Title Link
Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data http://onlinelibrary.wiley.com/book/10.1002/9781119010258
Advanced Penetration Testing: Hacking the World's Most Secure Networks http://onlinelibrary.wiley.com/book/10.1002/9781119367741
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams http://onlinelibrary.wiley.com/book/10.1002/9781119183587
Applied Microsoft Business Intelligence http://onlinelibrary.wiley.com/book/10.1002/9781119183570
Artificial Immune System: Applications in Computer Security http://onlinelibrary.wiley.com/book/10.1002/9781119076582
Artificial Neural Network Applications for Software Reliability Prediction http://onlinelibrary.wiley.com/book/10.1002/9781119223931
Asymmetric Alliances Management via Information Systems: Issues and Prospects http://onlinelibrary.wiley.com/book/10.1002/9781119335689
AutoCAD 2017 and AutoCAD LT 2017 Essentials http://onlinelibrary.wiley.com/book/10.1002/9781119415558
AutoCAD and AutoCAD LT Essentials http://onlinelibrary.wiley.com/book/10.1002/9781119414124
Autodesk Revit 2017 for Architecture No Experience Required http://onlinelibrary.wiley.com/book/10.1002/9781119415589
Beginning Android Programming with Android Studio http://onlinelibrary.wiley.com/book/10.1002/9781119419334
Beginning Java Programming: The Object-Oriented Approach http://onlinelibrary.wiley.com/book/10.1002/9781119209416
Beginning JavaScript, 5th Edition http://onlinelibrary.wiley.com/book/10.1002/9781119209423
Beginning Software Engineering http://onlinelibrary.wiley.com/book/10.1002/9781119209515
Belief and Misbelief Asymmetry on the Internet http://onlinelibrary.wiley.com/book/10.1002/9781119261544
Beyond Cybersecurity: Protecting Your Digital Business http://onlinelibrary.wiley.com/book/10.1002/9781119055228
Big Data MBA: Driving Business Strategies with Data Science http://onlinelibrary.wiley.com/book/10.1002/9781119238881
Brain-Computer Interfaces 2: Technology and Applications http://onlinelibrary.wiley.com/book/10.1002/9781119332428
Building Responsive Data Visualization for the Web http://onlinelibrary.wiley.com/book/10.1002/9781119209560
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide http://onlinelibrary.wiley.com/book/10.1002/9781119419372
CISA - Certified Information Systems Auditor Study Guide, Fourth Edition http://onlinelibrary.wiley.com/book/10.1002/9781119419211
Cloud Computing - Business Trends and Technologies http://onlinelibrary.wiley.com/book/10.1002/9781118736074
Cloud Services, Networking, and Management http://onlinelibrary.wiley.com/book/10.1002/9781119042655
COBOL Software Modernization http://onlinelibrary.wiley.com/book/10.1002/9781119073147
Cognitive Computing and Big Data Analytics http://onlinelibrary.wiley.com/book/10.1002/9781119183648
Collaborative Annotation for Reliable Natural Language Processing: Technical and Sociological Aspects http://onlinelibrary.wiley.com/book/10.1002/9781119306696
Collective Intelligence and Digital Archives: Towards Knowledge Ecosystem http://onlinelibrary.wiley.com/book/10.1002/9781119384694
Communication Practices in Engineering, Manufacturing, and Research for Food and Water Safety http://onlinelibrary.wiley.com/book/10.1002/9781118886373
Content Delivery Networks: Fundamentals, Design, and Evolution http://onlinelibrary.wiley.com/book/10.1002/9781119249924
Cyber-Risk Informatics: Engineering Evaluation with Data Science http://onlinelibrary.wiley.com/book/10.1002/9781119087540
Cybersecurity Law http://onlinelibrary.wiley.com/book/10.1002/9781119231899
Data as a Service: A Framework for Providing Reusable Enterprise Data Services http://onlinelibrary.wiley.com/book/10.1002/9781119055143
Data Mining and Learning Analytics: Applications in Educational Research http://onlinelibrary.wiley.com/book/10.1002/9781118998205
Data Mining and Machine Learning in Building Energy Analysis: Towards High Performance Computing http://onlinelibrary.wiley.com/book/10.1002/9781118577691
Data Science & Big Data Analytics:nalyzing, Visualizing and Presenting Data http://onlinelibrary.wiley.com/book/10.1002/9781119183686
Decision-Making and the Information System http://onlinelibrary.wiley.com/book/10.1002/9781119102663
Designing Interactive Hypermedia Systems http://onlinelibrary.wiley.com/book/10.1002/9781119388272
Digital Transformation: Information System Governance http://onlinelibrary.wiley.com/book/10.1002/9781119377986
DNS Security Management http://onlinelibrary.wiley.com/book/10.1002/9781119328292
E-mail and Behavioral Changes: Uses and Misuses of Electronic Communications http://onlinelibrary.wiley.com/book/10.1002/9781119285106
Enablers for Smart Cities http://onlinelibrary.wiley.com/book/10.1002/9781119329954
Enterprise Content and Search Management for Building Digital Platforms http://onlinelibrary.wiley.com/book/10.1002/9781119206842
ERP and Information Systems: Integration or Disintegration http://onlinelibrary.wiley.com/book/10.1002/9781119232643
Evolutionary Algorithms http://onlinelibrary.wiley.com/book/10.1002/9781119136378
Evolutionary Computation in Gene Regulatory Network Research http://onlinelibrary.wiley.com/book/10.1002/9781119079453
Excel 2016 Power Programming with VBA http://onlinelibrary.wiley.com/book/10.1002/9781119415503
Expert Android Studio http://onlinelibrary.wiley.com/book/10.1002/9781119419310
Foundations of Coding: Compression, Encryption, Error Correction http://onlinelibrary.wiley.com/book/10.1002/9781119005940
From Big Data to Smart Data http://onlinelibrary.wiley.com/book/10.1002/9781119116189
From Photon to Pixel: The Digital Camera Handbook http://onlinelibrary.wiley.com/book/10.1002/9781119238447
Functional Software Size Measurement Methodologywith Effort Estimation and Performance Indication http://onlinelibrary.wiley.com/book/10.1002/9781119238126
Fundamentals of Big Data Network Analysis for Research and Industry http://onlinelibrary.wiley.com/book/10.1002/9781119015451
Games with a Purpose (GWAPS) http://onlinelibrary.wiley.com/book/10.1002/9781119136309
Graph Analysis and Visualization:iness Opportunity in Linked Data http://onlinelibrary.wiley.com/book/10.1002/9781119183662
Hacking the Hacker: Learn From the Experts Who Take Down Hackers http://onlinelibrary.wiley.com/book/10.1002/9781119396260
Incremental Software Architecture: A Method for Saving Failing IT Implementations http://onlinelibrary.wiley.com/book/10.1002/9781119125365
Information and Knowledge Systems http://onlinelibrary.wiley.com/book/10.1002/9781119116165
Information and Recommender Systems http://onlinelibrary.wiley.com/book/10.1002/9781119102779
Information Warfare, 2nd edition http://onlinelibrary.wiley.com/book/10.1002/9781119004721
Interactions on Digital Tablets in the Context of3D Geometry Learning: Contributions and Assessments http://onlinelibrary.wiley.com/book/10.1002/9781119330288
Introduction to Lattice Theory with Computer Science Applications http://onlinelibrary.wiley.com/book/10.1002/9781119069706
Introduction to Network Security: Theory and Practice http://onlinelibrary.wiley.com/book/10.1002/9781119113102
Java Programming 24-Hour Trainer, Second Edition http://onlinelibrary.wiley.com/book/10.1002/9781119209522
JMP Connections: The Art of Utilizing Connections In Your Data http://onlinelibrary.wiley.com/book/10.1002/9781119453680
Large-Scale Distributed Systems and Energy Efficiency: A Holistic View http://onlinelibrary.wiley.com/book/10.1002/9781118981122
Lean Computing for the Cloud http://onlinelibrary.wiley.com/book/10.1002/9781119232353
Learning Computer Architecture with Raspberry Pi ( US) http://onlinelibrary.wiley.com/book/10.1002/9781119415534
Linux Bible, Ninth Edition http://onlinelibrary.wiley.com/book/10.1002/9781119209539
Linux Command Line and Shell Scripting Bible, Third Edition http://onlinelibrary.wiley.com/book/10.1002/9781119209409
Linux Server Security: Hack and Defend http://onlinelibrary.wiley.com/book/10.1002/9781119283096
Machine Learning in Python:for Predictive Analysis http://onlinelibrary.wiley.com/book/10.1002/9781119183600
Mastering AutoCAD 2017 and AutoCAD LT 2017 http://onlinelibrary.wiley.com/book/10.1002/9781119415510
Mastering AutoCAD and AutoCAD LT http://onlinelibrary.wiley.com/book/10.1002/9781119414179
Mastering Autodesk Revit 2017 for Architecture http://onlinelibrary.wiley.com/book/10.1002/9781119415565
Mastering Autodesk Revit 2018 http://onlinelibrary.wiley.com/book/10.1002/9781119414315
Medical Information Systems Ethics http://onlinelibrary.wiley.com/book/10.1002/9781119178224
Memory and Action Selection in Human-Machine Interaction http://onlinelibrary.wiley.com/book/10.1002/9781119268628
Model-Based Testing Essentials - Guide to the ISTQ B® Certified Model - Based Tester Foundation Level http://onlinelibrary.wiley.com/book/10.1002/9781119130161
MOOCs: Design, Use and Business Models http://onlinelibrary.wiley.com/book/10.1002/9781119081364
Network Attacks & Exploitation: A Framework http://onlinelibrary.wiley.com/book/10.1002/9781119183440
Network Forensics http://onlinelibrary.wiley.com/book/10.1002/9781119329190
Network Reliability: Measures and Evaluation http://onlinelibrary.wiley.com/book/10.1002/9781119224006
New Challenges for Knowledge: Access and Sharing http://onlinelibrary.wiley.com/book/10.1002/9781119378112
Organizational Design for Knowledge Management http://onlinelibrary.wiley.com/book/10.1002/9781119277385
Penetration Testing Essentials http://onlinelibrary.wiley.com/book/10.1002/9781119419358
Performance Evaluation by Simulation and Analysiswith Applications to Computer Networks http://onlinelibrary.wiley.com/book/10.1002/9781119006190
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails http://onlinelibrary.wiley.com/book/10.1002/9781119183624
Practical Microcontroller Engineering with ARM® Technology http://onlinelibrary.wiley.com/book/10.1002/9781119058397
Professional AngularJS http://onlinelibrary.wiley.com/book/10.1002/9781119209546
Professional Clojure http://onlinelibrary.wiley.com/book/10.1002/9781119281306
Professional Git http://onlinelibrary.wiley.com/book/10.1002/9781119285021
Professional Hadoop http://onlinelibrary.wiley.com/book/10.1002/9781119281320
Professional Scala http://onlinelibrary.wiley.com/book/10.1002/9781119281313
Programming Multicore and Many-core Computing Systems http://onlinelibrary.wiley.com/book/10.1002/9781119332015
Prospective Ergonomics http://onlinelibrary.wiley.com/book/10.1002/9781119475149
Raspberry Pi User Guide 4E http://onlinelibrary.wiley.com/book/10.1002/9781119415572
Reliable JavaScript: How to code safely in the world's most dangerous language http://onlinelibrary.wiley.com/book/10.1002/9781119209553
Secure Connected Objects http://onlinelibrary.wiley.com/book/10.1002/9781119426639
Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications http://onlinelibrary.wiley.com/book/10.1002/9781119226079
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges http://onlinelibrary.wiley.com/book/10.1002/9781119183617
Sequencing Apple's DNA http://onlinelibrary.wiley.com/book/10.1002/9781119261575
Service-Oriented Modeling: Service Analysis, Design, and Architecture http://onlinelibrary.wiley.com/book/10.1002/9781119198864
Software Project Estimation: The Fundamentals for Providing High Quality Information to Decision Makers http://onlinelibrary.wiley.com/book/10.1002/9781118959312
Space Strategy http://onlinelibrary.wiley.com/book/10.1002/9781119413585
Spark: Big Data Cluster Computing in Production http://onlinelibrary.wiley.com/book/10.1002/9781119254805
SPSS Statistics for Data Analysis and Visualization http://onlinelibrary.wiley.com/book/10.1002/9781119183426
Supply Chain Management and its Applications in Computer Science http://onlinelibrary.wiley.com/book/10.1002/9781119261469
Swift in the Cloud http://onlinelibrary.wiley.com/book/10.1002/9781119201076
The Antivirus Hacker's Handbook http://onlinelibrary.wiley.com/book/10.1002/9781119183525
The Art of War in the Network Age: Back to the Future http://onlinelibrary.wiley.com/book/10.1002/9781119361312
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise http://onlinelibrary.wiley.com/book/10.1002/9781119310778
The IEEE Guide to Writing in the Engineering and Technical Fields http://onlinelibrary.wiley.com/book/10.1002/9781119070269
The Image-Interface: Graphical Supports for Visual Information http://onlinelibrary.wiley.com/book/10.1002/9781119474166
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence, 2nd Edition http://onlinelibrary.wiley.com/book/10.1002/9781119228912
The Mobile Application Hacker's Handbook http://onlinelibrary.wiley.com/book/10.1002/9781119183655
The Network Security Test Lab: A Step-by-Step Guide http://onlinelibrary.wiley.com/book/10.1002/9781119183433
The Official (ISC)2® Guide to the CCSP® CBK http://onlinelibrary.wiley.com/book/10.1002/9781119419198
The Official (ISC)2® Guide to the SSCP® CBK, Fourth Edition http://onlinelibrary.wiley.com/book/10.1002/9781119419327
The Official BBC micro:bit User Guide http://onlinelibrary.wiley.com/book/10.1002/9781119413752
The Uncertain Digital Revolution http://onlinelibrary.wiley.com/book/10.1002/9781119341277
Transformation of Collective Intelligences: Perspective of Transhumanism http://onlinelibrary.wiley.com/book/10.1002/9781119370901
Wearable Android: Android Wear & Google FIT App Development http://onlinelibrary.wiley.com/book/10.1002/9781119051091
Web Development with jQuery http://onlinelibrary.wiley.com/book/10.1002/9781119209430
WHOIS Running the Internet: Protocol, Policy, and Privacy http://onlinelibrary.wiley.com/book/10.1002/9781118985786
Windows 10 Anniversary Update Bible http://onlinelibrary.wiley.com/book/10.1002/9781119416999
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework http://onlinelibrary.wiley.com/book/10.1002/9781119183457