انتشارات Auerbach
Using Technology to Transform the Value Chain
Fred Kuglin, 2008
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Margaret K. Kulpa, 2008
Interpreting the cmmi - a process improvement approach
Margaret K. Kulpa, 2003
Interpreting the CMMI: A Process Improvement Approach
Margaret Kulpa, 2003
Information security management handbook
Harold F. Tipton, 2003
Automatic defense against zero-day polymorphic worms in communication networks
Mohssen Mohammed, 2013
The Green and Virtual Data Center
Greg Schulz, 2009
Security Software Development: Assessing and Managing Security Risks
Douglas A. AshbaughCISSP, 2008
Security in Sensor Networks
Yang Xiao, 2006
Organizational Crisis Management: The Human Factor
Gerald Lewis, 2006
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Lightweight Enterprise Architectures
Fenix Theuerkorn, 2004
Connective technologies in the supply chain
Sameer Kumar, 2007
Introduction to Light Emitting Diode Technology and Applications
Gilbert Held, 2008
Leadership in Chaordic Organizations
Beverly Gay McCarter, 2012
Manage Software Testing
Peter Farrell-Vinay, 2008
Managing A Network Vulnerability Assessment
Thomas R. Peltier, 2003
Managing A Network Vulnerability Assessmentib
Thomas R. Peltier, 2003
Managing A Network Vulnerability AssessmentiB
Thomas R. Peltier, 2003
Managing Lean Projects
Ralph L. Kliem, 2015
