کتاب های James A. Swan

Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings
James L. Massey (auth.), Rana Barua, Tanja Lange (eds.), 2006
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2008
Enterprise Risk Management: From Incentives to Controls
James Lam, 2003
Piracy: Leakages from Modernity
Martin Fredriksson and James Arvanitakis, 2014
Promoting Enterprise-led Innovation in China (Directions in Development) (Directions in Development, Countries and Regions)
Chunlin Zhang, Douglas Zhihua Zeng, William Peter Mako, James Seward, 2009
Researching the Small Enterprise (SAGE Series in Management Research)
James Curran, Robert Blackburn, 2001
Developing Enterprise Web Services: An Architect's Guide
Sandeep Chatterjee, James Webber, 2003
Enterprise service oriented architectures: concepts, challenges, recommendations
James McGovern, Oliver Sims, Ashish Jain, Mark Little, 2006
Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations
James McGovern, 2006
J2EE Open Source Toolkit: Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
John T. Bell, James Lambros, Stan Ng, 2003
3D Graphics with XNA Game Studio 4.0
Sean James, 2010
Career Opportunities in the Internet, Video Games, and Multimedia
Allan Taylor, James Robert Parish, 2007
A Technical Guide to IPSec Virtual Private Networks
James S. Tiller, 2000