انتشارات Auerbach Publications
Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making
Jay Liebowitz, 2014
A Guide to Lean Six Sigma Management Skills
Howard S Gitlow, 2009
Natural Hazards Analysis: Reducing the Impact of Disasters
John Pine, 2008
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009
Security in an IPv6 Environment
Daniel Minoli, Jake Kouns, 2008
Implementing electronic document and record management systems
Azad Adam, 2008
Inter- and intra-vehicle communications
Gilbert Held, 2008
Android Malware and Analysis
Ken Dunham, 2014
Data Mining Tools for Malware Detection
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham, 2011
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Profiling hackers: the science of criminal profiling as applied to the world of hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008
Securing and controlling Cisco routers
Peter T. Davis, 2002
Securing and controlling Cisco routers
Peter T. Davis, 2002
