Sunday, April 17, 2011

Buku baru 16

9780310300755 Gifted to lead: The art of leading as a woman in the church Nancy Beach Zondervan 2008
3540756655 Spatial Cognition V: Reasoning, Action, Interaction (Lecture Notes in Computer Science) Thomas Barkowsky, Markus Knauff, Gérard Ligozat, Daniel R. Montello (Editors) Springer 2007
0226534154 How to Lie with Maps Mark Monmonier The University of Chicago Press 1991
0226534030 Coast Lines: How Mapmakers Frame the World and Chart Environmental Change Mark Monmonier The University of Chicago Press 2008
0226534650 From Squaw Tit to Whorehouse Meadow: How Maps Name, Claim, and Inflame Mark Monmonier The University of Chicago Press 2007
0849353408 Root Cause Analysis: Improving Performance for Bottom-Line Results, Third Edition (PLANT ENGINEERING SERIES) Robert J. Latino, Kenneth C. Latino CRC Press 2006
084931318X Root Cause Analysis: Improving Performance for Bottom-Line Results, Second Edition Robert J. Latino, Kenneth Latino CRC Press 2002
3642017851 Corporate Restructuring: From Cause Analysis to Execution David Vance springer 2009
1567932568 Decision Analysis for Healthcare Managers Farrokh Alemi and David H. Gustafson Health Administration Press, Chicago 2007
0884156621 Machinery Failure Analysis and Troubleshooting, 3rd edition (Practical Machinery Management for Process Plants, Volume 2) Heinz P. Bloch, Fred K. Geitner Gulf Professional Publishing 1999
0735622531 The Practical Guide to Defect Prevention (Best Practices) Marc McDonald, Robert Musson, Ross Smith Microsoft Press 2008
0750677252 Maximizing Machinery Uptime, Volume 5 (Practical Machinery Management for Process Plants) Heinz P. Bloch Fred K. Geitner Gulf Professional Publishing 2006
088415663X Major Process Equipment Maintenance and Repair : Practical Machinery Management for Process Plants: Volume 4, Second Edition Heinz P. Bloch Fred K. Geitner Gulf Professional Publishing 2006
1587058847 Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813 (Self-Study Guide) Richard Froom, Balaji Sivasubramanian, Erum Frahim Cisco Press 2010
0470502266 Beginning Visual C# 2010 Karli Watson, Christian Nagel, Jacob Hammer Pedersen, Jon D. Reid, Morgan Skinner Wrox 2010
063121982X Understanding Human Motivation: What Makes People Tick? Donald R. J. Laming Blackwell 2004
0816063354 A Brief History of Canada, 2nd Edition Roger E. Riendeau Facts On File 2007
0789495619 Canada (Eyewitness Travel Guides) (2002) DK Publishing Dorling Kindersley Limited 2006
0816639248 Ephemeral Territories: Representing Nation, Home, and Identity in Canada Erin Manning University of Minnesota Press 2003
0415181666 The House of Difference: Cultural Politics and National Identity in Canada (Studies in Culture and Communication) Eva Mackey Routledge 1999
0262194767 Leonardo's Laptop: Human Needs and the New Computing Technologies Ben Shneiderman MIT Press 2002
0123822297 Analyzing Social Media Networks with NodeXL: Insights from a Connected World Derek Hansen, Ben Shneiderman, Marc A. Smith Morgan Kaufmann 2011
1584503130 Human Aspects of Software Engineering (Electrical and Computer Engineering Series) James E. Tomayko,Orit Hazzan,J. E. Tomayko Charles River Media 30 June, 2004
1558609156 The Craft of Information Visualization: Readings and Reflections (Interactive Technologies) Benjamin B. Bederson, Ben Shneiderman Morgan Kaufmann Publishers 2003
184628340X Information Visualization: Beyond the Horizon 2nd Ed. Chaomei Chen Springer 2006
0471492787 Interaction Design: Beyond Human-Computer Interaction Jenny Preece, Yvonne Rogers, Helen Sharp Wiley 2002
1565923510 Web Navigation: Designing the User Experience Jennifer Fleming O'Reilly 1998
0131538446 Management Information Systems: Managing the Digital Firm, 9th Edition [CDROM] Kenneth C. Laudon, Jane Price Laudon, Prentice Hall 2005
076196262X Interpreting Quantitative Data David Byrne Sage Publications 2002
Cisco Ccna Exploration 4.0 Netwroking Fundamentals Student Lab Manual Cisco Systems Cisco Press 2007
1587132540 CCNA Exploration Course Booklet: LAN Switching and Wireless, Version 4.0 Cisco Networking Academy Cisco Press 2010
9781430218159 Learn Objective-C on the Mac Mark Dalrymple, Scott Knaster Apress 2009
Using ADX to Trade Breakouts, Pullbacks, and Reversal Patterns in the Mini-sized Dow (Seminar Presentation) Dr. Charles B. Schaap CBOT Webinar 2006
0823218724 Poetics of Imagining: Modern to Post-modern (Perspectives in Continental Philosophy) Richard Kearney Edinburgh University Press 1998
0803976003 Deleuze and Guattari: An Introduction to the Politics of Desire Theory, Culture & Society Philip Goodchild Sage Publication 1996
Heidegger et la question de Dieu Richard Kearney & Joseph S. O’Leary. Bernard Grasset 1980
0415247985 On Stories Richard Kearney Routledge 2002
9780754667018 Phenomenology and Eschatology John Panteleimon Manoussakis Ashgate 2009
1573926108 Poetics of Modernity: Toward a Hermeneutic Imagination Richard Kearney Humanity Books 1999
9780804700788 Radical Atheism: Derrida and the Time of Life Martin Hägglund Stanford University Press 2008
0415272580 Strangers, Gods and Monsters: Interpreting Otherness Richard Kearney Routledge 2003
0415119502 The Wake of Imagination Richard Kearney Routledge 1988
0810123789 Traversing the Imaginary: Richard Kearney and the Postmodern Challenge Edited by Peter Gratton and John Panteleimon Manoussakis Foreword by Richard Kearney Northwestern University Press 2007
0195074343 Mircea Eliade's Vision for a New Humanism David Cave Oxford University Press 1993
1557865655 Deleuze: A Critical Reader Paul Patton Blackwell Publishers 1996
0816621616 Gilles Deleuze : An Apprenticeship in Philosophy Michael Hardt University of Minnesota Press 1993
9780748632886 Deleuze and Politics Ian Buchanan and Nicholas Thoburn Edinburgh University Press 2008
NexusDB V3 Manual (2in1) Nexus Database Systems PTY LTD Nexus Database Systems PTY LTD 2009
NexusDB V3 Manual (4in1) Nexus Database Systems PTY LTD Nexus Database Systems PTY LTD 2009
0812570944 What Dreams May Come: A Novel Richard Matheson A Tor Book
9780470393505 52 Weeks of Sales Success : America’s #1 Salesman Shows You How to Send Sales Soaring!, Second Edition Ralph R. Roberts, with Joe Kraynak Wiley 2009
0226534677 No Dig, No Fly, No Go: How Maps Restrict and Control Mark Monmonier The University of Chicago Press 2010
1879102625 Modeling Our World: The ESRI Guide to Geodatabase Design Michael Zeiler Environmental Systems Research Institute, Inc. 1999
1589480007 Exploring ArcObjects (Two Volume Set) Michael Zeiler ESRI 2001
1879102935 Getting Started with ArcGIS Bob Booth, Andy Mitchell ESRI 2001
0470870001 Geographic Information Systems and Science, 2nd Edition Paul Longley, Michael F. Goodchild, David Maguire, David Rhind Wiley 2005
1589481089 Using ArcGIS Survey Analyst: ArcGIS 9 ESRI Press ESRI Press (Editor) Editors of Esri Press (Editor) ESRI 2002
ArcGIS9: ArcGIS Spatial Analyst Tutorial Editors of ESRI Press ESRI 2006
9781589481091 Using ArcGIS Tracking Analyst: ArcGIS 9 ESRI Press TASC - ESRI 2002
1589481070 Using ArcScan for ArcGIS: ArcGIS 9 ESRI Press ESRI Press (Editor) Editors of Esri Press (Editor) ESRI 2002
1589480929 Geoprocessing in ArcGIS: ArcGIS 9 Editors of ESRI Press ESRI 2004
1589481321 What Is ArcGIS 9.1? ESRI Press ESRI 2005
1450597262 Delphi 2010 Handbook: A Guide to the New Features of Delphi 2010 Marco Cantù CreateSpace 2010
0471326429 Propulsion Elements, 7th Edition George P. Sutton Oscar Biblarz Wiley 2001
0980459974 ITIL IT Service Management -100 Most Asked questions on IT Service Management and ITIL Foundation Certification, Training and Exams Gerard Blokdijk Emereo Pty Limited 2008
0470055189 Financial Analysis: A Controller's Guide Steven M. Bragg Wiley 2007
0596801912 Head First PMP: A Brain-Friendly Guide to Passing the Project Management Professional Exam, 2nd edition Jennifer Greene, Andrew Stellman O'Reilly Media, Inc. 2009
0132447290 The Secrets of Economic Indicators: Hidden Clues to Future Economic Trends and Investment Opportunities, 2nd Edition Bernard Baumohl Wharton School Publishing 2008
0471651494 Power Up Your Profits: 31 Days to Better Selling Troy Waugh Wiley 2005
0195099966 Sun Tzu and the Art of Business: Six Strategic Principles for Managers Mark R. McNeilly Oxford University Press 1996
1580627765 Sun Tzu For Success: How to Use the Art of War to Master Challenges and Accomplish the Important Goals in Your Life Gerald Michaelson, Steven Michaelson, Sun-tzu Adams Media 2003
0471023337 The Mahalanobis-Taguchi Strategy~A Pattern Technology System Genichi Taguchi, Rajesh Jugulum Wiley 2002
0915299038 A Revolution in Manufacturing: The SMED System Andrew P. Dillon, Shigeo Shingo Productivity Press 1985
0471348740 STATISTICAL ANALYSIS WITH ARCVIEW GIS JAY LEE, DAVID W. S. WONG Wiley 2001
0415991455 Doing Action Research in English Language Teaching: A Guide for Practitioners (ESL & Applied Linguistics Professional Series) Routledge 2009
0805852581 Methods of Research on Teaching the English Language Arts: The Methodology Chapters From the Handbook of Research on Teaching the English Language Arts, ... & National Council of Teachers of English James Flood, Diane Lapp, James R. Squire, Julie Jensen Lawrence Erlbaum Associates 2005
0521004403 Methodology in Language Teaching: An Anthology of Current Practice Jack C. Richards, Willy A. Renandya Cambridge University Press 2002
1847194060 Selling Online with Drupal e-Commerce: Walk through the creation of an online store with Drupal's e-Commerce module (From Technologies to Solutions) Michael Peacock Packt Publishing 2008
"087263468X/
0442237294" A Primer on the Taguchi Method Society of Manufacturing Ranjit Roy Van Nostrand Reinhold 1990
0415464455 Going Beyond the Theory/Practice Divide in Early Childhood Education : Introducing an intra-active pedagogy Hillevi Lenz Taguchi Routledge 2010
1574443216 Advanced Quality Function Deployment Fiorenzo Franceschini CRC Press 2002
0470386819 Balanced Scorecards & Operational Dashboards with Microsoft Excel Ron Person Wiley 2009
Financial Alchemy : Twelve Months of Magic and Manifestation Version 7 Morgana Rae Charmed Life Coaching 2009
Optimum Anabolics : Steroid Sized Muscles Through Natural Hormone Programming Jeff Anderson CQC International 2004
007146297X TOEFL iBT: The Official ETS Study Guide (McGraw-Hill's TOEFL iBT) Educational Testing Service McGraw-Hill 2006
Layman's Guides to Steroids I Mick Hart Mick Hart Training Systems 2000
Layman's Guides to Steroids II Mick Hart Mick Hart Training Systems 2000
Layman's Guides to Steroids episode III - Return of the Syringe Mick Hart Mick Hart Training Systems 2000
0130912972 Quality Software Project Management Robert T. Futrell, Donald F. Shafer, Linda I. Safer Prentice Hall PTR 2002
Optimum Anabolics : The Workout Jeff Anderson CQC International 2004
B000RBZ5CA Molecular Nutrition Anabolics Book 9th Edition: 2009 William Llewellyn Molecular Nutrition 2009
0965310701 Underground Bodyopus-Militant Weight Loss & Recomposition Dan Duchain
1574446479 Standard Handbook of Chains : Chains for Power Transmission and Material Handling, Second Edition (Dekker Mechanical Engineering) American Chain Association CRC Press 2006
0071384219 Standard Handbook of Electronic Engineering, Fifth Edition Donald Christiansen Charles K. Alexander Ronald Jurgen McGraw-Hill 2004
9781847199201 Drupal e-commerce with Ubercart 2.x George Papadongonas, Yiannis Doxaras Packt Publishing 2010
0321011473 Influence : Science and Practice, Fourth Edition (Influence The Art of Persuasion) Robert B. Cialdini Allyn and Bacon 2001
A Lady of Persuasion Tessa Dare
143022925X PHP Objects, Patterns, and Practice, Third Edition Matt Zandstra Apress 2010
0971370583 Totally Organic Hydroponics (Sea of Green, Volume 2) Paul Wright Tin Alley Productions 2004
1605662429 Handbook of Research on Innovations in Database Technologies and Applications: Current and Future Trends Viviana E. Ferraggine, Jorge H. Doorn, Laura C. Rivero Information Science Reference 2009
0470049774 Value Averaging: The Safe and Easy Strategy for Higher Investment Returns (Wiley Investment Classics) Michael E. Edleson Wiley 1993
0226143147 Given Time: I. Counterfeit Money Jacques Derrida University Of Chicago Press 1994
0226142817 The Work of Mourning Jacques Derrida University Of Chicago Press 2003
0631226524 Arguing with Derrida Simon Glendinning Blackwell 2001
0312296118 Deconstructing Derrida: Tasks for the New Humanities Peter Pericles Trifonas & Michael A. Peters Palgrave Macmillan 2005
0415030943 Continental Philosophy II : Derrida and Deconstruction Hugh J. Silverman Routledge 1989
9781845532765 Derrida on Religion: Thinker of Difference Dawne McCance Equinox 2009
0415430917 Derrida on Time Joanna Hodge Taylor & Francis 2007
0521405394 Derrida, Heidegger, Blanchot: Sources of Derrida’s Notion and Practice of Literature Timothy Clark Cambridge University Press 1992


Targeting Regional Economic Development (Routledge Studies in Global Competition) Stephan J. Goetz, Steven Deller, Tom Harris Routledge 2009-07-06 03:30 Culture, Spirituality and Economic Development W. F. Ryan, W. F. Ryan SJ IDRC (International Development Research Cent 2009-07-06 04:03 Native Pathways: American Indian Culture And Economic Development In The Twentieth Century Brian C. Hosmer, Colleen O'Neill, Donald L. Fixico University Press of Colorado 2009-09-23 10:10 Agriculture in China's Modern Economic Development Nicholas R. Lardy Cambridge University Press 2010-05-16 19:45 Economic Development of Latin America: Historical Background and Contemporary Problems (Cambridge Latin American Studies) Celso Furtado 2009-12-31 22:00 The Black Homelands of South Africa: The Political and Economic Development of Bophuthatswana and Kwa-Zulu (Perspectives on Southern Africa) Jeffrey Butler Robert I. Rotberg John Adams 2006-11-10 01:19 The Turning Point in China's Economic Development Ross Garnaut (Editor), Ligang Song (Editor) 2006-11-18 18:41 Capital Markets, Globalization, and Economic Development (Innovations in Financial Markets and Institutions) Benton E. Gup (Editor) Economic Development in Africa 2006: Doubling Aid - Making the Big Push Work United Nations Pubns 2007-12-11 11:24 Economic Development: A Regional, Institutional, And Historical Approach Richard Grabowski, Sharmistha Self, Michael P. Shields 2007-12-27 15:23 Information Technology and Economic Development (Premier Reference Source) Yutaka Kurihara, Sadayoshi Takaya, Hisashi Harui, Hiroshi Kamae 2008-07-01 05:00 Economic Development and Export of Human Capital. A Contradiction?: The impact of human capital migration on the economy of sending countries. A case study of Jordan Nadim Zaqqa 2008-08-02 07:29 Central Asia in Transition: Dilemmas of Political and Economic Development Boris Z. Rumer 2008-09-06 09:58 Kondratiev and the Dynamics of Economic Development: Long Cycles and Industrial Growth in Historical Context (Studies in Russian and East European History and Society) Vincent Barnett 2008-09-14 11:12 Multinationals and Economic Development: An Integration of Competing Theories (International Business Series) James C. W. Ahiakpor Routledge 2008-09-23 02:44 State and Society in China's Dem atic Transition: Confucianism, Leninism, and Economic Development (East Asia (New York, N.Y.).) Xiaoqin Guo 2008-09-25 08:00 Critical Perspectives in Politics and Socio-Economic Development in Ghana (African Social Studies Series) (African Social Studies Series) Wisdom Tettey, Korbla P. Puplampu, Bruce J. Berman 2008-10-07 03:29 The Multinational Subsidiary: Management, Economic Development and Public Policy Neil Hood The Arc of Japan's Economic Development Arthur Alexander 2008-10-28 07:49 Creative Cities, Cultural Clusters and Local Economic Development (New Horizons in Regional Science) Philip Cooke, Luciana Lazzeretti 2008-10-28 07:55 The Impact of Economic Development on Rural Women in China: A Report of the United Nations University Household, Gender, and Age Project All-China Women's Federation 2008-11-01 12:29 Local Economic Development: A Geographical Comparison of Rural Community Restructuring Cecily Neil, Markku Tykkylainen 2008-11-07 04:57 The Information Technology Revolution and Economic Development (World Bank Discussion Paper) Nagy K. Hanna 2008-12-19 08:06 Environmental Management and Economic Development (World Bank) Gunter Schramm, Jeremy Warford 2008-12-19 08:09 The Contributions of Infrastructure to Economic Development: A Review of Experience and Policy Implications (World Bank Discussion Paper) Christine Kessides World Bank 2008-12-19 08:09 The Civil Service System and Economic Development: The Japanese Experience : Report on an International Colloquium Held in Tokyo, March 22-25, 1994 (Edi Learning Resources Series) Hyung-Ki Kim 2008-12-19 08:11 Enhancing Women's Participation in Economic Development (A World Bank Policy Paper) World Bank Group World Bank Publications 2008-12-19 08:13 Intellectual Property Rights and Economic Development (World Bank Discussion Paper) Carlos Alberto Primo Braga, Carsten Fink, Claudia Paz Sepulveda Technology in the Garden: Research Parks and Regional Economic Development Michael I. Luger, Harvey A. Goldstein 2008-12-30 09:00 Water, Race, and Disease (NBER Series on Long-Term Factors in Economic Development) Werner Troesken The MIT Press 2009-03-04 06:03 Economic Development Within the Philadelphia Metropolitan Area Anita A. Summers Univ of Pennsylvania Pr 2009-03-19 13:17 Acenet: Facilitating Economic Development through Small Business Electronic Commerce Craig Van Slyke, Marcy L. Kittner, France Belanger NetLibrary, Incorporated 2009-05-06 11:04 Petty Capitalists And Globalization: Flexibility, Entrepreneurship, And Economic Development (S U N Y Series in Anthropological Studies of Contemporary Issues) Alan Smart, Josephine Smart State University of New York Press 2009-05-11 08:04 A Survey of Agricultural Economics Literature: Agriculture in Economic Development, 1940s to 1990s Lee R. Martin University of Minnesota Press 2009-05-12 11:41 Urban Policy and Economic Development: An Agenda for the 1990s (World Bank Policy Paper) World Bank World Bank Publications 2009-07-01 02:49 Theory and Practice of Local Governance and Economic Development Mark Considine, Sylvain Giguere Palgrave Macmillan 2009-07-25 04:46 A Fictive People: Antebellum Economic Development and the American Reading Public Ronald J. Zboray Oxford University Press, USA 2009-10-07 04:00 The Economic Development of Medieval Europe Robert-Henri Bautier HBJ College & School Division United States Aid and Indian Economic Development P. T Bauer American Enterprise Association 2010-04-02 04:41 East Asian Visions: Perspectives on Economic Development Indermit Singh Gill, Yukon Huang, Homi J. Kharas World Bank Publications 2010-10-31 10:07 Innovation and Economic Development in Latin America Gabriela Dutrenit, Jorge Katz IQ Testing 101 (Psych 101) Dr. Alan S. Kaufman PhD Springer Publishing Company 2009-10-31 16:29 Arthur Jensen: Consensus And Controversy: Consensus & Controversy (Falmer International Master-Minds Challenged, 4) Sohan Modgil 2008-10-07 02:47 Understanding Environmental Pollution, Third Edition Marquita K. Hill Cambridge University Press 2010-10-11 06:01 Introduction to Modern Liquid Chromatography, Third Edition Lloyd R. Snyder, Joseph J. Kirkland, John W. Dolan Wiley Predicting Market Success: New Ways to Measure Customer Loyalty and Engage Consumers With Your Brand Robert Passikoff 2008-10-07 04:53 Breakthrough Strategies for Predicting any Market: Charting Elliott Wave, Lucas, Fibonacci and Time for Profit Jeff Greenblatt Marketplace Books 2010-10-11 19:23 Trading With The Odds: Using the Power of Statistics to Profit in the futures Market Cynthia Kase 2006-05-09 02:25 Predicting the Markets of Tomorrow: A Contrarian Investment Strategy for the Next Twenty Years James P. O'Shaughnessy Portfolio Hardcover 2009-11-22 02:05 Predict Market Swings With Technical Analysis Michael McDonald Wiley 2006-12-08 22:19 Streetsmart Guide to Timing the Stock Market: When to Buy, Sell and Sell Short Colin Alexander McGraw-Hill 2009-07-06 03:24 TrimTabs Investing: Using Liquidity Theory to Beat the Stock Market Charles Biderman, David Santschi 2007-11-05 09:57 When the Dow Breaks: Insights & Strategies for Protecting Your Profits in a Turbulent Market Donald L. Cassidy 2008-12-19 08:05 Building Real Estate Wealth in a Changing Market: Reap Large Profits from Bargain Purchases in Any Economy John Schaub McGraw-Hill 2009-06-14 09:24 The Little Book of Common Sense Investing: The Only Way to Guarantee Your Fair Share of Stock Market Returns (Little Book Big Profits) John C. Bogle Strategic Marketing Planning (CIM Student) Colin Gilligan Richard M. S. Wilson 2006-11-03 07:41 Constructing Blueprints for Enterprise IT Architectures Bernard H. Boar 2006-10-13 07:23 Year's Best SF 3 DG Hartwell 2007-07-15 23:07 Mavericks at Work: Why the Most Original Minds in Business Win William C. Taylor, Polly G. Labarre 2007-12-05 08:42 Strategy and Performance: Achieving Competitive Advantage in the Global Marketplace Abby Ghobadian, Nicholas O'Regan, David Gallear, Howard Viney 2008-01-10 11:52 The International Journal of Bank Marketing For the financial services sector Bank marketing in the Asia Pacific region (Volume 21 Number 6/7 2003) James Devlin 2008-10-13 08:55 Think India: The Rise of the World's Next Great Power and What It Means for Every American Vinay Rai, William Simon Plume 2009-04-10 06:41 Leading the Revolution Gary Hamel Harvard Business School Press 2009-05-06 09:50 Chaotics: The Business of Managing and Marketing in the Age of Turbulence Philip Kotler, John A. Caslione AMACOM 2009-06-20 19:18 Mavericks at Work: Why the Most Original Minds in Business Win William C. Taylor HarperAudio The Case for Virtual Business Processes : Reduce Costs, Improve Efficiencies, and Focus on Your Core Business (Network Business) Martha Young 2005-12-14 22:40 Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery John Lee Ron Ben-Natan 2006-09-16 22:18 Constructing Blueprints for Enterprise IT Architectures Bernard H. Boar 2006-10-13 07:23 Mavericks at Work: Why the Most Original Minds in Business Win William C. Taylor, Polly G. Labarre 2007-12-05 08:42 No Limit: The Texas Hold'Em Guide to Winning in Business Donald G. Krause, Jeff Carter 2008-04-25 23:19 Adaptation or Expiration in Family Firms: Organizational Flexibility in Emerging Economies Andres Hatum 2008-10-07 03:06 Discount Business Strategy: How the New Market Leaders are Redefining Business Strategy Michael Moesgaard Andersen, Flemming Poulfelt 2008-10-07 05:17 Collaboration With Customers To Innovate: Conceiving and Marketing Products in the Networking Age Emanuela Prandelli, Mohanbir Sawhney, Gianmario Verona 2008-12-01 11:53 Bottom-Line Selling: The Sales Professional's Guide to Improving Customer Profits Jack Malcolm 2008-12-25 05:03 Ugly Americans: The True Story of the Ivy League Cowboys Who Raided the Asian Markets for Millions Ben Mezrich Harper Perennial How to Think Like the World's Greatest Masters of M & A Curt Schleier McGraw-Hill Companies 2009-03-31 12:55 Best Practices: Managing People: Secrets to Leading for New Managers Barry Silverstein Collins Business 2009-04-03 07:47 A Mother for All Seasons: A Memoir Debbie Phelps, Mim Eichler Rivas William Morrow 2009-06-30 20:42 The Money Makers: How Extraordinary Managers Win in a World Turned Upside Down Anne-Marie Fink Crown Business 2009-07-05 10:32 Managing By The Numbers: A Complete Guide To Understanding And Using Your Company's Financials Chuck Kremer, Ron Rizzuto, John Case Basic Books 2009-07-06 03:45 Organizational Learning Capability: Generating and Generalizing Ideas with Impact Arthur K. Yeung, Dave Ulrich, Stephen W. Nason, Mary A. Von Glinow Oxford University Press, USA 2009-09-12 10:26 A Place on the Team: The Triumph and Tragedy of Title IX Welch Suggs Princeton University Press 2009-10-14 03:10 Ugly Americans: The True Story of the Ivy League Cowboys Who Raided the Asian Markets for Millions Ben Mezrich HarperAudio 2009-12-08 06:45 Mavericks at Work: Why the Most Original Minds in Business Win William C. Taylor HarperAudio 2009-12-18 15:44 Unifying Themes in Complex Systems, Volume VI: Proceedings of the Sixth International Conference on Complex Systems Ali A. Minai, Dan Braha, Yaneer Bar-Yam Springer Emanuel Lasker Volumes 2: 1904-1940 Soloviov 2007-03-14 16:05 The Two Knights Defence (Batsford Chess Openings) Alexander Beliavsky, Adrian Mikhalchischin 2008-06-10 09:16 Emanuel Lasker Volumes 1: 1889-1903 [Chess] Soloviov 2007-03-14 16:04 The Chess Games of Adolph Anderssen: Master of Attack Sid Pickard 2007-03-14 16:17 The Benko Gambit Revealed Neil McDonald 2007-03-16 18:36 Dutch Stonewall (Everyman Chess) Jacob Aagaard 2007-11-17 22:24 Combinative Motifs Maxim Blokh ru 2008-05-05 05:46 Chess Informant Chess informant 2008-11-04 06:37 The Scandinavian Defense Michael Melts Russell Enterprises 2009-05-09 08:38 Chess for Zebras: Thinking Differently about Black and White Jonathan Rowson Gambit Publications The End of Time: The Maya Mystery of 2012 Anthony Aveni University Press of Colorado 2010-05-05 07:16 The Book of the Year: A Brief History of Our Seasonal Holidays Anthony F. Aveni 2008-08-10 13:44 Skywatching in the Ancient World: New Perspectives in Cultural Astronomy Studies in Honor of Anthony F. Aveni (Mesoamerican Worlds Series) Clive Ruggles University Press of Colorado 2010-01-20 13:17 The Madrid Codex: New Approaches To Understanding An Ancient Maya Manuscript (Mesoamerican Worlds Series) Gabrielle Vail, Anthony F. Aveni University Press of Colorado 2009-09-23 05:52 Study Abroad and Second Language Use: Constructing the Self Valerie A. Pellegrino Aveni Cambridge University Press 2010-05-27 12:52 Constructing Blueprints for Enterprise IT Architectures Bernard H. Boar 2006-10-13 07:23 Complexity & Paradox (Express Exec) Jim Underwood 2006-12-20 10:21 Star Gods of the Maya: Astronomy in Art, Folklore, and Calendars (The Linda Schele Series in Maya and Pre-Columbian Studies) Susan Milbrath 2008-09-11 16:33 Collaboration With Customers To Innovate: Conceiving and Marketing Products in the Networking Age Emanuela Prandelli, Mohanbir Sawhney, Gianmario Verona 2008-12-01 11:53 2012: Science Or Superstition The Dyslexia Checklist: A Practical Reference for Parents and Teachers (J-B Ed: Checklist) Sandra F. Rief M.A., Judith Stern Jossey-Bass 2010-04-09 13:13 The Gift of Dyslexia: Why Some of the Smartest People Can't Read... and How They Can Learn Ronald D. Davis, Eldon M. Braun Perigee Trade 2010-10-10 00:28 Dyslexia: Students in Need (Dyslexia Series (Whurr)) Pat Heaton, Gina Mitchell 2008-08-05 10:03 Overcoming Dyslexia For Dummies (For Dummies (Health & Fitness)) Tracey Wood 2008-08-16 06:51 What is Dyslexia?: A Book Explaining Dyslexia for Kids and Adults to Use Together Alan M. Hultquist 2008-11-19 06:01 Dyslexia, Learning, and the Brain Roderick I. Nicolson, Angela Fawcett 2008-09-19 13:39 Fifty Years in Dyslexia Research Tim Miles 2007-12-04 04:38 Living With Dyslexia Barbara Riddick 2008-09-22 01:47 Dyslexia, Reading and the Brain: A Sourcebook of Psychological and Biological Research Alan Beaton 2008-09-25 08:13 Dyslexia in Context: Research, Policy and Practice (Dyslexia Series (Whurr)) Gavin Reid, Angela Fawcett Dyslexia: Surviving and Succeeding at College Sylvia Moody 2008-10-13 09:20 Music and Dyslexia: A Positive Approach Tim Miles, John Westcombe, Diana Ditchfield Wiley 2009-02-11 03:55 Identifying, Assessing, and Treating Dyslexia at School (Developmental Psychopathology at School) Catherine Christo, John Davis, Stephen E. Brock Springer 2009-04-23 22:46 The Psychology of Dyslexia: A Handbook for Teachers Michael Thomson Wiley 2009-06-14 07:56 Practical Strategies for Living With Dyslexia Maria Chivers Jessica Kingsley Publishers 2009-08-25 07:52 The Dyslexia-Friendly Primary School: A Practical Guide for Teachers Dr Barbara Pavey Sage Publications Ltd 2009-10-01 02:01 Dyslexia: A Practitioner's Handbook, 4th Edition Gavin Reid Wiley 2009-11-08 14:46 Dyslexia in Children: New Research Christopher B. Hayes, Rodolfo M. Antonello, Carmen Cattaneo, Jean Ecalle Nova Science Publishers 2010-03-07 06:50 Dyslexia in the Foreign Language Classroom (Second Language Acquisition) Joanna Nijakowska Multilingual Matters 2010-06-23 09:15 Dyslexia and Inclusion Classroom Approaches for Assessment, Teaching and Learning Gavin Reid David Fulton Separation of Church and State Philip Hamburger Harvard University Press 2010-02-24 04:23 Please Don't Wish Me a Merry Christmas: A Critical History of the Separation of Church and State (Critical America Series) Stephen Feldman NYU Press 2009-06-25 03:48 First Freedom First: A Citizen's Guide to Protecting Religious Liberty and the Separation of Church and State C. Welton Gaddy, Barry W. Lynn Beacon Press 2009-10-01 02:08 Enantiomer Separation: Fundamentals and Practical Methods (Subcellular Biochemistry) Fumio Toda Springer 2007-11-06 04:45 The No-Cry Separation Anxiety Solution: Gentle Ways to Make Good-bye Easy from Six Months to Six Years Elizabeth Pantley McGraw-Hill 2010-07-19 05:00 Encyclopedia of Separation Science 10 Volume Set Colin F. Poole 2005-08-22 02:34 Solid-Liquid Separation, Fourth Edition Ladislav Svarovsky 2006-05-24 10:29 Nonlinear Source Separation (Synthesis Lectures on Signal Processing) Luis B. Almeida 2008-02-26 14:18 Predicting the Performance of Multistage Separation Processes Fouad M. Khoury 2006-04-10 20:20 Chromatography and Separation Science (SST) (Separation Science and Technology) Satinder Ahuja Thermal Separation Processes: Principles and Design Klaus Sattler, Hans Jacob Feindt 2008-02-12 13:39 Handbook of Separation Process Technology Ronald W. Rousseau 2006-04-13 01:18 Liquid Membranes: Principles and Applications in Chemical Separations and Wastewater Treatment Vladimir S Kislik I Elsevier Science 2009-10-24 07:48 The Separation of Powers and Legislative Interference in Judicial Process: Constitutional Principles and Limitations Peter Gerangelos Hart Publishing (UK) 2010-01-12 05:28 Supercritical Fluid Extraction: Principles and Practice (Butterworth-Heinemann Series in Chemical Engineering) Mark A. McHugh Val J. Krukonis 2007-01-16 23:58 Solid-Liquid Separation, Fourth Edition Ladislav Svarovsky 2006-05-24 10:29 Compressors and Modern Process Applications Heinz P. Bloch Wiley-Interscience 2006-11-22 15:54 Literature Resources for Chemical Process Industries (Advances in Chemistry Series 010) T. E. Singer (Editor) American Chemical Society 2010-07-30 11:53 Laboratory Techniques in Biochemistry and Molecular Biology Vol 32: Magnetic Cell Separation Maciej Zborowski, Jeffrey J. Chalmers Elsevier 2007-12-03 11:59 Protein Purification: Principles and Practice R. K., Scopes Rk, Scopes Accident precursors : pro-active identification of safety risks in the chemical process industry P.M.W. Körvers. TU Eindhoven 2010-01-25 10:41 TMI 25 Years Later: The Three Mile Island Nuclear Power Plant Accident and Its Impact Bonnie A. Osif, Anthony J. Baratta, Thomas W. Conkling Pennsylvania State University Press 2009-12-12 04:59 Project and Program Risk Management: A Guide to Managing Project Risks and Opportunities (PMBOK Handbooks) R. Max Wideman 2006-10-05 01:03 Catalogue of Risks: Natural, Technical, Social and Health Risks Dirk Proske Springer 2008-07-25 18:35 Accident And Design: Contemporary Debates On Risk Management, 1st edition, 1996-10 C. Hood 2006-04-12 06:46 Risk John Adams 2008-09-23 01:59 Three Mile Island: A Nuclear Crisis in Historical Perspective J. Samuel Walker 2008-09-20 12:34 Encyclopedia of Biostatistics: 8-Volume Set Peter Armitage (Editor), Theodore Colton (Editor) John Wiley 2006-07-25 10:10 Controlling Pilot Error: Controlled Flight Into Terrain (CFIT/CFTT) Daryl R. Smith 2008-03-19 12:19 Sharing The Skies An Aviation Industry Guide to the Management of Wildlife Hazards 2nd Edition Bruce MacKinnon Civil Aviation, Transport Canada Unit Operations : An Approach to Videogame Criticism Ian Bogost 2006-05-18 13:55 Food Processing Technology: Principles and Practice, 2nd Edition (Woodhead Publishing in Food Science and Technology) P. Fellows CRC Woodhead Publ 2005-11-03 06:11 Chemical Engineering Design: Principles, Practice and Economics of Plant and Process Design Gavin Towler, R K Sinnott 2008-06-01 00:57 Surface Production Operations, Volume 1:, Second Edition : Design of Oil-Handling Systems and Facilities (Surface Production Operations) Ken Arnold Maurice Stewart Gulf Professional Publishing 2006-04-21 20:07 Food Mixing: Principles and Applications P. J. Cullen Wiley-Blackwell 2010-05-20 12:15 Bioprocess Engineering Principles PAULINE DORAN 2007-10-21 18:52 Fermentation and Biochemical Engineering Handbook : Principles, Process Design, and Equipment Henry C. Vogel Noyes Publications 2005-11-01 16:25 Thermal Separation Processes: Principles and Design Klaus Sattler, Hans Jacob Feindt 2008-02-12 13:39 Panzer Tactics: German Small-Unit Armor Tactics in World War II Wolfgang Schneider Stackpole Books 2009-03-31 01:44 Elementary Principles of Chemical Processes, 3rd edtion Richard M. Felder Ronald W. Rousseau Inside the Customer Universe: How to Build Unique Customer Insight for Profitable Growth and Market Leadership Henrik Anderson, Thomas Ritter Wiley 2009-08-25 07:03 Day Trading With Short Term Price Patterns and Opening Range Breakout Toby Crabel 2007-02-28 20:32 2009 Standard Catalog Of World Coins 2001-Date (Standard Catalog) Colin R Bruce 2008-12-22 12:21 Handbook of Quantitative Finance and Risk Management (v.1) Cheng-Few Lee, Alice C. Lee, John Lee Springer 2010-10-06 01:07 Collateralized Debt Obligations and Structured Finance : New Developments in Cash and Synthetic Securitization Janet M. Tavakoli 2007-12-09 11:16 The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage Peter Navarro 2007-01-31 10:10 What Works on Wall Street: A Guide to the Best-Performing Investment Strategies of All Time James P. O'Shaughnessy 2007-09-30 09:49 Information Markets: A New Way of Making Decisions Robert Hahn AEI Press 2008-03-06 09:00 Rengen: The Rise of the Cultural Consumer - and What It Means to Your Business Patricia Martin Platinum Press 2008-12-24 01:51 Handbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization Muthu Ramachandran, Rogerio Atem de Carvalho Engineering Science Reference Biologically Inspired Algorithms for Financial Modelling (Natural Computing Series) 2006-02 Anthony Brabazon Michael O'Neill 2006-08-28 15:10 Contrarian Investment Strategies in the Next Generation, 1998 David Dreman 2006-10-24 19:50 Fighting Air Pollution in Southern California by Scrapping Old Vehicles Lloyd Dixon Steven Garber 2007-01-24 08:53 Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing) Sifeng Liu, Yi Lin, 2007-05-25 01:22 Patterns of Speculation: A Study in Observational Econophysics Bertrand M. Roehner 2007-12-11 15:48 The Bible Code Michael Drosnin Simon & Schuster 2008-04-14 00:45 Appetite, Volume 52, Issue 02 (April 2009) P. Atkins, H.R. Berthoud, N.W. Bond, D. Hoffman, A. Jansen, S. Thornton, Y. Wada and D.A. Zellner (Executive Editors) Elsevier Ltd. 2009-07-30 23:27 Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics Amy Neustein Springer 2010-11-07 09:00 Double-Digit Growth: How Great Companies Achieve It--No Matter What Michael Treacy Portfolio Trade 2010-09-17 09:44 Inefficient Markets: An Introduction to Behavioral Finance (Clarendon Lectures in Economics) Andrei Shleifer OUP Oxford Trading For A Living In The Forex Market Trading Intl 2007-12-21 09:00 Value in Time: Better Trading through Effective Volume (Wiley Trading) Pascal Willain 2008-09-18 22:32 The Hedge Fund Edge: Maximum Profit/Minimum Risk Global Trend Trading Strategies (Wiley Trading) Mark Boucher 2006-07-24 07:28 Harmonic Trading, Volume Two: Advanced Strategies for Profiting from the Natural Order of the Financial Markets Scott M. Carney FT Press 2010-11-19 19:06 The Ultimate Book on Stock Market Timing, Volume 3: Geocosmic Correlations to Trading Cycles Raymond A. Merriman 2008-04-01 07:20 Electronic Trading, volume 2 Joe Ross, Mark Cherlin 2008-11-19 18:05 Electronic Day Trading to Win Bob Baird, Craig McBurney, Bob Baird, Craig McBurney John Wiley & Sons 2008-12-04 03:17 The Compleat Day Trader Volume I 1995 Jake Bernstein McGraw-Hill 2006-03-01 12:14 Markets in Profile: Profiting from the Auction Process (Wiley Trading) James F. Dalton, Robert Bevan Dalton, Eric T. Jones, 2007-09-29 20:21 The Swing Traders Bible: Strategies to Profit from Market Volatility (Wiley Trading) Matthew McCall, Mark Whistler Wiley Value-Based Power Trading: Using the Overlay Demand Curve to Pinpoint Trends & Predict Market Turns Donald L. Jones Probus Professional Pub 2009-09-26 02:04 Trading on Momentum: Advanced Techniques for High Percentage Day Trading Ken Wolff 2005-09-02 04:58 Float Analysis: Powerful Technical Indicators Using Price and Volume (A Marketplace Book), 2002-04 Steve Woods 2006-09-24 13:47 Electronic Trading, volume 1 Joe Ross, Mark Cherlin, 2007-09-21 02:22 A Beginner's Guide to Short-Term Trading: How to Maximize Profits in 3 Days to 3 Weeks Toni Turner 2008-01-15 18:20 Hit and Run Trading: The Short-Term Stock Traders' Bible, Updated Jeff Cooper Marketplace Books, Inc. 2010-05-06 18:50 Trade Stocks & Commodities with the Insiders: Secrets of the COT Report (Wiley Trading) Larry Williams 2006-11-11 08:12 Trading on Momentum: Advanced Techniques for High Percentage Day Trading Ken Wolff McGraw-Hill Companies 2009-02-22 03:48 Trading Up: Why Consumers Want New Luxury Goods... And How Companies Create Them (Revised and Updated) Michael J. Silverstein, Neil Fiske Portfolio Hardcover 2009-11-22 02:31 Trading to WIN Course : One Day at a Time - A Complete Guide to S&P500 Futures Trading Intra-day Bryce Gilmore http://www.wavetrader.com/ Poverty, Inequality and Development: Essays in Honor of Erik Thorbecke (Economic Studies in Inequality, Social Exclusion and Well-Being) Alain de Janvry, Ravi Kanbur Springer 2009-06-17 11:47 The Agrarian Question and Reformism in Latin America Alain de Janvry The Johns Hopkins University Press 2010-03-20 21:04 The Economic Theory of Agrarian Institutions (Clarendon Paperbacks) Pranab Bardhan Oxford University Press, USA 2009-05-19 13:03 Handbook of Agricultural Economics, Volume 2A: Agriculture and its External Linkages Bruce L. Gardner, Gordon C. Rausser North Holland 2009-09-17 07:00 Insurance against Poverty (UNU-WIDER Studies in Development Economics) Stefan Dercon Oxford University Press, USA Investment Psychology Explained: Classic Strategies to Beat the Markets Martin J. Pring 2005-08-27 22:29 Investment Madness: How Psychology Affects Your Investing...And What To Do About It John R. Nofsinger 2006-11-12 18:40 Barron's Guide to Making Investment Decisions: Revised & Expanded Douglas Sease, John A. Prestbo Prentice Hall Press 2009-06-25 05:26 Finding Alpha: The Search for Alpha When Risk and Return Break Down (Wiley Finance) Eric Falkenstein Wiley 2009-08-21 07:44 Animal Spirits: How Human Psychology Drives the Economy, and Why It Matters for Global Capitalism George A. Akerlof, Robert J. Shiller Princeton University Press 2009-06-18 12:33 Buffett Beyond Value: Why Warren Buffett Looks to Growth and Management When Investing Prem Jain Wiley 2010-05-13 13:55 International Journal of Managerial Finance, Volume 3 Number 1 2007: Survey research in finance David Michayluk (Editor) 2007-12-28 03:35 Shoveling Fuel for a Runaway Train: Errant Economists, Shameful Spenders, and a Plan to Stop them All Brian Czech 2006-12-16 03:05 Mobs, Messiahs, and Markets: Surviving the Public Spectacle in Finance and Politics (Agora Series) William Bonner, Lila Rajiva 2008-10-13 09:22 Decision Management: How to Assure Better Decisions in Your Company J. Frank Yates Secure Computer and Network Systems: Modeling, Analysis and Design Nong Ye 2008-08-26 02:43 Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings (Lecture Notes in Computer Science Information Systems and Applications, incl. Internet/Web, and HCI) Willem Jonker, Milan Petkovic Springer 2010-09-16 15:52 Secure Internet Programming: Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science) Jan Vitek, Christian D. Jensen Springer 2009-06-27 06:23 Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science: Volume 5111) Qingfeng Chen, Chengqi Zhang, Shichao Zhang 2008-07-21 15:25 Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, ... Papers (Lecture Notes in Computer Science) Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean 2008-01-22 10:11 Engineering Secure Software and Systems: First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Fabio Massacci, Samuel Redwine, Nicola Zannone Springer 2009-03-30 01:06 Composition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science) Yehuda Lindell 2007-07-31 01:28 Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Lecture Notes in Computer Science) Willem Jonker, Milan Petkovic 2008-08-20 18:51 Secure Data Management: 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Lecture Notes in Computer Science) Willem Jonker, Milan Petkovic 2008-11-03 09:51 Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science) Willem Jonker, Milan Petkovic Springer Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture ... Computer Science Security and Cryptology) Audun Jøsang, Torleiv Maseng, Svein J. Knapskog Springer 2009-10-03 05:34 Scalable and Secure Internet Services and Architecture (Chapman & Hall/Crc Computer & I) Cheng-Zhong Xu Computer Security Basics Debby Russell, Sr. G.T Gangemi 2008-12-25 05:14 Have You Locked the Castle Gate?: Home and Small Business Computer Security Brian Shea 2005-10-30 13:42 Desktop Witness: The Do's & Don'ts of Personal Computer Security Michael A. Caloyannides 2008-12-30 09:02 Defeating the Hacker : A non-technical guide to computer security Robert Schifreen 2006-07-06 12:51 The Myths of Security: What the Computer Security Industry Doesn't Want You to Know John Viega O'Reilly Media, Inc. 2009-06-28 06:03 Computer Security Handbook Seymour Bosworth Wiley 2006-01-08 14:23 Computer Security Basics, 2nd Edition Rick Lehtinen 2006-06-13 17:10 Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security) John R. Vacca Morgan Kaufmann 2009-07-04 02:25 Halting the Hacker: A Practical Guide to Computer Security 2002-08 [ebook and source code], 2nd Edition Donald L. Pipkin 2005-09-24 12:10 Introduction to Computer Security Matt Bishop Addison-Wesley Professional Computer Security - ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (Lecture Notes ... Computer Science Security and Cryptology) Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann Springer 2009-05-28 10:58 Computer Security ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (Lecture ... Computer Science Security and Cryptology) Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld Springer 2009-05-28 11:06 Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security Tony Bradley 2006-12-03 06:30 Enhancing Computer Security with Smart Technology V. Rao Vemuri 2007-08-21 06:42 Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (Lecture Notes in Computer Science) Sushil Jajodia, Javier Lopez Springer 2008-11-15 11:41 Computer Security - ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Lecture Notes in Computer Science) Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo Springer 2009-05-28 11:13 Computer Security: Art and Science Matt Bishop 2007-10-02 21:27 Computer Security - ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings (Lecture Notes in Computer Science) Joachim Biskup, Javier Lopez Springer 2008-11-15 11:44 Computer Security - ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings (Lecture Notes in Computer Science) Einar Snekkenes, Dieter Gollmann 2008-12-20 21:10 Computer Security - ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992. Proceedings (Lecture Notes in Computer Science) Yves Deswarte, Gerard Eizenberg, Jean-Jacques Quisquater Springer Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Lecture ... Computer Science Security and Cryptology) Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama Springer 2009-05-28 11:06 Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing) Marcus A. Maloof 2006-11-30 02:59 Foundations of Computer Security David Salomon 2007-01-25 12:41 Computer Security in the 21st Century D.T. Lee (Editor), S.P. Shieh (Editor), J.D. Tygar (Editor) 2007-03-15 07:54 Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Lecture Notes in Computer Science) Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg 2008-11-03 09:57 Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings (Lecture ... Computer Science Security and Cryptology) Kanta Matsuura, Eiichiro Fujisaki Springer 2009-05-28 11:20 Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions Ramesh Subramanian 2008-07-09 15:38 Computer Crime (Computer Security) David Icove, Karl Seger, William VonStorch O'Reilly 2009-01-03 03:38 Security Technologies for the World Wide Web (Artech House Computer Security Series) Rolf Oppliger Artech House Publishers 2009-01-19 04:51 Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Roger R. Dube Wiley Security In Wireless LANS And MANS (Artech House Computer Security) Thomas Hardjono 2005-11-27 07:13 Statistical Methods in Computer Security (Statistics: a Series of Textbooks and Monographs) William W.S. Chen 2007-12-31 08:45 VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization) John R. Goodall, Gregory Conti, Kwan-Liu Ma 2008-05-31 16:30 Bluetooth Security (Artech House Computer Security Series) Christian Gehrmann Joakim Persson Ben Smeets 2006-04-25 02:16 Risk Management for Computer Security: Protecting Your Network & Information Assets Andy Jones, Debi Ashenden 2008-08-03 13:50 Fundamentals of Computer Security VTC Training CD Bobby Rogers 2008-06-27 17:19 The International Handbook of Computer Security Anique A. Qureshi Joel G. Siegel 2006-02-26 19:48 Collaborative Computer Security and Trust Management (Premier Reference Source) Jean-Marc Seigneur, Adam Slagell Information Science Reference 2010-03-08 16:54 Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings (Lecture Notes in Computer Science) John R. Goodall, Gregory Conti, Kwan-Liu Ma Springer 2009-05-28 11:20 Outsourcing Information Security (Computer Security Series) C. Warren Axelrod Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas, Andrzej Piegat (Editors) 2007-08-29 05:48 Computer and Intrusion Forensics (Artech House Computer Security Series) George Mohay 2005-08-21 23:03 Multicast and Group Security (Artech House Computer Security Series) Thomas Hardjono, Lakshminath R. Dondeti, 2006-02-19 23:14 Security Fundamentals for E-Commerce (Artech House Computer Security Series) Vesna Hassler 2006-06-02 22:37 Electronic Payment Systems for E-Commerce (Artech House Computer Security Series) Donald O'Mahony ,Michael Peirce ,Hitesh Tewari 2006-12-22 06:33 Computer Security and Cryptography Alan G. Konheim 2007-05-10 22:30 Demystifying the Ipsec Puzzle (Artech House Computer Security Series) Sheila Frankel 2008-05-31 10:46 Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security) Roger A. Grimes 2005-09-10 06:40 Implementing Electronic Card Payment Systems (Artech House Computer Security Series) Cristian Radu 2005-12-09 17:41 Applied Cryptology, Cryptographic Protocols, and Computer Security Models (Proceedings of Symposia in Applied Mathematics) Richard A. Demillo Simple Computer Security: Disinfect Your PC CA, Eric Geier, Jim Geier, 2007-03-23 13:36 User's Guide To Cryptography And Standards (Artech House Computer Security) Alex W. Dent Chris J. Mitchell Artech House Publishers 2006-03-31 02:32 Biometrics, Computer Security Systems and Artificial Intelligence Applications Khalid Saeed, Jerzy Pejas, Romuald Mosdorf (Editors) 2007-06-15 02:26 Selected papers from the HAISA 2007 Symposium - Information Management & Computer Security Volume 15 Number 5 2007 Professor Steven Furnell and Dr Nathan Clarke 2008-10-28 07:53 Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series) Laura L. Pullum 2007-06-09 00:13 Computer security update Vol 5 No 12 Worldwide Videotex 2009-05-06 10:22 Computer security update Vol 6 No 1 Worldwide Videotex 2009-05-06 10:42 Computer security management Institute for Career Research 2009-05-12 12:42 Guide to Computer Network Security (Computer Communications and Networks) Joseph Migga Kizza Springer 2008-12-25 21:43 Computer Network Security: Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin Springer Computer Network Security Joseph M. Kizza 2007-03-15 07:44 An Introduction to Security (INFORMATION RESOURCE GUIDE - Computer, Internet and Network Systems Security) S.K.PARMAR 2007-12-19 16:30 Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (Radia Perlman Series in Computer Networking and Security) Edward Skoudis, Tom Liston 2008-10-01 11:03 Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications) Igor Kotenko, Victor Skormin Springer 2010-09-06 02:12 Network Security: A Practical Guide (Computer Weekly Professional) Owen Poole 2008-09-01 07:34 Advances in Computer Science - ASIAN Computer and Network Security: Proceedings 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, ... (Lecture Notes in Computer Science) Iliano Cervesato Springer 2008-10-03 06:48 Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science) Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo Springer 2010-04-27 16:51 Computer, Network & Internet Security Brett C. Tjaden 2005-10-05 14:19 The Information Security Dictionary : Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology (The International ... Series in Engineering and Computer Science) Urs E. Gattiker 2005-11-28 05:44 Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, ... in Information and Communication Technology) Theo Dimitrakos, Fabio Martinelli Springer Trust and Security in Collaborative Computing (Computer and Network Security) Xukai Zou, Yuan-shun Dai, Yi Pan 2008-10-06 04:22 Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe Springer 2009-05-15 12:27 Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe Springer 2009-05-15 12:29 Computer Network Security: Theory and Practice Jie Wang Springer 2009-06-24 17:53 Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected ... Computer Science Security and Cryptology) Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé Springer 2010-09-06 02:13 Computer Safety, Reliability, and Security: 26th International Conference, SAFECOMP 2007, Nurmberg, Germany, September 18-21, 2007, Proceedings (Lecture Notes in Computer Science) Francesca Saglietti, Norbert Oster 2008-11-03 09:55 Computer Safety, Reliability, and Security: 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings (Lecture Notes in Computer Science) Michael D. Harrison, Mark-Alexander Sujan Springer 2008-11-09 23:52 Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings (Lecture Notes in Computer Science) Mark Lomas Springer 2009-05-15 12:08 Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture ... Computer Science Security and Cryptology) Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo Springer Berlin Heidelberg 2009-06-20 11:49 Secure Internet Programming: Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science) Jan Vitek, Christian D. Jensen Springer Foundations of Security Analysis and Design V: FOSAD 2008/2009 Tutorial Lectures (Lecture Notes in Computer Science Security and Cryptology) Alessandro Aldini, Gilles Barthe, Roberto Gorrieri Springer 2009-08-21 03:48 Global E-Security (Communications in Computer and Information Science, Volume 12) Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown Springer 2009-05-22 12:21 Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Jonathan Katz, Moti Yung Springer 2009-05-28 11:19 Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ... Computer Science Security and Cryptology) Pierpaolo Degano, Luca Viganò Springer 2009-09-02 11:30 Software Security -- Theories and Systems: Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers (Lecture Notes in Computer Science) Mitsuhiro Okada, Benjamin Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa 2008-01-26 04:43 Security of e-Systems and Computer Networks Mohammad Obaidat, Noureddine Boudriga 2008-10-13 09:21 Computer Safety, Reliability, and Security: 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24,2004, Proceedings (Lecture Notes in Computer Science) Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann Springer 2009-05-15 10:18 Security Protocols: 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings (Lecture Notes in Computer Science) (v. 1550) Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe Springer 2009-05-15 12:08 Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings (Lecture Notes in Computer Science) Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe Springer 2009-05-15 12:08 Formal Aspects in Security and Trust (Lecture Notes in Computer Science, 5983) Pierpaolo Degano, Joshua D. Guttman Springer Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures (Lecture Notes in Computer Science) Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli 2008-01-26 09:26 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Information Security) Jr., Albert Marcella, Doug Menendez 2008-10-13 09:08 Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers (Lecture Notes ... Computer Science Security and Cryptology) Kyo-Il Chung, Kiwook Sohn, Moti Yung Springer 2009-02-21 07:23 Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Lynn Batten, Reihaneh Safavi-Naini Springer 2009-05-28 10:59 Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Yi Mu, Willy Susilo, Jennifer Seberry Springer 2009-05-28 11:19 Network Control and Engineering for QoS, Security and Mobility, V: IFIP 19th World Computer Congress,TC-6, 5th IFIP International Conference on Network ... and Communication Technology) (v. 5) Dominique Gaiti Springer 2009-10-03 01:01 Security in Ad-hoc and Sensor Networks (Computer and Network Security) Raheem Beyah, Janise Mcnair, Cherita Corbett World Scientific Publishing Company 2010-04-10 09:34 Transactions on Data Hiding and Multimedia Security I (Lecture Notes in Computer Science) 2006-11-09 10:31 Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings (Lecture Notes in Computer Science) Markus Jakobsson, Moti Yung, Jianying Zhou 2007-12-23 05:00 Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, ... Papers (Lecture Notes in Computer Science) Sven Dietrich, Rachna Dhamija Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Colin Boyd, Juan M. González Nieto Springer 2009-05-28 10:57 Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Josef Pieprzyk, Hossein Ghodosi, Ed Dawson Springer 2009-05-28 11:19 Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings (Lecture Notes ... Computer Science Security and Cryptology) Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud Springer 2009-05-28 11:21 Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) Colin Boyd, Juan González Nieto Springer 2009-06-24 02:03 Transactions on Data Hiding and Multimedia Security IV (Lecture Notes in Computer Science Transactions on Data Hiding and Multimedia Security) Yun Q. Shi Springer 2009-07-26 11:37 Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science Security and Cryptology) Simone Fischer Hübner, Lambrinoudakis Costas, Günther Pernul Springer 2009-08-25 05:25 Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater Springer 2009-08-29 23:07 Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science) Kijoon Chae, Moti Yung Springer 2009-09-16 05:25 Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) Jong In Lim, Dong Hoon Lee Springer 2009-09-16 05:43 Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, ... Computer Science Security and Cryptology) Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk Springer Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science) Kan Zhang, Yuliang Zheng Springer 2009-05-15 00:13 Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science) Jianying Zhou, Moti Yung, Yongfei Han Springer 2009-05-28 10:56 Advances in Cryptology -- ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, ... Computer Science Security and Cryptology) Xuejia Lai, Kefei Chen Springer 2009-05-28 11:06 Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Lecture Notes in Computer Science) Vijav Varadharajan, Josef Pieprzyk, Yi Mu Springer 2009-05-28 11:14 IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (Lecture Notes in Computer Science) Simone Fischer-Hübner Springer 2009-06-27 06:27 Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Yvo Desmedt Springer 2009-11-05 17:14 Information Systems Security 6 (Lecture Notes in Computer Science, 6503) Somesh Jha, Anish Mathuria Springer 2010-12-10 04:43 Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings (Lecture Notes in Computer Science) Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan 2007-12-23 04:59 Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings (Lecture Notes in Computer Science) Sihan Qing, Hideki Imai, Guilin Wang 2008-01-21 04:47 Security Modeling And Analysis of Mobile Agent Systems (Electrical and Computer Engineering) Jeffrey J. P. Tsai, Lu Ma Security in Ad-hoc and Sensor Networks: First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers (Lecture Notes in Computer Science) Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff 2008-01-22 10:15 Advances in Cryptology - ASIACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November ... (Lecture Notes in Computer Science) Kwok Yan Lam, Eiji Okamoto, Chaoping Xing 2008-02-15 13:46 Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, ... (Lecture Notes in Computer Science) Tatsuaki Okamoto 2008-02-15 13:50 Advances in Cryptology - ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, ... (Lecture Notes in Computer Science) Colin Boyd 2008-02-15 13:59 Advances in Cryptology ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, ... (Lecture Notes in Computer Science) Bimal Roy 2008-02-15 14:04 Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Lecture Notes in Computer Science) Reihaneh Safavi-Naini 2008-08-20 17:35 Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science 5185) Steven M. Furnell, Sokratis K. Katsikas, Antonio Lioy 2008-08-31 12:47 Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science) Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung Springer 2008-10-11 05:30 Computational Intelligence and Security: International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers (Lecture Notes in Computer Science) Yunping Wang, Yiu-ming Cheung, Hailin Liu 2008-11-03 09:57 Stabilization, Safety, and Security of Distributed Systems: 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings (Lecture Notes in Computer Science) Toshimitsu Masuzawa, Sébastien Tixeuil Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings (Communications in Computer and Information Science) Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiao Springer 2010-11-08 03:59 Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, ... Computer Science Security and Cryptology) Alessandro Armando, Gavin Lowe Springer 2010-11-09 02:07 Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (Lecture ... Computer Science Security and Cryptology) Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing Springer 2010-11-26 18:37 Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers (Communications in Computer and Information Science) Carlos Serrao, Vicente Aguilera, Fabio Cerullo Springer 2010-11-30 20:12 Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) Jelena Mirkovic 2005-11-21 20:16 Security Engineering with Patterns: Origins, Theoretical Models, and New Applications (Lecture Notes in Computer Science) Markus Schumacher 2008-01-25 11:55 Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing) Enrico Nardelli, Maurizio Talamo 2008-02-01 20:17 Formal Aspects in Security and Trust: Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Lecture Notes in Computer Science) Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider 2008-11-03 09:48 Security Protocols: 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings (Lecture Notes in Computer Science) Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe Springer 2009-05-15 12:08 Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Jianying Zhou, Moti Yung, Feng Bao Springer Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science) Kim Sehun, Moti Yung, Hyung-Woo Lee 2008-01-21 23:23 Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, ... (Lecture Notes in Computer Science) Antonio Lioy, Daniele Mazzocchi 2008-02-24 10:11 Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography - Volume 7 NATO Security through Science Series: Information ... - Information and Communication Security) Jean-Pierre Gazeau, Jaroslav Nesetril, Branislav Rovan 2008-03-18 23:04 Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science) Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu 2008-08-20 17:34 Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (Lecture Notes in Computer Science) Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Y 2008-09-12 06:42 Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers (Lecture Notes in Computer Science) Jae-Kwang Lee, Okyeon Yi, Moti Yung 2008-09-12 09:53 Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings (Lecture Notes in Computer Science) Patrick McDaniel, Shyam K. Gupta 2008-11-03 09:59 Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science) Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt Springer 2009-04-29 07:41 Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Lecture Notes in Computer Science Security and Cryptology) Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-hsing Li Springer 2009-05-02 05:11 Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings (Lecture Notes in Computer Science Security and Cryptology) John Ioannidis, Angelos Keromytis, Moti Yung Springer Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Ed Dawson, Duncan S. Wong Springer 2010-03-27 14:38 Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers (Computer Science Security and Cryptology) LNCS 5628 Roger Dingledine, Philippe Golle Springer 2010-09-10 20:25 Information Assurance: Security in the Information Environment, 2nd Edition (Computer Communications and Networks) Andrew Blyth Gerald L. Kovacich 2006-12-04 03:18 Computer Viruses and Malware (Advances in Information Security) John Aycock 2006-12-05 02:48 Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science) Yun Q. Shi 2008-03-02 03:53 Transactions on Data Hiding and Multimedia Security III (Lecture Notes in Computer Science) Yun Q. Shi 2008-06-04 04:33 Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers (Lecture Notes in Computer Science) Bruce Christianson, Bruno Crispo, James A. Malcom, Michael Roe 2008-11-03 09:50 Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings (Lecture Notes in Computer Science) Costas Lambrinoudakis, Günther Pernul, A Min Tjoa 2008-11-03 09:50 Information Security and Cryptology - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Pil Joong Lee, Jung Hee Cheon Springer 2009-03-19 18:29 Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications) Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore Springer Security in Distributed and Networking Systems (Computer and Netwrok Security) Yang Xiao, Yi Pan 2008-09-02 23:21 Security in Communication Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers (Lecture Notes in Computer Science) Carlo Blundo, Stelvio Cimato 2008-10-21 04:08 Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Lecture Notes in Computer Science) Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing 2008-11-03 09:51 Software Security - Theories and Systems: Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 (Lecture Notes in Computer Science) Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki Springer 2009-04-05 08:06 Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers (Lecture Notes in Computer Science) Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe Springer 2009-05-15 12:25 Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Lecture Notes in Computer Science) Colin Boyd, Ed Dawson Springer 2009-05-28 11:15 Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings (Lecture Notes in Computer ... Applications, incl. Internet/Web, and HCI) Ehud Gudes, Jaideep Vaidya Springer 2009-07-14 23:06 Transactions on Computational Science XI: Special Issue on Security in Computing, Part II (Lecture Notes in Computer Science Transactions on Computational Science) Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno Springer 2010-12-10 04:30 Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings (Lecture ... Programming and Software Engineering) Erwin Schoitsch Springer 2010-09-06 02:12 Privacy, Security and Trust within the Context of Pervasive Computing (The International Series in Engineering and Computer Science) Philip Robinson Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture ... Computer Science Security and Cryptology) Audun Jøsang, Torleiv Maseng, Svein J. Knapskog Springer 2009-10-03 05:34 802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) Alan Holt, Chi-Yu Huang Springer 2010-07-06 02:28 Transactions on Computational Science X: Special Issue on Security in Computing, Part I (Lecture Notes in Computer Science Transactions on Computational Science) Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno Springer 2010-12-10 04:30 Advances in Cryptology-Asiacrypt'98: International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, ... (Lecture Notes in Computer Science) Kazuo Ohta, Dingyi Pei 2008-02-11 11:32 Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, ... (Lecture Notes in Computer Science) Chi Sung Laih 2008-02-15 14:02 Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, ... (Lecture Notes in Computer Science) Pil Joong Lee 2008-02-15 14:04 Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings (Lecture Notes in Computer Science) Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Therani Madhusudan 2008-02-17 00:28 Lectures on Data Security: Modern Cryptology in Theory and Practice (Lecture Notes in Computer Science) Ivan Damgard 2008-03-13 02:55 Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers (Lecture Notes in Computer Science) Gene Tsudik 2008-08-20 17:30 Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti Pairing-Based Cryptography - Pairing 2009: Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) Hovav Shacham, Brent Waters Springer 2009-08-03 16:36 Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Daniele Micciancio Springer 2010-02-20 08:28 Security Technology (Communications in Computer and Information Science, 58) Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang, Kirk P. Arnett Springer 2010-05-28 23:28 Advances in Cryptology - EUR YPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science Security and Cryptology) Henri Gilbert Springer 2010-06-05 03:38 Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics) Yves Lemoigne, Alessandra Caner 2008-09-03 15:30 Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science) Roy Ladner, Frederick E. Petry (Editors) 2007-08-24 04:52 Cryptography: A New Dimension in Computer Data Security Carl Meyer S. M. Matyas 2006-11-08 19:46 Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Lecture Notes in Computer Science Security and Cryptology) Alfonso Valdes, Diego Zamboni Springer 2009-02-17 11:53 Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Richard Lippmann, Engin Kirda, Ari Trachtenberg Springer 2009-02-17 11:53 Trusted Computing: Second International Conference on Trusted Computing, Trust 2009 Oxford, UK, April 6-8, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) Liqun Chen, Chris Mitchell, Andrew Martin Springer Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Alex Biryukov Springer 2009-05-15 12:14 Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Henri Gilbert, Helena Handschuh Springer 2009-05-15 12:27 Fast Software Encryption: Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (Lecture Notes in Computer Science) Ross Anderson Springer 2009-05-15 12:32 Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings ... Computer Science Security and Cryptology) Klaus Julisch, Christopher Kruegel Springer 2009-05-28 10:57 Progress in Cryptology Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings ... Computer Science Security and Cryptology) Ed Dawson, Serge Vaudenay Springer 2009-05-28 10:58 Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Nigel Smart Springer 2009-05-28 10:58 Progress in Cryptology - IND YPT 2005: 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings (Lecture ... Computer Science Security and Cryptology) Subhamoy Maitra, C.E. Veni Madhavan, Ramarathnam Venkatesan Springer 2009-05-28 10:58 Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Bart Preneel, Stafford Tavares Springer 2009-05-28 10:59 Advances in Cryptology - EUR YPT 2006: 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, ... Computer Science Security and Cryptology) Serge Vaudenay Springer 2009-05-28 10:59 Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings ... Computer Science Security and Cryptology) Roland Büschkes, Pavel Laskov Springer Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Stefan Katzenbeisser, Ahmad-Reza Sadeghi Springer 2009-09-04 23:42 Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings (Lecture ... Computer Science Security and Cryptology) Shai Halevi Springer 2010-02-02 10:24 Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings ... Computer Science Security and Cryptology) Phong Q. Nguyen, David Pointcheval Springer 2010-05-28 08:39 Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings ... Computer Science Security and Cryptology) Daniel J. Bernstein, Tanja Lange Springer 2010-05-28 09:36 Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January ... Computer Science Security and Cryptology) Ajay Kumar, David Zhang Springer 2010-06-27 15:30 Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Tal Rabin Springer 2010-08-21 00:51 Progress in Cryptology - IND YPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) LNCS 5922 Bimal Roy, Nicolas Sendrier Springer 2010-08-30 10:06 Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Stefan Mangard, Francois-Xavier Standaert Springer Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings (Lecture Notes in Computer Science) Lynn Batten, Jennifer Seberry Springer 2009-05-28 11:05 Progress in Cryptology - AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Lecture ... Computer Science Security and Cryptology) Serge Vaudenay Springer 2009-05-28 11:19 Progress in Cryptology - VIETCRYPT 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected ... Computer Science Security and Cryptology) Phong Q. Nguyen Springer 2009-05-28 11:19 Coding and Cryptology: Second International Workshop, IWCC 2009 (Lecture Notes in Computer Science Security and Cryptology) Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing Springer 2009-06-09 06:37 Progress in Cryptology -- AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings (Lecture ... Computer Science Security and Cryptology) Bart Preneel Springer 2009-06-21 01:44 Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) Orr Dunkelman Springer 2009-07-14 22:55 Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings ... Computer Science Security and Cryptology) Ulrich Flegel, Danilo Bruschi Springer 2009-07-18 08:41 Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Ian Goldberg, Mikhail Atallah Springer 2009-08-01 02:45 Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings (Communications in Computer and Information Science) Hamid Jahankhani, Ali G. Hessami, Feng Hsu Springer 2009-08-25 02:47 E-Voting and Identity: Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Peter Y.A. Ryan, Berry Schoenmakers Springer Theory of Cryptography: Sixth Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) Omer Reingold Springer 2009-02-23 02:13 Topics in Cryptology CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings (Lecture ... Computer Science Security and Cryptology) Masayuki Abe Springer 2009-03-06 12:03 Topics in Cryptology CT-RSA 2008: The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings (Lecture ... Computer Science Security and Cryptology) Tal Malkin Springer 2009-03-06 12:04 Topics in Cryptology -- CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA







Post a Comment