Ductile Design of Steel Structures, 2nd EditionMichel Bruneau, Chia-Ming Uang, Rafael Sabelli, S.E.July 14, 2011
Security Information and Event Management (SIEM) ImplementationDavid Miller, Shon Harris, Allen Harper, Stephen VanDyke, Chris BlaskOctober 25, 2010
Building Integrated Business Intelligence Solutions with SQL Server 2008 R2 & Office 2010Philo Janus, Stacia MisnerFebruary 3, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionAllen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron WilliamsJanuary 6, 2011
Security Valuation and Risk Analysis: Assessing Value in Investment Decision-MakingKenneth Hackel, CFAOctober 20, 2010
Quality Improvement Through Planned Experimentation 3/ERonald Moen, Thomas Nolan, Lloyd ProvostJune 26, 2012
The Analysis of Irregular Shaped Structures Diaphragms and Shear WallsR. Terry Malone, Robert RiceOctober 20, 2011
Securing the Clicks Network Security in the Age of Social MediaGary Bahadur, Jason Inasi, Alex de CarvalhoOctober 10, 2011
Managing Product Management: Empowering Your Organization to Produce Competitive Products and BrandsSteven HainesSeptember 19, 2011
Proactive Purchasing in the Supply Chain: The Key to World-Class ProcurementDavid Burt, Sheila Petcavage, Richard PinkertonDecember 8, 2011