24 Deadly Sins of Software Security: Programming Flaws and How to Fix ThemMichael Howard, David LeBlanc, John ViegaSeptember 3, 2009
Achieving Extreme Performance with Oracle ExadataRick Greenwald, Robert Stackowiak, Maqsood Alam, Mans BhullerFebruary 11, 2011
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler December 15, 2014
Advanced Tuning for JD Edwards EnterpriseOne ImplementationsMichael Jacot, Allen Jacot, Frank Jordan, Gurbinder Bali, Patrick Scott, Kyle KinderJune 25, 2013
Applied Oracle Security: Developing Secure Database and Middleware EnvironmentsDavid Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan WiseSeptember 28, 2009
Applied SAP BI 7.0 Web Reports: Using BEx Web Analyzer and Web Application DesignerPeter JonesMarch 15, 2010
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions Bambara, Joseph J. Allen, Paul R. Iyer, Kedar , Madsen, René , Lederer, Solomon , Wuehler, Michael February 16, 2018
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments Messier, Ric February 28, 2020
Building and Managing a Cloud Using Oracle Enterprise Manager 12cMadhup Gulati, Adeesh Fulay, Sudip DattaFebruary 13, 2013
Building Integrated Business Intelligence Solutions with SQL Server 2008 R2 & Office 2010Philo Janus, Stacia MisnerFebruary 3, 2011
Business Intelligence with Microsoft® Office PerformancePoint™ Server 2007Craig UtleyJanuary 22, 2008
CRM at the Speed of Light, Fourth Edition: Social CRM 2.0 Strategies, Tools, and Techniques for Engaging Your Customers Greenberg, Paul October 1, 2008
The Data Warehouse Mentor: Practical Data Warehouse and Business Intelligence Insights Robert (Bob) Laberge January 1, 2011
Database Cloud Storage: The Essential Guide to Oracle Automatic Storage ManagementNitin Vengurlekar, Prasad BagalJuly 23, 2013
DB2 10.5 with BLU Acceleration: New Dynamic In-Memory Analytics for the Era of Big DataPaul Zikopoulos, Sam Lightstone, Matthew Huras, Aamer Sachedina, George BaklarzOctober 9, 2013
Delivering Business Intelligence with Microsoft SQL Server 2016, Fourth Edition Larson, Brian November 4, 2016
Delivering Carrier Ethernet: Extending Ethernet Beyond the LANAbdul Kasim, Prasanna Adhikari, Nan Chen, Norman Finn, Nasir Ghani, Marek Hajduczenia, Paul Havala, Giles Heron, Michael Howard, Luca Martini, Bob Metcalfe, Mannix O'Connor, Matt Squire, William Szeto, Greg WhiteOctober 23, 2007
Designing an IAM Framework with Oracle Identity and Access Management SuiteJeff ScheidelJuly 26, 2010
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time Saydjari, O. Sami August 3, 2018
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Regalado, Daniel , Harris, Shon , Harper, Allen , Eagle, Chris , Ness, Jonathan , Spasojevic, Branko , Linn, Ryan , Sims, Stephen January 9, 2015
Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionAllen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron WilliamsJanuary 6, 2011
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition Harper, Allen , Regalado, Daniel , Harris, Shon , Eagle, Chris , Ness, Jonathan , Spasojevic, Branko , Linn, Ryan , Sims, Stephen April 5, 2018
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition Harper, Allen , Linn, Ryan , Sims, Stephen , Baucom, Michael , Tejeda, Huascar , Fernandez, Daniel , Frost, Moses March 11, 2022
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom LineToby Velte, Anthony Velte, Robert ElsenpeterSeptember 8, 2008
Hands-On Microsoft SQL Server 2008 Integration Services, Second EditionAshwani NandaSeptember 2, 2010
Harness the Power of Big Data The IBM Big Data PlatformPaul Zikopoulos, Dirk deRoos, Krishnan Parasuraman, Thomas Deutsch, James Giles, David CorriganNovember 8, 2012