کتاب های Mark B. Borg Jr.

Building the Mobile Internet (Networking Technology)
Mark Grayson, Kevin Shatzkamer, Klaas Wierenga, 2011
Building the Mobile Internet (Networking Technology)
Mark Grayson, Kevin Shatzkamer, Klaas Wierenga, 2011
CCIE voice exam quick reference sheets
Mark Lewis, CCIE, 2007
CCIE voice exam quick reference sheets
Mark Lewis, CCIE, 2007
Contemporary Computer-Assisted Language Learning
Michael Thomas, Hayo Reinders, Mark Warschauer, 2012
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Mark Collier, David Endler, 2013
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier, 2006
Hacking Java: The Java Professional's Resource Kit
Mark Wutka David Baker David Boswell Ken Cartwright David Edgar Liebke Tom Lockwood Stephen Matsuba
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
CCSP Cisco Secure VPN exam certification guide: CCSP self-study
John Roland, Mark Newcomb, 2003
CCSP Cisco Secure VPN exam certification guide: CCSP self-study
John Roland, Mark Newcomb, 2003
CCSP Cisco Secure VPN exam certification guide: CCSP self-study
John Roland, Mark Newcomb, 2003
Cisco CCIE Fundamentals: Network Design
Mark McGregor, 1998
Cisco IOS XR Fundamentals
Mobeen Tahir, Mark Ghattas, Dawit Birhanu, Syed Natif Nawaz, 2009
Cisco IOS XR Fundamentals
Mobeen Tahir, Mark Ghattas, Dawit Birhanu, Syed Natif Nawaz, 2009
Cisco Secure Internet Security Solutions
Andrew Mason; Mark J. Newcomb, 2001
A First Course in Machine Learning
Simon Rogers, Mark Girolami, 2011
Comparing, Designing, and Deploying VPHs
Mark Lewis, 2006
Comparing, Designing, and Deploying VPNs
Mark Lewis, 2006