انتشارات Auerbach
The CIO's Guide to Oracle Products and Solutions
Jessica Keyes, 2014
Sustainable Program Management
Gregory T Haugan, 2013
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
Daniel D. Galorath, 2006
Conducting Network Penetration and Espionage in a Global Environment
Bruce Middleton, 2014
Conducting Network Penetration and Espionage in a Global Environment
Bruce Middleton, 2014
Logical Database Design Principles
John Garmany, 2005
The Debugger's Handbook
J.F. DiMarzio, 2007
The Handbook of Mobile Middleware
Paolo Bellavista, 2007
The Handbook of Mobile Middleware
Paolo Bellavista, 2007
Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)
Steven HernandezCISSP, 2012
Maximizing The Enterprise Information Assets
Timothy Wells, 2003
Building Trustworthy Semantic Webs
Bhavani Thuraisingham, 2008
Developing and Securing the Cloud
Bhavani Thuraisingham, 2013
Crisis Management Planning and Execution
Edward S. Devlin, 2007
Effective Opportunity Management for Projects
M. Kemal Atesmen, 2008
Intelligent Cities: Enabling Tools and Technology
Pethuru Raj, 2015
