Latest Morgan Kaufmann and Syngress Books

Recently Added Titles: Updated July 2016

  1. A Practical Guide to Writing a Ruth L. Kirschstein NRSA Grant
  2. Academia to Biotechnology: Career Changes at any Stage
  3. Active Shooter: Preparing for and Responding to a Growing Threat
  4. Agent-Based Spatial Simulation with NetLogo Volume 1
  5. Agile Data Warehousing for the Enterprise: A Guide for Solution Architects and Project Leader
  6. Agile Systems Engineering
  7. Artificial Intelligence: A New Synthesis
  8. Automating Open Source Intelligence: Algorithms for OSINT
  9. Be in Charge: A Leadership Manual: How to Stay on Top
  10. Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders
  11. Bio-Inspired Networking
  12. Building a Scalable Data Warehouse with Data Vault 2.0
  13. Chaos and Fractals: A Computer Graphical Journey
  14. Cloud Storage Security: A Practical Guide
  15. CMDB Systems: Making Change Work in the Age of Cloud and Agile
  16. Cognitive Sciences: Basic Problems, New Perspectives, and Implications for Artificial Intelligence
  17. Continuous Architecture: Sustainable Architecture in an Agile and Cloud-Centric World
  18. Cyber-Physical Attacks: A Growing Invisible Threat
  19. Cyber Reconnaissance, Surveillance and Defense
  20. Data Analysis in the Cloud: Models, Techniques and Applications
  21. Data Architecture: A Primer for the Data Scientist Big Data, Data Warehouse and Data Vault
  22. Dazzle 'Em With Style: The Art of Oral Scientific Presentation
  23. Digital Design and Computer Architecture: ARM Edition
  24. Digital Identity Management
  25. Dissecting the Hack: The V3rb0t3n Network
  26. Effective Security Management
  27. Embedded Systems: ARM Programming and Optimization
  28. Emergency Preparedness for Business Professionals: How to Mitigate and Respond to Attacks Against Your Organization
  29. Emerging Trends in Computational Biology, Bioinformatics, and Systems Biology: Algorithms and Software Tools
  30. Ensuring Digital Accessibility through Process and Policy
  31. Enterprise Risk Management: A Common Framework for the Entire Organization
  32. Entity Information Life Cycle for Big Data: Master Data Management and Information Integration
  33. Equitable Solutions for Retaining a Robust STEM Workforce: Beyond Best Practices
  34. Essentials of Artificial Intelligence
  35. From Academia to Entrepreneur: Lessons from the Real World
  36. Formal Verification: An Essential Toolkit for Modern VLSI Design
  37. Google Hacking for Penetration Testers
  38. GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
  39. Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
  40. Hidden Semi-Markov Models: Theory, Algorithms and Applications
  41. High Performance Parallelism Pearls Volume Two: Multicore and Many-core Programming Approaches
  42. High Speed Digital Design: Design of High Speed Interconnects and Signaling
  43. Improving the User Experience through Practical Data Analytics: Gain Meaningful Insight and Increase Your Bottom Line
  44. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
  45. Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
  46. Infosec Management Fundamentals
  47. Interdisciplinary Mentoring in Science: Strategies for Success
  48. Internet Congestion Control
  49. Introduction to Social Media Investigation: A Hands-on Approach
  50. Introduction to Statistical Machine Learning
  51. Joe Celko's SQL for Smarties: Advanced SQL Programming
  52. Keeping Religious Institutions Secure
  53. Learning-Based Local Visual Representation and Indexing
  54. Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
  55. Mobile Data Loss: Threats and Countermeasures
  56. Multi-Domain Master Data Management: Advanced MDM and Data Governance in Practice
  57. Navigating Academia: A Guide for Women and Minority STEM Faculty
  58. Next Generation Red Teaming
  59. Online Social Networks: Human COgnitive Constraints in Facebook and Twitter Personal Graphs
  60. Operating Systems Forensics
  61. Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector
  62. Planning a Career in Biomedical and Life Sciences: Making Informed Choices
  63. Power and Performance: Software Analysis and Optimization
  64. Problem-solving in High Performance Computing: A Situational Awareness Approach with Linux
  65. Python Passive Network Mapping: P2NMAP
  66. Predictive Analytics and Data Mining: Concepts and Practice with RapidMiner
  67. Presumptive Design: Design Provocations for Innovation
  68. RDF Database Systems: Triples Storage and SPARQL Query Processing
  69. Readings in Artificial Intelligence
  70. Readings in Distributed Artificial Intelligence
  71. Refactoring for Software Design Smells: Managing Technical Debt
  72. Repurposing Legacy Data: Innovative Case Studies
  73. Research Proposals: A Guide to Success
  74. Secrets to Success in Industry Careers: Essential Skills for Science and Business
  75. Security Controls Evaluation, Testing, and Assessment Handbook
  76. Securing Social Media in the Enterprise
  77. Securing the Outdoor Construction Site: Strategy, Prevention, and Mitigation
  78. Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits
  79. Security Operations Management
  80. Security Supervision and Management: Theory and Practice of Asset Protection
  81. Service Computing: Concept, Method and Technology
  82. Shared Memory Application Programming: Concepts and Strategies in Multicore Application Programming
  83. Sharing Data and Models in Software Engineering
  84. Smart Grid Security: Innovative Solutions for a Modernized Grid
  85. Social Sensing: Building Reliable Systems on Unreliable Data
  86. Software Quality Assurance: In Large Scale and Complex Software-intensive Systems
  87. Successful User Experience: Strategies and Roadmaps
  88. Texturing and Modeling: A Procedural Approach
  89. The Art and Science of Analyzing Software Data
  90. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
  91. The Manual of Scientific Style: A Guide for Authors, Editors, and Researchers
  92. The Road to Success: A Career Manual - How to Advance to the Top
  93. Thor's OS Xodus: Why And How I Left Windows For OS X
  94. Threat Assessment and Risk Analysis: An Applied Approach
  95. Topics in Parallel and Distributed Computing: Introducing Concurrency in Undergraduate Courses
  96. Wireless Public Safety Networks Volume 1: Overview and Challenges
  97. Workplace Safety: Establishing an Effective Violence Prevention Program
  98. You: For Sale: Protecting Your Personal Data and Privacy Online

You can find all Morgan Kaufmann and Syngress titles in our eBook catalog.


The important thing is not to stop questioning.


Safari Books Online                         Books 24x7