301. Serving older teens   Publication: Wesport, Conn. : Libraries Unlimited, 2004 . 1 online resource (xxiv, 240 p.) : Date:2004 Availability: No items available: Actions: Add to cart
302. Classic connections by Koelling, Holly. Publication: Westport, Conn. : Libraries Unlimited, 2004 . 1 online resource (xxi, 405 p.) Date:2004 Availability: No items available: Actions: Add to cart
303. Microsoft Office Excel 2007 by Jacobs, Kathy, Publication: Hoboken, N.J. : Wiley, 2007 . 1 online resource (xx, 470 p.) : , Title from title screen. | Includes index. Date:2007 Availability: No items available: Actions: Add to cart
304. The Symbian OS architecture sourcebook by Morris, Ben, Publication: Chichester, England ; | Hoboken, N.J. : J. Wiley & Sons, 2007 . 1 online resource (xxii, 607 p.) : , Title from title screen. Date:2007 Availability: No items available: Actions: Add to cart
305. The information systems security officer's guide by Kovacich, Gerald L. Publication: Amsterdam ; | Boston : Butterworth-Heinemann, 2003 . 1 online resource (xxviii, 361 p.) : Date:2003 Availability: No items available: Actions: Add to cart
306. Oracle real application clusters by Vallath, Murali. Publication: Amsterdam ; | Boston : Digital Press, 2004 . 1 online resource (xxii, 781 p.) : , Title from book cover on Web Page (viewed Oct. 31, 2005). Date:2004 Availability: No items available: Actions: Add to cart
307. HP Nonstop server security by Hill, Terri. Publication: Amsterdam ; | Boston : Elsevier Digital Press, 2004 . 1 online resource (xxxxiv, 616 p.) , "XYPRO Technology Corporation"--Cover. | "TM" [trademark] appears after Nonstop in title. | Includes index. | Title from book cover on Web Page (viewed Dec. 6, 2005). | Title from title screen. Date:2004 Availability: No items available: Actions: Add to cart
308. Observing the user experience by Kuniavsky, Mike. Publication: San Francisco, Calif. : Morgan Kaufmann Publishers, 2003 . 1 online resource (xvi, 560 p.) : , Title from title screen. | Title from website (viewed Jan. 20, 2006). Date:2003 Availability: No items available: Actions: Add to cart
309. Navajo sacred places by Kelley, Klara B. Publication: Bloomington : Indiana University Press, 1994 . 1 online resource (vi, 260 pages) : Date:1994 Availability: No items available: Actions: Add to cart
310. Collection evaluation in academic libraries by Nisonger, Thomas E. Publication: Englewood, Colo. : Libraries Unlimited, 1992 . 1 online resource (xix, 271 p.) , Includes indexes. Date:1992 Availability: No items available: Actions: Add to cart
311. Blood donors and the supply of blood and blood products   Publication: Washington, D.C. : National Academy Press, 1996 . 1 online resource (xii, 119 p.) : , "Forum on Blood Safety and Blood Availability, Division of Health Sciences Policy, Institute of Medicine." Date:1996 Availability: No items available: Actions: Add to cart
312. Building a virtual private network by Gupta, Meeta. Publication: Cincinnati, Ohio : Premier Press, 2003 . 1 online resource (xxii, 424 p.) : Date:2003 Availability: No items available: Actions: Add to cart
313. How to build a digital library by Witten, I. H. Publication: San Francisco, CA : Morgan Kaufmann Publishers, 2003 . 1 online resource (xxxiii, 518 p.) : Date:2003 Availability: No items available: Actions: Add to cart
314. Magic & hypersystems by Billings, Harold, Publication: Chicago : American Library Association, 2002 . 1 online resource (viii, 147 pages) Date:2002 Availability: No items available: Actions: Add to cart
315. Developing an outstanding core collection by Alabaster, Carol. Publication: Chicago : American Library Association, 2002 . 1 online resource (x, 192 pages) : Date:2002 Availability: No items available: Actions: Add to cart
316. Stealing the network by Russell, Ryan, Publication: Rockland, MA : Syngress, 2003 . 1 online resource (xxii, 303 p.) : , "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. Date:2003 Availability: No items available: Actions: Add to cart
317. Censorship and selection by Reichman, Henry, Publication: Chicago : American Library Association, 2001 . 1 online resource (viii, 223 pages) Date:2001 Availability: No items available: Actions: Add to cart
318. Data needs for the State Children's Health Insurance Program   Publication: Washington, D.C. : National Academy Press, 2002 . 1 online resource (xii, 60 p.) Date:2002 Availability: No items available: Actions: Add to cart
319. Describing death in America   Publication: Washington, D.C. : National Academies Press, 2003 . 1 online resource (xii, 109 p.) : Date:2003 Availability: No items available: Actions: Add to cart
320. Geoscience data and collections   Publication: Washington, D.C. : National Academies Press, 2002 . 1 online resource (xv, 107 p.) : Date:2002 Availability: No items available: Actions: Add to cart