کتاب های Nee, John G.

Enterprise Risk Management: Today's Leading Research and Best Practices for Tomorrow's Executives (Robert W. Kolb Series)
John Fraser, Betty Simkins, 2010
ITIL 2011 At a Glance
John O. Long, 2012
Multinational Enterprises and the Challenge of Sustainable Development
John McIntyre, Silvester Ivanaj, Vera Ivanaj, 2009
Multinational Enterprises and the Global Economy
John H. Dunning, Sarianna M. Lundan, 2008
Network and System Security
John R. Vacca, 2010
New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises
Charles C. Snow, Doreen R. Strauss, Christopher Lettl (auth.), Anne Bøllingtoft, Dorthe Døjbak Håkonsson, Jørn Flohr Nielsen, Charles C. Snow, John Ulhøi (eds.), 2009
New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises
Charles C. Snow, Doreen R. Strauss, Christopher Lettl (auth.), Anne Bøllingtoft, Dorthe Døjbak Håkonsson, Jørn Flohr Nielsen, Charles C. Snow, John Ulhøi (eds.), 2009
Official
Susan HanscheCISSP, John BertiCISSP, Chris Hare, 2003
Official (ISC)2 Guide to the CISSP Exam ((ISC)2 Press)
Susan HanscheCISSP, John BertiCISSP, Chris Hare, 2003
The Craft of System Security
Sean Smith, John Marchesini, 2007
The Craft of System Security
Sean Smith, John Marchesini, 2007
Developing .NET Enterprise Applications
John Kanalakis, 2003
Enterprise development with Visual Studio .NET, UML, and MSF
John Erik Hansen, Carsten Thomsen, 2004
Enterprise Development With Visual Studio Dot Net Uml And Msf
John Erik Hansen, Carsten Thomsen, 2004
Handbook of Enterprise Operations Management, 1999 Edition
John Wyzalek, 1998
J2EE Open Source Toolkit: Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
John T. Bell, James Lambros, Stan Ng, 2003
ANATOMY OF THE SHIP: THE ARMED TRANSPORT BOUNTY.
John. McKay, 1989
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005