Log in with your ACM Web Account

I forgot my password
Create an ACM Web Account

Latest Morgan Kaufmann and Syngress Books

Recently Added Titles: Updated July 2016

  1. A Practical Guide to Writing a Ruth L. Kirschstein NRSA Grant
  2. Academia to Biotechnology: Career Changes at any Stage
  3. Active Shooter: Preparing for and Responding to a Growing Threat
  4. Agent-Based Spatial Simulation with NetLogo Volume 1
  5. Agile Data Warehousing for the Enterprise: A Guide for Solution Architects and Project Leader
  6. Agile Systems Engineering
  7. Artificial Intelligence: A New Synthesis
  8. Automating Open Source Intelligence: Algorithms for OSINT
  9. Be in Charge: A Leadership Manual: How to Stay on Top
  10. Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders
  11. Bio-Inspired Networking
  12. Building a Scalable Data Warehouse with Data Vault 2.0
  13. Chaos and Fractals: A Computer Graphical Journey
  14. Cloud Storage Security: A Practical Guide
  15. CMDB Systems: Making Change Work in the Age of Cloud and Agile
  16. Cognitive Sciences: Basic Problems, New Perspectives, and Implications for Artificial Intelligence
  17. Continuous Architecture: Sustainable Architecture in an Agile and Cloud-Centric World
  18. Cyber-Physical Attacks: A Growing Invisible Threat
  19. Cyber Reconnaissance, Surveillance and Defense
  20. Data Analysis in the Cloud: Models, Techniques and Applications
  21. Data Architecture: A Primer for the Data Scientist Big Data, Data Warehouse and Data Vault
  22. Dazzle 'Em With Style: The Art of Oral Scientific Presentation
  23. Digital Design and Computer Architecture: ARM Edition
  24. Digital Identity Management
  25. Dissecting the Hack: The V3rb0t3n Network
  26. Effective Security Management
  27. Embedded Systems: ARM Programming and Optimization
  28. Emergency Preparedness for Business Professionals: How to Mitigate and Respond to Attacks Against Your Organization
  29. Emerging Trends in Computational Biology, Bioinformatics, and Systems Biology: Algorithms and Software Tools
  30. Ensuring Digital Accessibility through Process and Policy
  31. Enterprise Risk Management: A Common Framework for the Entire Organization
  32. Entity Information Life Cycle for Big Data: Master Data Management and Information Integration
  33. Equitable Solutions for Retaining a Robust STEM Workforce: Beyond Best Practices
  34. Essentials of Artificial Intelligence
  35. From Academia to Entrepreneur: Lessons from the Real World
  36. Formal Verification: An Essential Toolkit for Modern VLSI Design
  37. Google Hacking for Penetration Testers
  38. GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
  39. Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
  40. Hidden Semi-Markov Models: Theory, Algorithms and Applications
  41. High Performance Parallelism Pearls Volume Two: Multicore and Many-core Programming Approaches
  42. High Speed Digital Design: Design of High Speed Interconnects and Signaling
  43. Improving the User Experience through Practical Data Analytics: Gain Meaningful Insight and Increase Your Bottom Line
  44. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
  45. Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
  46. Infosec Management Fundamentals
  47. Interdisciplinary Mentoring in Science: Strategies for Success
  48. Internet Congestion Control
  49. Introduction to Social Media Investigation: A Hands-on Approach
  50. Introduction to Statistical Machine Learning
  51. Joe Celko's SQL for Smarties: Advanced SQL Programming
  52. Keeping Religious Institutions Secure
  53. Learning-Based Local Visual Representation and Indexing
  54. Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
  55. Mobile Data Loss: Threats and Countermeasures
  56. Multi-Domain Master Data Management: Advanced MDM and Data Governance in Practice
  57. Navigating Academia: A Guide for Women and Minority STEM Faculty
  58. Next Generation Red Teaming
  59. Online Social Networks: Human COgnitive Constraints in Facebook and Twitter Personal Graphs
  60. Operating Systems Forensics
  61. Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector
  62. Planning a Career in Biomedical and Life Sciences: Making Informed Choices
  63. Power and Performance: Software Analysis and Optimization
  64. Problem-solving in High Performance Computing: A Situational Awareness Approach with Linux
  65. Python Passive Network Mapping: P2NMAP
  66. Predictive Analytics and Data Mining: Concepts and Practice with RapidMiner
  67. Presumptive Design: Design Provocations for Innovation
  68. RDF Database Systems: Triples Storage and SPARQL Query Processing
  69. Readings in Artificial Intelligence
  70. Readings in Distributed Artificial Intelligence
  71. Refactoring for Software Design Smells: Managing Technical Debt
  72. Repurposing Legacy Data: Innovative Case Studies
  73. Research Proposals: A Guide to Success
  74. Secrets to Success in Industry Careers: Essential Skills for Science and Business
  75. Security Controls Evaluation, Testing, and Assessment Handbook
  76. Securing Social Media in the Enterprise
  77. Securing the Outdoor Construction Site: Strategy, Prevention, and Mitigation
  78. Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits
  79. Security Operations Management
  80. Security Supervision and Management: Theory and Practice of Asset Protection
  81. Service Computing: Concept, Method and Technology
  82. Shared Memory Application Programming: Concepts and Strategies in Multicore Application Programming
  83. Sharing Data and Models in Software Engineering
  84. Smart Grid Security: Innovative Solutions for a Modernized Grid
  85. Social Sensing: Building Reliable Systems on Unreliable Data
  86. Software Quality Assurance: In Large Scale and Complex Software-intensive Systems
  87. Successful User Experience: Strategies and Roadmaps
  88. Texturing and Modeling: A Procedural Approach
  89. The Art and Science of Analyzing Software Data
  90. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
  91. The Manual of Scientific Style: A Guide for Authors, Editors, and Researchers
  92. The Road to Success: A Career Manual - How to Advance to the Top
  93. Thor's OS Xodus: Why And How I Left Windows For OS X
  94. Threat Assessment and Risk Analysis: An Applied Approach
  95. Topics in Parallel and Distributed Computing: Introducing Concurrency in Undergraduate Courses
  96. Wireless Public Safety Networks Volume 1: Overview and Challenges
  97. Workplace Safety: Establishing an Effective Violence Prevention Program
  98. You: For Sale: Protecting Your Personal Data and Privacy Online

You can find all Morgan Kaufmann and Syngress titles in our eBook catalog.

WILLIAM BUTLER YEATS Education is not about the filling of a bucket but the lighting of a fire!WILLIAM BUTLER YEATS

Safari Books Online                         Books 24x7