Libraff
Contacts
Search
Libraff
Search
3C Vision
Sented by Shon
A Beginner's Guide to Data Agglomeration and Intelligent Sensing
Sented by Christopher
A Practical Guide to SysML: The Systems Modeling Language (The MK/OMG Press)
Sented by Musa
Adaptive Mobile Computing
Sented by Luis
Advanced Graphics Programming Using OpenGL (The Morgan Kaufmann Series in Computer Graphics)
Sented by Steve Bark
Advanced Machine Vision Paradigms for Medical Image Analysis
Sented by Emma
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
Sented by Carlos
Advances in GPU Research and Practice
Sented by Cameron
Agile Development and Business Goals
Sented by Jacob
An Introduction to Parallel Programming
Sented by Luis
An Introduction to Parallel Programming
Sented by Emma
An Introduction to Ray Tracing (The Morgan Kaufmann Series in Computer Graphics)
Sented by Cameron
An Ontological and Epistemological Perspective of Fuzzy Set Theory
Sented by Musa
Analyzing Social Media Networks with NodeXL: Insights from a Connected World
Sented by Daniel
Analyzing Social Media Networks with NodeXL: Insights from a Connected World
Sented by Shon
Anomaly Detection and Complex Event Processing Over IoT Data Streams
Sented by Jacob
API Design for C++
Sented by Cameron
Application Performance Management (APM) in the Digital Enterprise
Sented by Emma
Applications of Big Data in Healthcare: Theory and Practice
Sented by Christopher
Applications of Computational Intelligence in Multi-Disciplinary Research
Sented by Michael
Applied Biomedical Engineering Using Artificial Intelligence and Cognitive Models
Sented by Shon
Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children
Sented by Michael
Architecture Design for Soft Errors
Sented by Carlos
Architecture of Network Systems (ISSN)
Sented by Jacob
ARM System Developer's Guide: Designing and Optimizing System Software (ISSN)
Sented by Sarah Gerdes
Artificial Intelligence and Machine Learning for EDGE Computing
Sented by Sarah Gerdes
Artificial Intelligence for Healthcare Applications and Management
Sented by Emma
Artificial Intelligence in Data Mining: Theories and Applications
Sented by Rebecca
Artificial Intelligence in Healthcare
Sented by Cameron
Artificial Intelligence to Solve Pervasive Internet of Things Issues
Sented by Carlos
Ascend AI Processor Architecture and Programming
Sented by Luis
ASP.Net Web Developer's Guide
Sented by Rebecca
Beyond the Usability Lab: Conducting Large-scale Online User Experience Studies
Sented by Cameron
Big Data Analytics for Sensor-Network Collected Intelligence (Intelligent Data-Centric Systems: Sensor Collected Intelligence)
Sented by Michael
Big Data's Threat to Liberty: Surveillance, Nudging, and the Curation of Information
Sented by Christopher
Big Data: Principles and Paradigms
Sented by Christopher
Bio-inspired Algorithms for Engineering
Sented by Jacob
Biosignal Processing and Classification Using Computational Learning and Intelligence
Sented by Paul
Bluetooth Application Developer's Guide
Sented by Emma
Botnets
Sented by Daniel
Brave NUI World: Designing Natural User Interfaces for Touch and Gesture
Sented by Christopher
Building a Practical Information Security Program
Sented by Shon
Building Big Data Applications
Sented by Michael
Building Robots with LEGO Mindstorms NXT
Sented by Shon
Building the Agile Enterprise
Sented by Emma
Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)
Sented by Shon
Building Wireless Sensor Networks
Sented by Musa
Business Continuity and Disaster Recovery Planning for IT Professionals
Sented by Daniel
Business Intelligence
Sented by Rebecca
Business Intelligence Strategy and Big Data Analytics: A General Management Perspective
Sented by Michael
Business Modeling
Sented by Michael
Business Process Change: A Business Process Management Guide for Managers and Process Professionals
Sented by Rebecca
Cache and Memory Hierarchy Design
Sented by Sarah Gerdes
Certifiable Software Applications 1
Sented by Rebecca
Certifiable Software Applications 2
Sented by Carlos
Certifiable Software Applications 3: Downward Cycle
Sented by Jacob
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Sented by Luis
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Sented by Rebecca
Classification Techniques for Medical Image Analysis and Computer Aided Diagnosis
Sented by Luis
Cloud Computing: Theory and Practice
Sented by Sarah Gerdes
Coding for Penetration Testers
Sented by Sarah Gerdes
Cognitive Approach to Natural Language Processing
Sented by Carlos
Cognitive Data Models for Sustainable Environment (Cognitive Data Science in Sustainable Computing)
Sented by Christopher
Cognitive Information Systems in Management Sciences (Intelligent Data-Centric Systems: Sensor Collected Intelligence)
Sented by Sarah Gerdes
COLT '89
Sented by Sarah Gerdes
Common LISP: The Language (HP Technologies)
Sented by Christopher
Communication Networking: An Analytical Approach (ISSN)
Sented by Steve Bark
Communications for Control in Cyber Physical Systems
Sented by Musa
Complex Systems and Clouds
Sented by Carlos
Computational Frameworks
Sented by Daniel
Computational Intelligence and Its Applications in Healthcare
Sented by Musa
Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (Intelligent Data-Centric Systems: Sensor Collected Intelligence)
Sented by Steve Bark
Computer and Information Security Handbook
Sented by Paul
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Sented by Cameron
Computer Animation Complete
Sented by Emma
Computer Architecture: A Quantitative Approach (ISSN)
Sented by Steve Bark
Computer Architecture: A Quantitative Approach (ISSN)
Sented by Michael
Computer Networks: A Systems Approach (ISSN)
Sented by Daniel
Computer Networks: A Systems Approach (ISSN)
Sented by Michael
Computer Organization and Design ARM Edition: The Hardware Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design)
Sented by Daniel
Computer Organization and Design MIPS Edition: The Hardware/Software Interface (ISSN)
Sented by Sarah Gerdes
Computer Organization and Design RISC-V Edition: The Hardware Software Interface (ISSN)
Sented by Paul
Computer Organization and Design RISC-V Edition: The Hardware Software Interface (ISSN)
Sented by Emma
Computer Organization and Design, Enhanced
Sented by Jacob
Computer Organization and Design: The Hardware/Software Interface (ISSN)
Sented by Carlos
Computer Systems Performance Evaluation and Prediction
Sented by Michael
Computerization and Controversy
Sented by Carlos
Computers and Conversation (Computers and People Series Higher Education Policy Ser. 11;)
Sented by Rebecca
Computers as Components: Principles of Embedded Computing System Design (ISSN)
Sented by Christopher
Configuring Juniper Networks NetScreen and SSG Firewalls
Sented by Steve Bark
Configuring Microsoft Outlook 2003
Sented by Rebecca
Constraint Processing (The Morgan Kaufmann Series in Artificial Intelligence)
Sented by Jacob
Content Strategy at Work: Real-world Stories to Strengthen Every Interactive Project
Sented by Shon
Contextual Design: Design for Life (Interactive Technologies)
Sented by Cameron
Coordinating User Interfaces for Consistency (Interactive Technologies)
Sented by Carlos
CUDA Application Design and Development
Sented by Rebecca
Curves and Surfaces for CAGD
Sented by Daniel
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Sented by Jacob
Cyber Guerilla
Sented by Emma
Cyber Security Awareness for Accountants and CPAs
Sented by Rebecca