انتشارات Auerbach
Cloud and Virtual Data Storage Networking
Greg Schulz, 2011
Cloud Database Development and Management
Lee Chao, 2013
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Stanislaw Jarzabek, 2007
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Stanislaw Jarzabek, 2007
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Stanislaw Jarzabek, 2007
Effective Transition from Design to Production
David F. Ciambrone, 2007
Elements of Compiler Design
Alexander Meduna, 2007
Embedded Linux system design and development
P. Raghavan, 2005
Empowering Project Teams: Using Project Followership to Improve Performance
Marco Sampietro, 2014
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas
Somprakash Bandyopadhyay, 2006
Enterprise 2.0: Social Networking Tools to Transform Your Organization
Jessica Keyes, 2012
Enterprise Architecture and Information Assurance: Developing a Secure Foundation
James A. Scholz, 2013
Enterprise Architecture and Information Assurance: Developing a Secure Foundation
James A. Scholz, 2013
Enterprise Dynamics Sourcebook
Kenneth C. Hoffman, 2013
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press)
Adam Gordon, 2015
Long Term Evolution: 3GPP LTE Radio and Cellular Technology
Borko Furht, 2009
Retail Supply Chain Management (Series on Resource Management)
James B. Ayers, 2007
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004
