Details
Rating
Rags
Rating
Controls
Jesus of Nazareth
Jesus of Nazareth
  • Pope Benedict XVI
4.67-
Balancing Acts
Balancing Acts
  • Mary Taylor Huber
0-
Educating for Democracy: Preparing Undergraduates for Responsible Political Engagement
Educating for Democracy: Preparing Undergraduates for Responsible Political Engagement
  • Anne Colby
  • Elizabeth Beaumont
  • Thomas Ehrlich
  • Josh Corngold
0-
Teaching with Your Mouth Shut
Teaching with Your Mouth Shut
  • Donald L. Finkel
0-
Inside Network Perimeter Security
Inside Network Perimeter Security
  • Lenny Zeltser
44.0
Intrusion Detection
Intrusion Detection
  • Rebecca Gurley Bace
44.0
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
  • William Stallings
55.0
Security Data Visualization: Graphical Techniques for Network Analysis
Security Data Visualization: Graphical Techniques for Network Analysis
  • Greg Conti
55.0
Gone with the wind.
Network Intrusion Detection
  • Margaret Mitchell
44.0
Computer System and Network Security
Computer System and Network Security
  • Gregory B. White
  • Gregory B. White
44.0
Racing Odysseus: A College President Becomes a Freshman Again
Racing Odysseus: A College President Becomes a Freshman Again
  • Roger H. Martin
0-
Maximum Security
Maximum Security
  • Anonymous
33.0
How To Win Friends and Influence People
How to Win Friends & Influence People
  • Dale Carnegie
3.935.0
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy
  • Andrew Lockhart
44.0
Snort IDS and IPS Toolkit
Snort IDS and IPS Toolkit
  • Toby Kohlenberg
  • Brian Caswell
  • Jay Beale
  • Andrew R. Baker
55.0
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
  • Stuart McClure
44.0
Wireshark & Ethereal Network Protocol Analyzer Toolkit
Wireshark & Ethereal Network Protocol Analyzer Toolkit
  • Angela Orebaugh
  • Gilbert Ramirez
  • Jay Beale
44.0
Secure Computers And Networks - Analysis, Design And Implementation
Secure Computers And Networks - Analysis, Design And Implementation
  • Fisch White
  • Gregory B. White
44.0
The Power of Positive Thinking
The Power of Positive Thinking
  • Norman Vincent Peale
3.385.0
Fried green tomatoes at the Whistle Stop Cafe
Fried Green Tomatoes at the Whistle Stop Cafe
  • Fannie Flagg
4.15-
Network Security: The Complete Reference
Network Security: The Complete Reference
  • Mark Rhodes-Ousley
  • Roberta Bragg
  • Keith Strassberg
55.0
The Scholarship of Teaching and Learning in Higher Education: Contributions of Research Universities
The Scholarship of Teaching and Learning in Higher Education: Contributions of Research Universities
    0-
    Discrete Event Simulation: A Practical Approach
    Discrete Event Simulation: A Practical Approach
    • Udo W. Pooch
    • James A. Wall
    55.0
    Enhancing Learning Through the Scholarship of Teaching and Learning: The Challenges and Joys of Juggling
    Enhancing Learning Through the Scholarship of Teaching and Learning: The Challenges and Joys of Juggling
    • Kathleen McKinney
    0-
    Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community
    Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community
      0-
      Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
      Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
      • Edward Skoudis
      • Tom Liston
      55.0
      Diversity Across the Curriculum: A Guide for Faculty in Higher Education
      Diversity Across the Curriculum: A Guide for Faculty in Higher Education
        0-
        Cover 3

        Autonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment

        Autonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment
        • Dennis J. Ingram
        0-
        Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility
        Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility
        • Edward Sri
        55.0
        The Power of Positive Living
        The Power of Positive Living
        • Norman Vincent Peale
        0-
        Inside Network Perimeter Security: The Definitive Guide to Firewalls, Vpns, Routers, and Intrusion Detection Systems
        Inside Network Perimeter Security: The Definitive Guide to Firewalls, Vpns, Routers, and Intrusion Detection Systems
        • Lenny Zeltser
        • Scott Winters
        • Karen Kent Frederick
        • Ronald W. Ritchey
        44.0
        Distributed Simulation
        Distributed Simulation
        • John A. Hamilton Jr.
        • Udo W. Pooch
        • David A. Nash
        0-
        For Love of the Game
        For Love of the Game
        • Michael Shaara
        3-
        Cover 6

        Little Green Men

        Little Green Men
        • Christopher Buckley
        3.935.0
        The Notebook
        The Notebook
        • Nicholas Sparks
        3.58-
        Caravans
        Caravans
        • James A. Michener
        55.0
        The Scarlet Letter and Other Writings
        The Scarlet Letter
        • Nathaniel Hawthorne
        3.155.0
        Dubliners
        Dubliner.
        • James Joyce
        3.89-
        The Jungle
        The Jungle
        • Upton Sinclair
        3.735.0
        The Turn Of The Screw
        The Turn of the Screw
        • Henry James
        3.25-