انتشارات Auerbach Publications
Theory of Science and Technology Transfer and Applications
Sifeng Liu, 2009
Securing E-Business Applications and Communications
Jonathan S. Held, 2001
Wireless Mesh Networks
Gilbert Held, 2005
Wireless Mesh Networks
Gilbert Held, 2005
Managing Projects in Trouble: Achieving Turnaround and Success
Ralph L. KliemPMP, 2011
Vehicular Networks
Hassnaa Moustafa, 2009
High-Performance Web Databases: Design, Development, and Deployment
Sanjiv Purba, 2000
The IFPUG Guide to IT and Software Measurement
IFPUG, 2012
IMS: A New Model for Blending Applications
Mark Wuthnow, 2009
IMS: A New Model for Blending Applications (Informa Telecoms & Media)
Mark Wuthnow, 2009
Database Development and Management
Lee Chao, 2006
The Practical Guide to HIPAA Privacy and Security Compliance
Kevin Beaver, 2004
The Practical Guide to HIPAA Privacy and Security Compliance
Kevin Beaver, 2003
The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition
Rebecca Herold, 2014
Software Requirements: Encapsulation, Quality, And Reuse
Rick Lutowski, 2005
Software Requirements: Encapsulation, Quality, and Reuse
Rick Lutowski, 2005
Design and Safety Assessment of Critical Systems
Marco Bozzano, 2010
Business, Marketing, and Management Principles for IT and Engineering
Dimitris N. Chorafas, 2011
Business, Marketing, and Management Principles for IT and Engineering
Dimitris N. Chorafas, 2011
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture
Kerry Ann Anderson, 2014
VMware ESX Essentials in the Virtual Data Center
David Marshall, 2008
Investigations in the workplace
Eugene Ferraro, 2006
