انتشارات Auerbach
Information security management handbook
Richard O"Hanley, 2013
Information security management handbook
Harold F. Tipton, 2011
Information security management handbook
Harold F. Tipton, 2012
Information Security Management Handbook
Harold F. Tipton, 2012
Information Security Management Handbook
Harold F. Tipton, 2010
Asset Protection through Security Awareness
Tyler Justin Speed, 2011
Audit and Trace Log Management: Consolidation and Analysis
Phillip Q. Maier, 2006
Audit and Trace Log Management: Consolidation and Analysis
Phillip Q. Maier, 2006
Building A Global Information Assurance Program
Raymond J. Curts, 2002
Building an Enterprise-Wide Business Continuity Program
Kelley Okolita, 2009
Complete Book of Remote Access: Connectivity and Security
Victor Kasacavage, 2002
Complete Guide to CISM Certification
Thomas R. Peltier, 2007
Complete Guide to CISM Certification
Thomas R. Peltier, 2007
Complete Guide to CISM Certification
Thomas R. Peltier, 2007
Computer telephony integration
William A. YarberryJr., 2003
COSMIC Function Points: Theory and Advanced Practices
Reiner Dumke, 2011
Creating Components: Object Oriented, Concurrent, and Distributed Computing in Java
Charles W. Kann, 2003
Creative, Efficient, and Effective Project Management
Ralph L. Kliem, 2013
