انتشارات Auerbach
Official (ISC)2® Guide to the ISSAP® CBK, Second Edition
ISC)² Corporate, 2013
PCI Compliance: The Definitive Guide
Abhay Bhargav, 2014
PgMP® Exam Practice Test and Study Guide, Fourth Edition
Ginger Levin, 2013
PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud
Bintu Harwani, 2013
Practical Data Mining
Monte F. HancockJr, 2011
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
Michael D. S. Harris, 2008
The Complete Project Management Office Handbook, Second Edition
Gerard M. Hill, 2007
Information Security Management Handbook, Sixth Edition
Micki Krause Nozaki, 2011
Information Security Policies and Procedures: A Practitioner's Reference
Dimitris N. Chorafas, 1998
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998
Integral Logistics Management
Paul Schönsleben, 2007
Introduction to Communications Technologies: A Guide for Non-Engineers
Stephan Jones, 2002
The ethical hack : a framework for business value penetration testing
James S Tiller, 2005
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004
Secure Data Provenance and Inference Control with Semantic Web
Bhavani Thuraisingham, 2014
Official
Mano Paul, 2013
WiMAX: A Wireless Technology Revolution
G.S.V. Radha K. Rao, 2007
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007
