70-742 IDENTITY WITH WINDOWS SERVER 2016 LAB MANUAL |
Regan, P. (2018). Identity with Windows Server 2016 exam 70-742: Lab manual. WILEY. |
THE OFFICIAL BBC MICRO:BIT USER GUIDE |
Halfacree, G. (2018). The official BBC micro:bit user guide. WILEY. |
RASPBERRY PI USER GUIDE, 4TH EDITION |
Upton, E., & Halfacree, G. (2016). Raspberry Pi user guide (4th ed.). WILEY. |
BEGINNING MICROSOFT SQL SERVER 2012 PROGRAMMING |
Atkinson, P., & Vieira, R. (2012). Beginning Microsoft SQL Server 2012 programming. John Wiley & Sons. |
MYSQL ADMINISTRATOR'S BIBLE |
Cabral, S., & Murphy, K. (2009). MySQL administrators bible. Wiley Publishing. |
MICROSOFT SQL SERVER 2012 ADMINISTRATION: REAL-WORLD SKILLS FOR MCSA CERTIFICATION AND BEYOND (EXAMS 70-461, 70-462, AND 70-463) |
Carpenter, T. (2013). Microsoft SQL server 2012 administration: Real world skills for MCSA certification and beyond. SYBEX A Wiley Brand. |
MICROSOFT SQL SERVER 2012 BIBLE |
Jorgensen, A., LeBlanc, P., Chinchilla, J., Segarra, J., & Nelson, A. (2012). Microsoft SQL Server 2012 bible. John Wiley & Sons. |
PROFESSIONAL MICROSOFT SQL SERVER 2014 ADMINISTRATION |
Jorgensen, A., Ball, B., Wort, S., LoForte, R., & Knight, B. (2014). Professional: SQL Server 2014 administration. wrox A Wiley Brand. |
PROFESSIONAL MICROSOFT SQL SERVER 2014 INTEGRATION SERVICES |
Knight, B., Knight, D., Moss, J. M., Davis, M., & Rock, C. (2014). Professional Microsoft SQL Server 2014 integration services. wrox A Wiley Brand. |
SQL BIBLE, SECOND EDITION |
Kriegel, A., & Trukhnov, B. M. (2008). SQL bible (2nd ed.). Wiley Publishing. |
PROFESSIONAL MICROSOFT SQL SERVER 2008 PROGRAMMING |
Vieira, R. (2009). Professional Microsoft SQL Server 2008 programming. Wiley Publishing. |
PRACTICAL REVERSE ENGINEERING: X86, X64, ARM, WINDOWS KERNEL, REVERSING TOOLS, AND OBFUSCATION |
Dang, B., Gazet, A., Bachaalany, E., & Josse S. (2014). Practical reverse engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. WILEY. |
THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEMS SOFTWARE, & NETWORKING: AN INFORMATION TECHNOLOGY APPROACH, FIFTH EDITION |
Englander, I. (2014). The architecture of computer hardware, systems software, & networking : An information technology approach (5th ed.). WILEY. |
LEARNING COMPUTER ARCHITECTURE WITH RASPBERRY PI |
Upton, E., Duntemann, J., Roberts, R., Mamtora, T., & Everard, B. (2016). Learning computer architecture with Raspberry Pi. WILEY. |
INTRODUCTION TO NETWORKING BASICS, SECOND EDITION |
Ciccarelli, P., Faulkner, C., Fitzgerald, J., Dennis, A., Groth, D., Skandier, T., & Miller, F. (2013). Networking basics (2nd ed.). John Wiley & Sons. |
WILEY PATHWAYS NETWORK SECURITY FUNDAMENTALS |
Cole, E., Krutz , R. L., Conley, J. W., Reisman, B., Ruebush, M., Gollmann, D., & Reese, R. (2008). Network security fundamentals. John Wiley & Sons. |
WILEY PATHWAYS NETWORK SECURITY FUNDAMENTALS PROJECT MANUAL |
Cole, E., Krutz , R. L., Conley, J. W., Reisman, B., Ruebush, M., Gollmann, D., & Reese, R. (2007). Network security fundamentals: Project manual. John Wiley & Sons. |
BUSINESS DATA COMMUNICATIONS AND NETWORKING, THIRTEENTH EDITION STUDENT CHOICE |
FitzGerald, J., Dennis, A., & Durcikova, A. (2017). Business data communications and networking (13th ed.). WILEY. |
BUSINESS DATA COMMUNICATIONS AND NETWORKING, TWELTH EDITION |
FitzGerald, J., Dennis, A., & Durcikova, A. (2015). Business data communications and networking (12th ed.). WILEY. |
VERSATILE ROUTING AND SERVICES WITH BGP: UNDERSTANDING AND IMPLEMENTING BGP IN SR-OS |
Bookham, C. (2014). Versatile routing and services with BGP: Understanding and implementing BGP in SR-OS. WILEY. |
STORAGE AREA NETWORK ESSENTIALS: A COMPLETE GUIDE TO UNDERSTANDING AND IMPLEMENTING SANS (VERITAS SERIES) |
Barker, R., & Massiglia, P. (2002). Storage area network essentials: A complete guide to understanding and implementing SANs. Wiley Computer Publishing John Wiley & Sons. |
MICROSOFT WINDOWS OPERATING SYSTEM ESSENTIALS |
Carpenter, T. (2012). Microsoft Windows operating system: Essentials. John Wiley & Sons. |
MICROSOFT WINDOWS SERVER ADMINISTRATION ESSENTIALS (98-365) |
Carpenter, T. (2011). Microsoft Windows Server administration: Essentials. John Wiley & Sons. |
NETWORKING SELF-TEACHING GUIDE: OSI, TCP/IP, LANS, MANS, WANS, IMPLEMENTATION, MANAGEMENT, AND MAINTENANCE |
Edwards, J., & Bramante, R. (2009). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. Wiley Publishing. |
MASTERING EXCHANGE SERVER 2013 |
Elfassy, D. (2014). Mastering Exchange Server 2013. SYBEX A Wiley Brand. |
INFORMATION STORAGE AND MANAGEMENT: STORING, MANAGING, AND PROTECTING DIGITAL INFORMATION 2E |
Gnanasundaram, S., & Shrivastava, A. (Eds.) (2012). Information storage and management: Storing, managing, and protecting digital information in classic, virtualized, and cloud environments (2nd ed.). John Wiley & Sons. |
MICROSOFT WINDOWS NETWORKING ESSENTIALS |
Gibson, D. (2011). Microsoft Windows networking: Essentials. Wiley Publishing. |
MICROSOFT WINDOWS SECURITY ESSENTIALS |
Gibson, D. (2011). Microsoft Windows security: Essentials. Wiley Publishing. |
THE NETWORK SECURITY TEST LAB: A STEP-BY-STEP GUIDE |
Gregg, M. (2015). The network security test lab: A step-by-step guide. WILEY. |
MICROSOFT WINDOWS SERVER 2012 ADMINISTRATION INSTANT REFERENCE |
Hester, M., & Henley, C. (2013). Microsoft Windows Server 2012 administration: Instant reference. SYBEX A Wiley Brand. |
ALCATEL-LUCENT SCALABLE IP NETWORKS SELF-STUDY GUIDE: PREPARING FOR THE NETWORK ROUTING SPECIALIST I(NRS I) CERTIFICATION EXAM (4A0-100) |
Hundley, K. (2009). Alcatel-Lucent scalable IP networks self-study guide: Preparing for the network routing specialist I (NRS 1) certification exam (4A0-100). Wiley Publishing; Alcatel-Lucent. |
CLOUD SECURITY: A COMPREHENSIVE GUIDE TO SECURE CLOUD COMPUTING |
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. |
SECURING SCADA SYSTEMS |
Krutz, R. L. (2006). Securing SCADA systems. Wiley Publishing. |
CCNA ROUTING AND SWITCHING COMPLETE REVIEW GUIDE (EXAMS 100-105, 200-105, 200-125) 2E |
Lammle, T. (2017). CANA routing and switching complete: Review guide (2nd ed.). SYBEX A Wiley Brand. |
MASTERING MICROSOFT EXCHANGE SERVER 2016 |
Leonard, C., Svidergol, B., Wright, B., & Meloski, V. (2016). Mastering Microsoft exchange server 2016. SYBEX A Wiley Brand. |
SECURITY INTELLIGENCE: A PRACTITIONER'S GUIDE TO SOLVING ENTERPRISE SECURITY CHALLENGES |
Li, Q., & Clark, G. (2015). Security intelligence: A practitioner's guide to solving enterprise security challenges. WILEY. |
NETWORKING ALL-IN-ONE FOR DUMMIES, 7E |
Lowe, D. (2018). Networking all-in-one (7th ed.). for dummies A Wiley Brand. |
CCSP OFFICIAL (ISC)2 PRACTICE TESTS |
Malisow, B. (2018). CCSP Official (ISC)2 practice tests. SYBEX A Wiley Brand. |
MASTERING SYSTEM CENTER 2012 R2 CONFIGURATION MANAGER |
Martinez, S., Daalmans, P., & Bennett, B. (2014). Mastering system center 2012 R2 configuration manager. SYBEX A Wiley Brand. |
CCNA SECURITY STUDY GUIDE: EXAM 210-260 |
McMillan, T. (2018). CCNA security study guide: Exam 210-260. SYBEX A Wiley Brand. |
CISCO NETWORKING ESSENTIALS, SECOND EDITION |
McMillan, T. (2015). Cisco networking: Essentials (2nd ed.). AUTODESK Official Press; SYBEX A Wiley Brand. |
NETWORK FORENSICS |
Messier, R. (2017). Network forensics. WILEY. |
MASTERING WINDOWS SERVER 2012 R2 |
Minasi, M., Greene, K., Booth, C., Butler, R., McCabe, J., Panek, R., Rice, M., & Roth, S. (2014). Mastering Windows Server 2012 R2. SYBEX A Wiley Brand. |
NETWORK ATTACKS & EXPLOITATION: A FRAMEWORK |
Monte, M. (2015). Network attacks & exploitation: A framework. WILEY. |
SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD |
Schneier, B. (2000). Secrets and lies: Digital security in a networked world. Wiley Publishing. |
THE ALL-NEW SWITCH BOOK: THE COMPLETE GUIDE TO LAN SWITCHING TECHNOLOGY |
Seifert, R., & Edwards, J. (2008). The all-new switch book: The complete guide to LAN switching technology (2nd ed.). Wiley Publishing. |
THREAT MODELING: DESIGNING FOR SECURITY |
Shostack, A. (2014). Threat modeling: Designing for security. WILEY. |
THE WEB APPLICATION HACKER'S HANDBOOK: FINDING AND EXPLOITING SECURITY FLAWS 2E |
Stuttard, D., & Pinto, M. (2011). The web application hacker’s handbook: Finding and exploiting security flaws (2nd ed.). Wiley Publishing. |
MASTERING WINDOWS SERVER 2016 |
Svidergol, B., Meloski, V., Wright, B., Martinez, S., & Bassett, D. (2018). Mastering Windows Server 2016. SYBEX A Wiley Brand. |
CISCO NETWORKING ALL-IN-ONE FOR DUMMIES(R) |
Tetz, E. (2011). Cisco networking all-in-one for dummies. John Wiley & Sons. |
RED HAT ENTERPRISE LINUX 6 ADMINISTRATION: REAL WORLD SKILLS FOR RED HAT ADMINISTRATORS |
van Vugt, S. (2013). Red Hat Enterprise Linux 6 administration: Real world skills for Red Hat administrators. John Wiley & Sons. |
ALCATEL-LUCENT SERVICE ROUTING ARCHITECT (SRA) SELF-STUDY GUIDE: PREPARING FOR THE BGP, VPRN AND MULTICAST EXAMS |
Warnock, G., Ghafary, M., & Shaheen, G. (2015). Alcatel-Lucent service routing architect (SRA) self-study guide: Preparing for the BGP, VPRN and multicast exams. WILEY. |
DESIGNING AND IMPLEMENTING IP/MPLS-BASED ETHERNET LAYER 2 VPN SERVICES: AN ADVANCED GUIDE FOR VPLS AND VLL |
Xu, Z. (2010). Designing and implementing IP/MPLS-based ethernet layer 2 VPN services: An advanced guide for VPLS and VLL. Wiley Publishing; Alcatel-Lucent. |
PROFESSIONAL SHAREPOINT 2013 ADMINISTRATION |
Young, S., Caravajal, S., & Klindt, T. (2013). Professional SharePoint 2013 administration. wrox A Wiley Brand. |
CYBER SECURITY POLICY GUIDEBOOK |
Bayuk, J. L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J., & Weiss, J. (2012). Cyber security policy guidebook. WILEY A John Wiley & Sons, Publication. |
SECURITY IN FIXED AND WIRELESS NETWORKS 2E |
Schaefer, G., & Rossberg, M. (2016). Security in fixed and wireless networks (2nd ed.). WILEY. |
Introduction to Network Security: Theory and Practice |
Wang, J., & Kissel, Z. A. (2015). Introduction to network security: Theory and practice. WILEY; Higher Education Press. |
EXAM 98-365 MTA WINDOWS SERVER ADMINISTRATION FUNDAMENTALS |
Microsoft Official Academic Courses. (2011). Windows Server administration fundamentals, exam 98-365. WILEY. |
EXAM 98-367 SECURITY FUNDAMENTALS |
Microsoft Official Academic Courses. (2012). Security fundamentals, exam 98-367. WILEY. |
INTRODUCTION TO NETWORKING WITH NETWORK+ |
Pintello, T. (2013). Introduction to networking with Network+. WILEY. |
WILEY PATHWAYS WINDOWS NETWORK ADMINISTRATION PROJECT MANUAL |
Ulmer, L. W. (2008). Windows network administration: Project manual. WILEY. |
WILEY PATHWAYS WINDOWS NETWORK ADMINISTRATION, FIRST EDITION |
Suehring, S., Chellis, J., Sheltz, M., Shapiro, J. R., Boyce, J., Robichaux, P. E., Lowe, D., & Hill, B. (2008). Windows network administration. John Wiley & Sons. |
AWS CERTIFIED ADVANCED NETWORKING OFFICIAL STUDY GUIDE - SPECIALTY EXAM |
Chauhan, S., Devine, J., Halachmi, A., Lehwess, M., Matthews, N., Morad, S., & Seymour, S. (2018). AWS certified advanced networking: Official study guide specialty exam. SYBEX A Wiley Brand. |
MOBILE COMPUTING DEPLOYMENT AND MANAGEMENT: REAL WORLD SKILLS FOR COMPTIA MOBILITY+ CERTIFICATION AND BEYOND |
Bartz, R. J. (2015). Mobile computing deployment and management: Real world skills for CompTIA Mobility+ certification and beyond. SYBEX A Wiley Brand. |
MOBILE MARKETING FOR DUMMIES |
Becker, M., & Arnold, J. (2010). Mobile marketing for dummies. Wiley Publishing. |
IOS 7 PROGRAMMING PUSHING THE LIMITS - DEVELOPING EXTRAORDINARY MOBILE APPS FOR APPLE IPHONE, IPAD AND IPOD TOUCH |
Napier, R., & Kumar, M. (2014). iOS 7 programming: Pushing the limits: Developing extraordinary mobile apps for Apple iPhone, iPad, and iPod touch. WILEY A John Wiley & Sons, Publication. |
NETWORKING AND ONLINE GAMES - UNDERSTANDING AND ENGINEERING MULTIPLAYER INTERNET GAMES |
Armitage, G., Claypool, M., & Branch, P. (2006). Networking and online games: Understanding and engineering multiplayer internet games. John Wiley & Sons. |
MOBILE ACCESS SAFETY |
Assing, D., & Cale, S. (2013). Mobile access safety: Beyond BYOD. iSTE; WILEY. |
SWITCH/ROUTER ARCHITECTURES: SHARED-BUS AND SHARED-MEMORY BASED SYSTEMS |
Aweya, J. (2018). Switch/router architectures: Shared-bus and shared-memory based systems. IEEE PRESS; WILEY. |
INTERNET OF THINGS - EVOLUTIONS AND INNOVATIONS |
Bouhaï, N., & Saleh, I. (eds.) (2017). Internet of things: Evolutions and innovations (Vol. 4). iSTE; WILEY. |
GLOBAL NETWORKS - ENGINEERING, OPERATIONS AND DESIGN |
Cambron, G. K. (2013). Global networks: Engineering, operations and design. IEEE; WILEY A John Wiley & Sons, Publication. |
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS |
Himma, K. E., & Tavani, H. T. (Eds.) (2008). The handbook of information and computer ethics. WILEY. |
PROGRAMMING MOBILE DEVICES - AN INTRODUCTION FOR PRACTITIONERS |
Mikkonen, T. (2007). Programming mobile devices: An introduction for practitioners. John Wiley & Sons. |
NETWORK ROUTING - FUNDAMENTALS, APPLICATIONS AND EMERGING TECHNOLOGIES |
Misra, S., & Goswami, S. (2017). Network routing: Fundamentals, applications, and emerging technologies. WILEY. |
NETWORKING FUNDAMENTALS: WIDE, LOCAL AND PERSONAL AREA COMMUNICATIONS |
Pahlavan, K., & Krishnamurthy, P. (2009). Networking fundamentals: Wide, local and personal area communications. WILEY A John Wiley & Sons, Publication. |
OPTIMIZATION OF COMPUTER NETWORKS - MODELING AND ALGORITHMS - A HANDS-ON APPROACH |
Mariño, P. P. (2016). Optimization of computer networks: Modeling and algorithms: A hands-on approach. WILEY. |
UBIQUITOUS COMPUTING - SMART DEVICES, ENVIRONMENTS AND INTERACTIONS |
Poslad, S. (2009). Ubiquitous computing: Smart devices, environments and interactions. WILEY A John Wiley & Sons, Publication. |
JAVASCRIPT AND OPEN DATA |
Jeansoulin, R. (2018). JavaScript and open data. iSTE; WILEY. |
HARNESSING GREEN IT - PRINCIPLES AND PRACTICES |
Murugesan, S., & Gangadharan, G. R. (eds.) (2012). Harnessing green IT: Principles and practices. IEEE computer society; IEEE; WILEY A John Wiley & Sons, Publication. |
Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems |
Wang, S. P., & Ledley, R. S. (2013). Computer architecture and security: Fundamentals of designing secure computer systems. WILEY; HIGHER EDUCATION PRESS. |
ALGORITHMS AND NETWORKING FOR COMPUTER GAMES, 2ND EDITION |
Smed, J., & Hakonen, H. (2017). Algorithms and networking for computer games (2nd ed.). WILEY. |
CYBERSECURITY FOR EXECUTIVES: A PRACTICAL GUIDE |
Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for executives: A practical guide. AIChE; WILEY. |
EXPLORING BEAGLEBONE: TOOLS AND TECHNIQUES FOR BUILDING WITH EMBEDDED LINUX |
Molloy, D. (2015). Exploring BeagleBone: Tools and techniques for building with embedded Linux. WILEY. |
EXPLORING RASPBERRY PI |
Molloy, D. (2016). Exploring Raspberry Pi: Interfacing to the real world with embedded Linux. WILEY. |
FUNDAMENTALS OF POWER INTEGRITY FOR COMPUTER PLATFORMS AND SYSTEMS |
DiBene, J. T. (2014). Fundamentals of power integrity for computer platforms and systems. WILEY. |
ADVANCED INSTRUMENTATION AND COMPUTER I/O DESIGN SECOND EDITION: DEFINED ACCURACY DECISION, CONTROL, AND PROCESS APPLICATIONS |
Garrett, P. H. (2013). Advanced instrumentation and computer I/O design: Defined accuracy decision, control with process applications (2nd ed.). IEEE Press; WILEY A John Wiley & Sons, Publication. |
ILLUSTRATOR CC DIGITAL CLASSROOM |
Smith, J., & AGI Creative Team. (2013). Adobe Illustrator CC digital classroom. WILEY; AGI. |
INDESIGN CC DIGITAL CLASSROOM |
Smith, C., & AGI Creative Team. (2013). Adobe InDesign CC digital classroom. WILEY; AGI. |
PREMIERE PRO CS6 DIGITAL CLASSROOM |
Smith, J., & AGI Training Team. (2012). Adobe Premiere pro CS6 digital classroom. John Wiley & Sons; AGI. |
A PRACTICAL INTRODUCTION TO COMPUTER VISION WITH OPENCV3 |
Dawson-Howe, K. (2014). A practical introduction to computer vision with OpenCV. WILEY. |
HANDBOOK OF DIGITAL FORENSICS OF MULTIMEDIA DATA AND DEVICES |
Ho, A. T. S., & Li, S. (Eds.) (2015). Handbook of digital forensics of multimedia data and devices. WILEY; IEEE Press. |
COLOR: AN INTRODUCTION TO PRACTICE AND PRINCIPLES, THIRD EDITION |
Kuehni, R. G. (2013). Color: An introduction to practice and principles (3rd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION. |
HOW TO DO SYSTEMS ANALYSIS: PRIMER AND CASEBOOK |
Gibson, J. E., Scherer, W. T., Gibson, W. F., & Smith, M. C. (2017). How to do systems analysis primer and casebook. Wiley. |
INCOSE SYSTEMS ENGINEERING HANDBOOK |
International Council on Systems Engineering (INCOSE), Walden, D. D., Roedler, G. J., Forsberg, K. J., Hamelin, R. D., & Shortell, T. M. (Eds.) (2015). Systems engineering handbook: A guide for system life cycle processes and activities (4th ed.). WILEY. |
SYSTEMS ENGINEERING PRINCIPLES AND PRACTICE, SECOND EDITION |
Kossiakoff, A., Sweet, W. N., Seymour, S. J., & Biemer, S. M. (2011). Systems engineering principles and practice (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION. |
REAL-TIME SYSTEMS DESIGN AND ANALYSIS: TOOLS FOR THE PRACTITIONER, FOURTH EDITION |
Laplante, P. A., & Ovaska, S. J. (2012). Real-time systems design and analysis: Tools for the practitioner (4th ed.). IEEE PRESS; WILEY A JOHN WILEY & SONS, PUBLICATION. |
INFORMATION TECHNOLOGY RISK MANAGEMENT IN ENTERPRISE ENVIRONMENTS: A REVIEW OF INDUSTRY PRACTICES AND A PRACTICAL GUIDE TO RISK MANAGEMENT TEAMS |
Kouns, J., & Minoli, D. (2010). Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams. WILEY A JOHN WILEY & SONS, PUBLICATION. |
TRADE-OFF ANALYTICS: CREATING AND EXPLORING THE SYSTEM TRADESPACE |
Parnell, G. S. (Ed.) (2017). Trade-off analytics: Creating and exploring the system tradespace. WILEY. |
DECISION MAKING IN SYSTEMS ENGINEERING AND MANAGEMENT, 2ND EDITION |
Parnell, G. S., Driscoll, P. J., & Henderson, D. L. (Eds.) (2011). Decision making in systems engineering and management (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION. |
MODELING AND SIMULATION SUPPORT FOR SYSTEM OF SYSTEMS ENGINEERING APPLICATIONS |
Rainey, L. B., & Tolk, A. (Eds.) (2015). Modeling and simulation support for system of systems engineering applications. WILEY. |
FORENSIC SYSTEMS ENGINEERING: EVALUATING OPERATIONS BY DISCOVERY |
Stimson, W. A. (2018). Forensic systems engineering: Evaluating operations by discovery. WILEY. |
PROBABILITY AND STATISTICS WITH RELIABILITY, QUEUING AND COMPUTER SCIENCE APPLICATIONS |
Trivedi, K. S. (2016). Probability and statistics with reliability, queuing, and computer science applications (2nd ed.). WILEY. |
SYSTEM ENGINEERING ANALYSIS, DESIGN, AND DEVELOPMENT: CONCEPTS, PRINCIPLES, AND PRACTICES, SECOND EDITION |
Wasson, C. S. (2016). System engineering analysis, design, and development: Concepts, principles, and practices. WILEY. |