انتشارات Auerbach
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008
Securing and controlling Cisco routers
Peter T. Davis, 2002
Securing and controlling Cisco routers
Peter T. Davis, 2002
Construction Program Management
Joseph Delaney, 2013
Information Security Risk Analysis
Thomas R. Peltier, 2005
Information Security Risk Analysis
Thomas R. Peltier, 2010
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
Kohnke, Anne; Shoemaker, Dan; Sigler, Kenneth, 2016
A Supply Chain Logistics Program for Warehouse Management
David E. Mulcahy, Joachim Sydow, 2008
A Practical Guide to Content Delivery Networks
Gilbert Held, 2005
Building a wireless office
Gilbert Held, 2003
Enhancing LAN performance
Gilbert Held, 2004
Agile for Project Managers
Denise Canty, 2015
Architecture and Principles of Systems Engineering
CE Dickerson; Dimitri Mavris, 2009
Practical Guide to Project Planning
Ricardo Viana Vargas, 2007
Practical Guide to Project Planning (ESI International Project Management Series)
Ricardo Viana Vargas, 2007
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Risk Management: Concepts and Guidance, Fifth Edition
Carl L. PritchardPMPPMI-RMPEVP, 2014
Integrating Erp, Crm, Supply Chain Management, and Smart Materials
Dimitris N. Chorafas, 2001
Integrating ERP, CRM, Supply Chain Management, and Smart Materials
Peter Stephenson, Keith Gilbert, 2001
Integrating ERP, CRM, Supply Chain Management, and Smart Materials
Dimitris N. Chorafas, 2001
