Title Webliographies
70-742 IDENTITY WITH WINDOWS SERVER 2016 LAB MANUAL Regan, P. (2018). Identity with Windows Server 2016 exam 70-742: Lab manual. WILEY.
THE OFFICIAL BBC MICRO:BIT USER GUIDE Halfacree, G. (2018). The official BBC micro:bit user guide. WILEY.
RASPBERRY PI USER GUIDE, 4TH EDITION Upton, E., & Halfacree, G. (2016). Raspberry Pi user guide (4th ed.). WILEY.
BEGINNING MICROSOFT SQL SERVER 2012 PROGRAMMING Atkinson, P., & Vieira, R. (2012). Beginning Microsoft SQL Server 2012 programming. John Wiley & Sons.
MYSQL ADMINISTRATOR'S BIBLE Cabral, S., & Murphy, K. (2009). MySQL administrators bible. Wiley Publishing.
MICROSOFT SQL SERVER 2012 ADMINISTRATION: REAL-WORLD SKILLS FOR MCSA CERTIFICATION AND BEYOND (EXAMS 70-461, 70-462, AND 70-463) Carpenter, T. (2013). Microsoft SQL server 2012 administration: Real world skills for MCSA certification and beyond. SYBEX A Wiley Brand.
MICROSOFT SQL SERVER 2012 BIBLE Jorgensen, A., LeBlanc, P., Chinchilla, J., Segarra, J., & Nelson, A. (2012). Microsoft SQL Server 2012 bible. John Wiley & Sons.
PROFESSIONAL MICROSOFT SQL SERVER 2014 ADMINISTRATION Jorgensen, A., Ball, B., Wort, S., LoForte, R., & Knight, B. (2014). Professional: SQL Server 2014 administration. wrox A Wiley Brand.
PROFESSIONAL MICROSOFT SQL SERVER 2014 INTEGRATION SERVICES Knight, B., Knight, D., Moss, J. M., Davis, M., & Rock, C. (2014). Professional Microsoft SQL Server 2014 integration services. wrox A Wiley Brand.
SQL BIBLE, SECOND EDITION Kriegel, A., & Trukhnov, B. M. (2008). SQL bible (2nd ed.). Wiley Publishing.
PROFESSIONAL MICROSOFT SQL SERVER 2008 PROGRAMMING Vieira, R. (2009). Professional Microsoft SQL Server 2008 programming. Wiley Publishing.
PRACTICAL REVERSE ENGINEERING: X86, X64, ARM, WINDOWS KERNEL, REVERSING TOOLS, AND OBFUSCATION Dang, B., Gazet, A., Bachaalany, E., & Josse S. (2014). Practical reverse engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. WILEY.
THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEMS SOFTWARE, & NETWORKING: AN INFORMATION TECHNOLOGY APPROACH, FIFTH EDITION Englander, I. (2014). The architecture of computer hardware, systems software, & networking : An information technology approach (5th ed.). WILEY.
LEARNING COMPUTER ARCHITECTURE WITH RASPBERRY PI Upton, E., Duntemann, J., Roberts, R., Mamtora, T., & Everard, B. (2016). Learning computer architecture with Raspberry Pi. WILEY.
INTRODUCTION TO NETWORKING BASICS, SECOND EDITION Ciccarelli, P., Faulkner, C., Fitzgerald, J., Dennis, A., Groth, D., Skandier, T., & Miller, F. (2013). Networking basics (2nd ed.). John Wiley & Sons.
WILEY PATHWAYS NETWORK SECURITY FUNDAMENTALS Cole, E., Krutz , R. L., Conley, J. W., Reisman, B., Ruebush, M., Gollmann, D., & Reese, R. (2008). Network security fundamentals. John Wiley & Sons.
WILEY PATHWAYS NETWORK SECURITY FUNDAMENTALS PROJECT MANUAL Cole, E., Krutz , R. L., Conley, J. W., Reisman, B., Ruebush, M., Gollmann, D., & Reese, R. (2007). Network security fundamentals: Project manual. John Wiley & Sons.
BUSINESS DATA COMMUNICATIONS AND NETWORKING, THIRTEENTH EDITION STUDENT CHOICE FitzGerald, J., Dennis, A., & Durcikova, A. (2017). Business data communications and networking (13th ed.). WILEY.
BUSINESS DATA COMMUNICATIONS AND NETWORKING, TWELTH EDITION FitzGerald, J., Dennis, A., & Durcikova, A. (2015). Business data communications and networking (12th ed.). WILEY.
VERSATILE ROUTING AND SERVICES WITH BGP: UNDERSTANDING AND IMPLEMENTING BGP IN SR-OS Bookham, C. (2014). Versatile routing and services with BGP: Understanding and implementing BGP in SR-OS. WILEY.
STORAGE AREA NETWORK ESSENTIALS: A COMPLETE GUIDE TO UNDERSTANDING AND IMPLEMENTING SANS (VERITAS SERIES) Barker, R., & Massiglia, P. (2002). Storage area network essentials: A complete guide to understanding and implementing SANs. Wiley Computer Publishing John Wiley & Sons.
MICROSOFT WINDOWS OPERATING SYSTEM ESSENTIALS Carpenter, T. (2012). Microsoft Windows operating system: Essentials. John Wiley & Sons.
MICROSOFT WINDOWS SERVER ADMINISTRATION ESSENTIALS (98-365) Carpenter, T. (2011). Microsoft Windows Server administration: Essentials. John Wiley & Sons.
NETWORKING SELF-TEACHING GUIDE: OSI, TCP/IP, LANS, MANS, WANS, IMPLEMENTATION, MANAGEMENT, AND MAINTENANCE Edwards, J., & Bramante, R. (2009). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. Wiley Publishing.
MASTERING EXCHANGE SERVER 2013 Elfassy, D. (2014). Mastering Exchange Server 2013. SYBEX A Wiley Brand.
INFORMATION STORAGE AND MANAGEMENT: STORING, MANAGING, AND PROTECTING DIGITAL INFORMATION 2E Gnanasundaram, S., & Shrivastava, A. (Eds.) (2012). Information storage and management: Storing, managing, and protecting digital information in classic, virtualized, and cloud environments (2nd ed.). John Wiley & Sons.
MICROSOFT WINDOWS NETWORKING ESSENTIALS Gibson, D. (2011). Microsoft Windows networking: Essentials. Wiley Publishing.
MICROSOFT WINDOWS SECURITY ESSENTIALS Gibson, D. (2011). Microsoft Windows security: Essentials. Wiley Publishing.
THE NETWORK SECURITY TEST LAB: A STEP-BY-STEP GUIDE Gregg, M. (2015). The network security test lab: A step-by-step guide. WILEY.
MICROSOFT WINDOWS SERVER 2012 ADMINISTRATION INSTANT REFERENCE Hester, M., & Henley, C. (2013). Microsoft Windows Server 2012 administration: Instant reference. SYBEX A Wiley Brand.
ALCATEL-LUCENT SCALABLE IP NETWORKS SELF-STUDY GUIDE: PREPARING FOR THE NETWORK ROUTING SPECIALIST I(NRS I) CERTIFICATION EXAM (4A0-100) Hundley, K. (2009). Alcatel-Lucent scalable IP networks self-study guide: Preparing for the network routing specialist I (NRS 1) certification exam (4A0-100). Wiley Publishing; Alcatel-Lucent.
CLOUD SECURITY: A COMPREHENSIVE GUIDE TO SECURE CLOUD COMPUTING Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.
SECURING SCADA SYSTEMS Krutz, R. L. (2006). Securing SCADA systems. Wiley Publishing.
CCNA ROUTING AND SWITCHING COMPLETE REVIEW GUIDE (EXAMS 100-105, 200-105, 200-125) 2E Lammle, T. (2017). CANA routing and switching complete: Review guide (2nd ed.). SYBEX A Wiley Brand.
MASTERING MICROSOFT EXCHANGE SERVER 2016 Leonard, C., Svidergol, B., Wright, B., & Meloski, V. (2016). Mastering Microsoft exchange server 2016. SYBEX A Wiley Brand.
SECURITY INTELLIGENCE: A PRACTITIONER'S GUIDE TO SOLVING ENTERPRISE SECURITY CHALLENGES Li, Q., & Clark, G. (2015). Security intelligence: A practitioner's guide to solving enterprise security challenges. WILEY.
NETWORKING ALL-IN-ONE FOR DUMMIES, 7E Lowe, D. (2018). Networking all-in-one (7th ed.). for dummies A Wiley Brand.
CCSP OFFICIAL (ISC)2 PRACTICE TESTS Malisow, B. (2018). CCSP Official (ISC)2 practice tests. SYBEX A Wiley Brand.
MASTERING SYSTEM CENTER 2012 R2 CONFIGURATION MANAGER Martinez, S., Daalmans, P., & Bennett, B. (2014). Mastering system center 2012 R2 configuration manager. SYBEX A Wiley Brand.
CCNA SECURITY STUDY GUIDE: EXAM 210-260 McMillan, T. (2018). CCNA security study guide: Exam 210-260. SYBEX A Wiley Brand.
CISCO NETWORKING ESSENTIALS, SECOND EDITION McMillan, T. (2015). Cisco networking: Essentials (2nd ed.). AUTODESK Official Press; SYBEX A Wiley Brand.
NETWORK FORENSICS Messier, R. (2017). Network forensics. WILEY.
MASTERING WINDOWS SERVER 2012 R2 Minasi, M., Greene, K., Booth, C., Butler, R., McCabe, J., Panek, R., Rice, M., & Roth, S. (2014). Mastering Windows Server 2012 R2. SYBEX A Wiley Brand.
NETWORK ATTACKS & EXPLOITATION: A FRAMEWORK Monte, M. (2015). Network attacks & exploitation: A framework. WILEY.
SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD Schneier, B. (2000). Secrets and lies: Digital security in a networked world. Wiley Publishing.
THE ALL-NEW SWITCH BOOK: THE COMPLETE GUIDE TO LAN SWITCHING TECHNOLOGY Seifert, R., & Edwards, J. (2008). The all-new switch book: The complete guide to LAN switching technology (2nd ed.). Wiley Publishing.
THREAT MODELING: DESIGNING FOR SECURITY Shostack, A. (2014). Threat modeling: Designing for security. WILEY.
THE WEB APPLICATION HACKER'S HANDBOOK: FINDING AND EXPLOITING SECURITY FLAWS 2E Stuttard, D., & Pinto, M. (2011). The web application hacker’s handbook: Finding and exploiting security flaws (2nd ed.). Wiley Publishing.
MASTERING WINDOWS SERVER 2016 Svidergol, B., Meloski, V., Wright, B., Martinez, S., & Bassett, D. (2018). Mastering Windows Server 2016. SYBEX A Wiley Brand.
CISCO NETWORKING ALL-IN-ONE FOR DUMMIES(R) Tetz, E. (2011). Cisco networking all-in-one for dummies. John Wiley & Sons.
RED HAT ENTERPRISE LINUX 6 ADMINISTRATION: REAL WORLD SKILLS FOR RED HAT ADMINISTRATORS van Vugt, S. (2013). Red Hat Enterprise Linux 6 administration: Real world skills for Red Hat administrators. John Wiley & Sons.
ALCATEL-LUCENT SERVICE ROUTING ARCHITECT (SRA) SELF-STUDY GUIDE: PREPARING FOR THE BGP, VPRN AND MULTICAST EXAMS Warnock, G., Ghafary, M., & Shaheen, G. (2015). Alcatel-Lucent service routing architect (SRA) self-study guide: Preparing for the BGP, VPRN and multicast exams. WILEY.
DESIGNING AND IMPLEMENTING IP/MPLS-BASED ETHERNET LAYER 2 VPN SERVICES: AN ADVANCED GUIDE FOR VPLS AND VLL Xu, Z. (2010). Designing and implementing IP/MPLS-based ethernet layer 2 VPN services: An advanced guide for VPLS and VLL. Wiley Publishing; Alcatel-Lucent.
PROFESSIONAL SHAREPOINT 2013 ADMINISTRATION Young, S., Caravajal, S., & Klindt, T. (2013). Professional SharePoint 2013 administration. wrox A Wiley Brand.
CYBER SECURITY POLICY GUIDEBOOK Bayuk, J. L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J., & Weiss, J. (2012). Cyber security policy guidebook. WILEY A John Wiley & Sons, Publication.
SECURITY IN FIXED AND WIRELESS NETWORKS 2E Schaefer, G., & Rossberg, M. (2016). Security in fixed and wireless networks (2nd ed.). WILEY.
Introduction to Network Security: Theory and Practice Wang, J., & Kissel, Z. A. (2015). Introduction to network security: Theory and practice. WILEY; Higher Education Press.
EXAM 98-365 MTA WINDOWS SERVER ADMINISTRATION FUNDAMENTALS Microsoft Official Academic Courses. (2011). Windows Server administration fundamentals, exam 98-365. WILEY.
EXAM 98-367 SECURITY FUNDAMENTALS Microsoft Official Academic Courses. (2012). Security fundamentals, exam 98-367. WILEY.
INTRODUCTION TO NETWORKING WITH NETWORK+ Pintello, T. (2013). Introduction to networking with Network+. WILEY.
WILEY PATHWAYS WINDOWS NETWORK ADMINISTRATION PROJECT MANUAL Ulmer, L. W. (2008). Windows network administration: Project manual. WILEY.
WILEY PATHWAYS WINDOWS NETWORK ADMINISTRATION, FIRST EDITION Suehring, S., Chellis, J., Sheltz, M., Shapiro, J. R., Boyce, J., Robichaux, P. E., Lowe, D., & Hill, B. (2008). Windows network administration. John Wiley & Sons.
AWS CERTIFIED ADVANCED NETWORKING OFFICIAL STUDY GUIDE - SPECIALTY EXAM Chauhan, S., Devine, J., Halachmi, A., Lehwess, M., Matthews, N., Morad, S., & Seymour, S. (2018). AWS certified advanced networking: Official study guide specialty exam. SYBEX A Wiley Brand.
MOBILE COMPUTING DEPLOYMENT AND MANAGEMENT: REAL WORLD SKILLS FOR COMPTIA MOBILITY+ CERTIFICATION AND BEYOND Bartz, R. J. (2015). Mobile computing deployment and management: Real world skills for CompTIA Mobility+ certification and beyond. SYBEX A Wiley Brand.
MOBILE MARKETING FOR DUMMIES Becker, M., & Arnold, J. (2010). Mobile marketing for dummies. Wiley Publishing.
IOS 7 PROGRAMMING PUSHING THE LIMITS - DEVELOPING EXTRAORDINARY MOBILE APPS FOR APPLE IPHONE, IPAD AND IPOD TOUCH Napier, R., & Kumar, M. (2014). iOS 7 programming: Pushing the limits: Developing extraordinary mobile apps for Apple iPhone, iPad, and iPod touch. WILEY A John Wiley & Sons, Publication.
NETWORKING AND ONLINE GAMES - UNDERSTANDING AND ENGINEERING MULTIPLAYER INTERNET GAMES Armitage, G., Claypool, M., & Branch, P. (2006). Networking and online games: Understanding and engineering multiplayer internet games. John Wiley & Sons.
MOBILE ACCESS SAFETY Assing, D., & Cale, S. (2013). Mobile access safety: Beyond BYOD. iSTE; WILEY.
SWITCH/ROUTER ARCHITECTURES: SHARED-BUS AND SHARED-MEMORY BASED SYSTEMS Aweya, J. (2018). Switch/router architectures: Shared-bus and shared-memory based systems. IEEE PRESS; WILEY.
INTERNET OF THINGS - EVOLUTIONS AND INNOVATIONS Bouhaï, N., & Saleh, I. (eds.) (2017). Internet of things: Evolutions and innovations (Vol. 4). iSTE; WILEY.
GLOBAL NETWORKS - ENGINEERING, OPERATIONS AND DESIGN Cambron, G. K. (2013). Global networks: Engineering, operations and design. IEEE; WILEY A John Wiley & Sons, Publication.
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS Himma, K. E., & Tavani, H. T. (Eds.) (2008). The handbook of information and computer ethics. WILEY.
PROGRAMMING MOBILE DEVICES - AN INTRODUCTION FOR PRACTITIONERS Mikkonen, T. (2007). Programming mobile devices: An introduction for practitioners. John Wiley & Sons.
NETWORK ROUTING - FUNDAMENTALS, APPLICATIONS AND EMERGING TECHNOLOGIES Misra, S., & Goswami, S. (2017). Network routing: Fundamentals, applications, and emerging technologies. WILEY.
NETWORKING FUNDAMENTALS: WIDE, LOCAL AND PERSONAL AREA COMMUNICATIONS Pahlavan, K., & Krishnamurthy, P. (2009). Networking fundamentals: Wide, local and personal area communications. WILEY A John Wiley & Sons, Publication.
OPTIMIZATION OF COMPUTER NETWORKS - MODELING AND ALGORITHMS - A HANDS-ON APPROACH Mariño, P. P. (2016). Optimization of computer networks: Modeling and algorithms: A hands-on approach. WILEY.
UBIQUITOUS COMPUTING - SMART DEVICES, ENVIRONMENTS AND INTERACTIONS Poslad, S. (2009). Ubiquitous computing: Smart devices, environments and interactions. WILEY A John Wiley & Sons, Publication.
JAVASCRIPT AND OPEN DATA Jeansoulin, R. (2018). JavaScript and open data. iSTE; WILEY.
HARNESSING GREEN IT - PRINCIPLES AND PRACTICES Murugesan, S., & Gangadharan, G. R. (eds.) (2012). Harnessing green IT: Principles and practices. IEEE computer society; IEEE; WILEY A John Wiley & Sons, Publication.
Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems Wang, S. P., & Ledley, R. S. (2013). Computer architecture and security: Fundamentals of designing secure computer systems. WILEY; HIGHER EDUCATION PRESS.
ALGORITHMS AND NETWORKING FOR COMPUTER GAMES, 2ND EDITION Smed, J., & Hakonen, H. (2017). Algorithms and networking for computer games (2nd ed.). WILEY.
CYBERSECURITY FOR EXECUTIVES: A PRACTICAL GUIDE Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for executives: A practical guide. AIChE; WILEY.
EXPLORING BEAGLEBONE: TOOLS AND TECHNIQUES FOR BUILDING WITH EMBEDDED LINUX Molloy, D. (2015). Exploring BeagleBone: Tools and techniques for building with embedded Linux. WILEY.
EXPLORING RASPBERRY PI Molloy, D. (2016). Exploring Raspberry Pi: Interfacing to the real world with embedded Linux. WILEY.
FUNDAMENTALS OF POWER INTEGRITY FOR COMPUTER PLATFORMS AND SYSTEMS DiBene, J. T. (2014). Fundamentals of power integrity for computer platforms and systems. WILEY.
ADVANCED INSTRUMENTATION AND COMPUTER I/O DESIGN SECOND EDITION: DEFINED ACCURACY DECISION, CONTROL, AND PROCESS APPLICATIONS Garrett, P. H. (2013). Advanced instrumentation and computer I/O design: Defined accuracy decision, control with process applications (2nd ed.). IEEE Press; WILEY A John Wiley & Sons, Publication.
ILLUSTRATOR CC DIGITAL CLASSROOM Smith, J., & AGI Creative Team. (2013). Adobe Illustrator CC digital classroom. WILEY; AGI.
INDESIGN CC DIGITAL CLASSROOM Smith, C., & AGI Creative Team. (2013). Adobe InDesign CC digital classroom. WILEY; AGI.
PREMIERE PRO CS6 DIGITAL CLASSROOM Smith, J., & AGI Training Team. (2012). Adobe Premiere pro CS6 digital classroom. John Wiley & Sons; AGI.
A PRACTICAL INTRODUCTION TO COMPUTER VISION WITH OPENCV3 Dawson-Howe, K. (2014). A practical introduction to computer vision with OpenCV. WILEY.
HANDBOOK OF DIGITAL FORENSICS OF MULTIMEDIA DATA AND DEVICES Ho, A. T. S., & Li, S. (Eds.) (2015). Handbook of digital forensics of multimedia data and devices. WILEY; IEEE Press.
COLOR: AN INTRODUCTION TO PRACTICE AND PRINCIPLES, THIRD EDITION Kuehni, R. G. (2013). Color: An introduction to practice and principles (3rd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION.
HOW TO DO SYSTEMS ANALYSIS: PRIMER AND CASEBOOK Gibson, J. E., Scherer, W. T., Gibson, W. F., & Smith, M. C. (2017). How to do systems analysis primer and casebook. Wiley.
INCOSE SYSTEMS ENGINEERING HANDBOOK International Council on Systems Engineering (INCOSE), Walden, D. D., Roedler, G. J., Forsberg, K. J., Hamelin, R. D., & Shortell, T. M. (Eds.) (2015). Systems engineering handbook: A guide for system life cycle processes and activities (4th ed.). WILEY.
SYSTEMS ENGINEERING PRINCIPLES AND PRACTICE, SECOND EDITION Kossiakoff, A., Sweet, W. N., Seymour, S. J., & Biemer, S. M. (2011). Systems engineering principles and practice (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION.
REAL-TIME SYSTEMS DESIGN AND ANALYSIS: TOOLS FOR THE PRACTITIONER, FOURTH EDITION Laplante, P. A., & Ovaska, S. J. (2012). Real-time systems design and analysis: Tools for the practitioner (4th ed.). IEEE PRESS; WILEY A JOHN WILEY & SONS, PUBLICATION.
INFORMATION TECHNOLOGY RISK MANAGEMENT IN ENTERPRISE ENVIRONMENTS: A REVIEW OF INDUSTRY PRACTICES AND A PRACTICAL GUIDE TO RISK MANAGEMENT TEAMS Kouns, J., & Minoli, D. (2010). Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams. WILEY A JOHN WILEY & SONS, PUBLICATION.
TRADE-OFF ANALYTICS: CREATING AND EXPLORING THE SYSTEM TRADESPACE Parnell, G. S. (Ed.) (2017). Trade-off analytics: Creating and exploring the system tradespace. WILEY.
DECISION MAKING IN SYSTEMS ENGINEERING AND MANAGEMENT, 2ND EDITION Parnell, G. S., Driscoll, P. J., & Henderson, D. L. (Eds.) (2011). Decision making in systems engineering and management (2nd ed.). WILEY A JOHN WILEY & SONS, PUBLICATION.
MODELING AND SIMULATION SUPPORT FOR SYSTEM OF SYSTEMS ENGINEERING APPLICATIONS Rainey, L. B., & Tolk, A. (Eds.) (2015). Modeling and simulation support for system of systems engineering applications. WILEY.
FORENSIC SYSTEMS ENGINEERING: EVALUATING OPERATIONS BY DISCOVERY Stimson, W. A. (2018). Forensic systems engineering: Evaluating operations by discovery. WILEY.
PROBABILITY AND STATISTICS WITH RELIABILITY, QUEUING AND COMPUTER SCIENCE APPLICATIONS Trivedi, K. S. (2016). Probability and statistics with reliability, queuing, and computer science applications (2nd ed.). WILEY.
SYSTEM ENGINEERING ANALYSIS, DESIGN, AND DEVELOPMENT: CONCEPTS, PRINCIPLES, AND PRACTICES, SECOND EDITION Wasson, C. S. (2016). System engineering analysis, design, and development: Concepts, principles, and practices. WILEY.
Back to Top