and Search Management for Building Digital Platforms |
http://onlinelibrary.wiley.com/book/10.1002/9781119206842 |
ERP and Information Systems: Integration or Disintegration |
http://onlinelibrary.wiley.com/book/10.1002/9781119232643 |
Evolutionary Algorithms |
http://onlinelibrary.wiley.com/book/10.1002/9781119136378 |
Evolutionary Computation in Gene Regulatory Network Research |
http://onlinelibrary.wiley.com/book/10.1002/9781119079453 |
Excel 2016 Power Programming with VBA |
http://onlinelibrary.wiley.com/book/10.1002/9781119415503 |
Expert Android Studio |
http://onlinelibrary.wiley.com/book/10.1002/9781119419310 |
Foundations of Coding: Compression, Encryption, Error Correction |
http://onlinelibrary.wiley.com/book/10.1002/9781119005940 |
From Big Data to Smart Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119116189 |
From Photon to Pixel: The Digital Camera Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119238447 |
Functional Software Size Measurement Methodologywith Effort Estimation and Performance Indication |
http://onlinelibrary.wiley.com/book/10.1002/9781119238126 |
Fundamentals of Big Data Network Analysis for Research and Industry |
http://onlinelibrary.wiley.com/book/10.1002/9781119015451 |
Games with a Purpose (GWAPS) |
http://onlinelibrary.wiley.com/book/10.1002/9781119136309 |
Graph Analysis and Visualization:iness Opportunity in Linked Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119183662 |
Hacking the Hacker: Learn From the Experts Who Take Down Hackers |
http://onlinelibrary.wiley.com/book/10.1002/9781119396260 |
Incremental Software Architecture: A Method for Saving Failing IT Implementations |
http://onlinelibrary.wiley.com/book/10.1002/9781119125365 |
Information and Knowledge Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119116165 |
Information and Recommender Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119102779 |
Information Warfare, 2nd edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119004721 |
Interactions on Digital Tablets in the Context of3D Geometry Learning: Contributions and Assessments |
http://onlinelibrary.wiley.com/book/10.1002/9781119330288 |
Introduction to Lattice Theory with Computer Science Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119069706 |
Introduction to Network Security: Theory and Practice |
http://onlinelibrary.wiley.com/book/10.1002/9781119113102 |
Java Programming 24-Hour Trainer, Second Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209522 |
JMP Connections: The Art of Utilizing Connections In Your Data |
http://onlinelibrary.wiley.com/book/10.1002/9781119453680 |
Large-Scale Distributed Systems and Energy Efficiency: A Holistic View |
http://onlinelibrary.wiley.com/book/10.1002/9781118981122 |
Lean Computing for the Cloud |
http://onlinelibrary.wiley.com/book/10.1002/9781119232353 |
Learning Computer Architecture with Raspberry Pi ( US) |
http://onlinelibrary.wiley.com/book/10.1002/9781119415534 |
Linux Bible, Ninth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209539 |
Linux Command Line and Shell Scripting Bible, Third Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119209409 |
Linux Server Security: Hack and Defend |
http://onlinelibrary.wiley.com/book/10.1002/9781119283096 |
Machine Learning in Python:for Predictive Analysis |
http://onlinelibrary.wiley.com/book/10.1002/9781119183600 |
Mastering AutoCAD 2017 and AutoCAD LT 2017 |
http://onlinelibrary.wiley.com/book/10.1002/9781119415510 |
Mastering AutoCAD and AutoCAD LT |
http://onlinelibrary.wiley.com/book/10.1002/9781119414179 |
Mastering Autodesk Revit 2017 for Architecture |
http://onlinelibrary.wiley.com/book/10.1002/9781119415565 |
Mastering Autodesk Revit 2018 |
http://onlinelibrary.wiley.com/book/10.1002/9781119414315 |
Medical Information Systems Ethics |
http://onlinelibrary.wiley.com/book/10.1002/9781119178224 |
Memory and Action Selection in Human-Machine Interaction |
http://onlinelibrary.wiley.com/book/10.1002/9781119268628 |
Model-Based Testing Essentials - Guide to the ISTQ B® Certified Model - Based Tester Foundation Level |
http://onlinelibrary.wiley.com/book/10.1002/9781119130161 |
MOOCs: Design, Use and Business Models |
http://onlinelibrary.wiley.com/book/10.1002/9781119081364 |
Network Attacks & Exploitation: A Framework |
http://onlinelibrary.wiley.com/book/10.1002/9781119183440 |
Network Forensics |
http://onlinelibrary.wiley.com/book/10.1002/9781119329190 |
Network Reliability: Measures and Evaluation |
http://onlinelibrary.wiley.com/book/10.1002/9781119224006 |
New Challenges for Knowledge: Access and Sharing |
http://onlinelibrary.wiley.com/book/10.1002/9781119378112 |
Organizational Design for Knowledge Management |
http://onlinelibrary.wiley.com/book/10.1002/9781119277385 |
Penetration Testing Essentials |
http://onlinelibrary.wiley.com/book/10.1002/9781119419358 |
Performance Evaluation by Simulation and Analysiswith Applications to Computer Networks |
http://onlinelibrary.wiley.com/book/10.1002/9781119006190 |
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails |
http://onlinelibrary.wiley.com/book/10.1002/9781119183624 |
Practical Microcontroller Engineering with ARM® Technology |
http://onlinelibrary.wiley.com/book/10.1002/9781119058397 |
Professional AngularJS |
http://onlinelibrary.wiley.com/book/10.1002/9781119209546 |
Professional Clojure |
http://onlinelibrary.wiley.com/book/10.1002/9781119281306 |
Professional Git |
http://onlinelibrary.wiley.com/book/10.1002/9781119285021 |
Professional Hadoop |
http://onlinelibrary.wiley.com/book/10.1002/9781119281320 |
Professional Scala |
http://onlinelibrary.wiley.com/book/10.1002/9781119281313 |
Programming Multicore and Many-core Computing Systems |
http://onlinelibrary.wiley.com/book/10.1002/9781119332015 |
Prospective Ergonomics |
http://onlinelibrary.wiley.com/book/10.1002/9781119475149 |
Raspberry Pi User Guide 4E |
http://onlinelibrary.wiley.com/book/10.1002/9781119415572 |
Reliable JavaScript: How to code safely in the world's most dangerous language |
http://onlinelibrary.wiley.com/book/10.1002/9781119209553 |
Secure Connected Objects |
http://onlinelibrary.wiley.com/book/10.1002/9781119426639 |
Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications |
http://onlinelibrary.wiley.com/book/10.1002/9781119226079 |
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges |
http://onlinelibrary.wiley.com/book/10.1002/9781119183617 |
Sequencing Apple's DNA |
http://onlinelibrary.wiley.com/book/10.1002/9781119261575 |
Service-Oriented Modeling: Service Analysis, Design, and Architecture |
http://onlinelibrary.wiley.com/book/10.1002/9781119198864 |
Software Project Estimation: The Fundamentals for Providing High Quality Information to Decision Makers |
http://onlinelibrary.wiley.com/book/10.1002/9781118959312 |
Space Strategy |
http://onlinelibrary.wiley.com/book/10.1002/9781119413585 |
Spark: Big Data Cluster Computing in Production |
http://onlinelibrary.wiley.com/book/10.1002/9781119254805 |
SPSS Statistics for Data Analysis and Visualization |
http://onlinelibrary.wiley.com/book/10.1002/9781119183426 |
Supply Chain Management and its Applications in Computer Science |
http://onlinelibrary.wiley.com/book/10.1002/9781119261469 |
Swift in the Cloud |
http://onlinelibrary.wiley.com/book/10.1002/9781119201076 |
The Antivirus Hacker's Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119183525 |
The Art of War in the Network Age: Back to the Future |
http://onlinelibrary.wiley.com/book/10.1002/9781119361312 |
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise |
http://onlinelibrary.wiley.com/book/10.1002/9781119310778 |
The IEEE Guide to Writing in the Engineering and Technical Fields |
http://onlinelibrary.wiley.com/book/10.1002/9781119070269 |
The Image-Interface: Graphical Supports for Visual Information |
http://onlinelibrary.wiley.com/book/10.1002/9781119474166 |
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence, 2nd Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119228912 |
The Mobile Application Hacker's Handbook |
http://onlinelibrary.wiley.com/book/10.1002/9781119183655 |
The Network Security Test Lab: A Step-by-Step Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119183433 |
The Official (ISC)2® Guide to the CCSP® CBK |
http://onlinelibrary.wiley.com/book/10.1002/9781119419198 |
The Official (ISC)2® Guide to the SSCP® CBK, Fourth Edition |
http://onlinelibrary.wiley.com/book/10.1002/9781119419327 |
The Official BBC micro:bit User Guide |
http://onlinelibrary.wiley.com/book/10.1002/9781119413752 |
The Uncertain Digital Revolution |
http://onlinelibrary.wiley.com/book/10.1002/9781119341277 |
Transformation of Collective Intelligences: Perspective of Transhumanism |
http://onlinelibrary.wiley.com/book/10.1002/9781119370901 |
Wearable Android: Android Wear & Google FIT App Development |
http://onlinelibrary.wiley.com/book/10.1002/9781119051091 |
Web Development with jQuery |
http://onlinelibrary.wiley.com/book/10.1002/9781119209430 |
WHOIS Running the Internet: Protocol, Policy, and Privacy |
http://onlinelibrary.wiley.com/book/10.1002/9781118985786 |
Windows 10 Anniversary Update Bible |
http://onlinelibrary.wiley.com/book/10.1002/9781119416999 |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework |
http://onlinelibrary.wiley.com/book/10.1002/9781119183457 |