انتشارات Auerbach Publications
Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)
Steven HernandezCISSP, 2012
Maximizing The Enterprise Information Assets
Timothy Wells, 2003
Building Trustworthy Semantic Webs
Bhavani Thuraisingham, 2008
Developing and Securing the Cloud
Bhavani Thuraisingham, 2013
Crisis Management Planning and Execution
Edward S. Devlin, 2007
Effective Opportunity Management for Projects
M. Kemal Atesmen, 2008
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Yezid Donoso, 2007
Case Studies in Intelligent Computing: Achievements and Trends
Biju Issac, 2014
Case Studies in Secure Computing: Achievements and Trends
Biju Issac, 2014
Project Management Maturity Model, Third Edition
J. Kent Crawford, 2014
Ethics in IT Outsourcing
Tandy Gold, 2012
The Art of Agile Practice: A Composite Approach for Projects and Organizations
Bhuvan Unhelkar, 2012
Simplified TRIZ: New problem solving applications for engineers
Kalevi Rantanen, 2007
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Al-Sakib Khan Pathan, 2010
TV Content Analysis: Techniques and Applications
Yiannis Kompatsiaris, 2012
Program Management Complexity: A Competency Model
Ginger Levin, 2011
