انتشارات Auerbach
Software Patterns, Knowledge Maps, and Domain Analysis
Anshu Basia, 2015
Android Security: Attacks and Defenses
Anmol Misra, 2013
Android Security: Attacks and Defenses
Anmol Misra, 2013
Android Security_ Attacks and Defenses
Anmol Misra, 2013
Certified Function Point Specialist Examination Guide
David Garmus, 2010
Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile
Rebecca Copeland, 2008
Adaptive Security Management Architecture
James S. Tiller, 2010
Fundamentals of DSL Technology
Philip Golden, 2004
Implementation and Applications of DSL Technology
Philip Golden, 2007
Implementation and applications of DSL technology
Philip Golden, 2008
Implementation and Applications of xDSL Technology
Philip Golden, 2007
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2006
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2005
Core Software Security: Security at the Source
James Ransome, 2013
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009
A Guide to IT Contracting: Checklists, Tools, and Techniques
Michael R. Overly, 2012
Leading the internal audit function
Fountain, 2016
Software Engineering Foundations
Yingxu Wang, 2007
Software engineering foundations : a software science perspective
Yingxu Wang, 2008
Critical Incident Management
Alan B. Sterneckert, 2003
