انتشارات Auerbach
Big Data and Business Analytics
Jay Liebowitz, 2013
Big Data and Health Analytics
Katherine Marconi, Harold Lehmann, 2014
Big Data, Mining, and Analytics: Components of Strategic Decision Making
Stephan Kudyba, 2014
Big Data, Mining, and Analytics: Components of Strategic Decision Making
Stephan Kudyba, 2014
Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making
Jay Liebowitz, 2014
A Guide to Lean Six Sigma Management Skills
Howard S Gitlow, 2009
Natural Hazards Analysis: Reducing the Impact of Disasters
John Pine, 2008
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009
Security in an IPv6 Environment
Daniel Minoli, Jake Kouns, 2008
Implementing electronic document and record management systems
Azad Adam, 2008
Inter- and intra-vehicle communications
Gilbert Held, 2008
Android Malware and Analysis
Ken Dunham, 2014
Data Mining Tools for Malware Detection
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham, 2011
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
