| 4.67 | - | |
| 0 | - | |
Educating for Democracy: Preparing Undergraduates for Responsible Political Engagement - Anne Colby
- Elizabeth Beaumont
- Thomas Ehrlich
- Josh Corngold
| 0 | - | |
Teaching with Your Mouth Shut | 0 | - | |
Inside Network Perimeter Security | 4 | 4.0 | |
| 4 | 4.0 | |
Cryptography and Network Security: Principles and Practice | 5 | 5.0 | |
Security Data Visualization: Graphical Techniques for Network Analysis | 5 | 5.0 | |
Network Intrusion Detection | 4 | 4.0 | |
Computer System and Network Security - Gregory B. White
- Gregory B. White
| 4 | 4.0 | |
Racing Odysseus: A College President Becomes a Freshman Again | 0 | - | |
| 3 | 3.0 | |
How to Win Friends & Influence People | 3.93 | 5.0 | |
Network Security Hacks: Tips & Tools for Protecting Your Privacy | 4 | 4.0 | |
Snort IDS and IPS Toolkit - Toby Kohlenberg
- Brian Caswell
- Jay Beale
- Andrew R. Baker
| 5 | 5.0 | |
Hacking Exposed: Network Security Secrets & Solutions | 4 | 4.0 | |
Wireshark & Ethereal Network Protocol Analyzer Toolkit - Angela Orebaugh
- Gilbert Ramirez
- Jay Beale
| 4 | 4.0 | |
Secure Computers And Networks - Analysis, Design And Implementation - Fisch White
- Gregory B. White
| 4 | 4.0 | |
The Power of Positive Thinking | 3.38 | 5.0 | |
Fried Green Tomatoes at the Whistle Stop Cafe | 4.15 | - | |
Network Security: The Complete Reference - Mark Rhodes-Ousley
- Roberta Bragg
- Keith Strassberg
| 5 | 5.0 | |
The Scholarship of Teaching and Learning in Higher Education: Contributions of Research Universities | 0 | - | |
Discrete Event Simulation: A Practical Approach - Udo W. Pooch
- James A. Wall
| 5 | 5.0 | |
Enhancing Learning Through the Scholarship of Teaching and Learning: The Challenges and Joys of Juggling | 0 | - | |
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community | 0 | - | |
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses | 5 | 5.0 | |
Diversity Across the Curriculum: A Guide for Faculty in Higher Education | 0 | - | |
| 0 | - | |
Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility | 5 | 5.0 | |
The Power of Positive Living | 0 | - | |
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Vpns, Routers, and Intrusion Detection Systems - Lenny Zeltser
- Scott Winters
- Karen Kent Frederick
- Ronald W. Ritchey
| 4 | 4.0 | |
Distributed Simulation - John A. Hamilton Jr.
- Udo W. Pooch
- David A. Nash
| 0 | - | |
| 3 | - | |
| 3.93 | 5.0 | |
| 3.58 | - | |
| 5 | 5.0 | |
| 3.15 | 5.0 | |
| 3.89 | - | |
| 3.73 | 5.0 | |
| 3.25 | - | |