انتشارات Auerbach
A Practical Guide to Security Assessments
Sudhanshu Kairab, 2005
A Guide to Lean Six Sigma Management Skills
Howard S Gitlow, 2009
Antipatterns: Identification, Refactoring, and Management
Phillip A. Laplante, Colin J. Neill, 2005
Applied Software Risk Management: A Guide for Software Project Managers
C. Ravindranath Pandian, 2006
Applied Software Risk Management: A Guide for Software Project Managers
C. Ravindranath Pandian, 2006
Applied Software Risk Management: A Guide for Software Project Managers
Ravindranath C. Pandian, 2006
Business Process Management Systems: Strategy and Implementation
James F. Chang, 2005
Business Process Management Systems: Strategy and Implementation
James F. Chang, 2005
Business Process Management Systems: Strategy and Implementation
James F. Chang, 2005
Carrier Ethernet: Providing the Need for Speed
Gilbert Held, 2008
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
John McCumber, 2004
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
John McCumber, 2004
Effective Communications for Project Management
Ralph L. KliemPMP, 2007
Grid Application Systems Design
April J. Wells, 2008
Information Security: Design, Implementation, Measurement, and Compliance
Timothy P. Layton, 2006
Official
Susan HanscheCISSP, John BertiCISSP, Chris Hare, 2003
Official (ISC)2 Guide to the CISSP Exam ((ISC)2 Press)
Susan HanscheCISSP, John BertiCISSP, Chris Hare, 2003
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Preston de Guise, 2008
Handbook of Enterprise Operations Management, 1999 Edition
John Wyzalek, 1998
802.1X Port-Based Authentication
Edwin Lyle Brown, 2007
802.1X Port-Based Authentication
Edwin Lyle Brown, 2006
802.1X Port-Based Network Access Authentification
Edwin Lyle Brown, 2006
A practical guide to content delivery networks
Gilbert Held, 2006
