انتشارات Auerbach Publications, Crc
![Complex IT project management : 16 steps to success](http://cdn.ketabkoo.com/covers/1/189971-n.jpg)
Complex IT project management : 16 steps to success
Peter Schulte, 2004![Casino Security and Gaming Surveillance](http://cdn.ketabkoo.com/covers/1/191619-n.jpg)
Casino Security and Gaming Surveillance
Derk J. Boss, 2010![Data Mining in Biomedical Imaging, Signaling, and Systems](http://cdn.ketabkoo.com/covers/1/192671-n.jpg)
Data Mining in Biomedical Imaging, Signaling, and Systems
Sumeet Dua (ed.), 2011![Information Technology Control and Audit](http://cdn.ketabkoo.com/covers/1/194000-n.jpg)
Information Technology Control and Audit
Frederick Gallegos, 2008![The Windows Serial Port Programming Handbook](http://cdn.ketabkoo.com/covers/1/196829-n.jpg)
The Windows Serial Port Programming Handbook
Ying Bai, 2004![The Windows Serial Port Programming Handbook](http://cdn.ketabkoo.com/covers/1/196830-n.jpg)
The Windows Serial Port Programming Handbook
Ying Bai, 2004![Packet Forwarding Technologies](http://cdn.ketabkoo.com/covers/1/199387-n.jpg)
Packet Forwarding Technologies
Weidong Wu, 2007![BYOD for Healthcare](http://cdn.ketabkoo.com/covers/2/205103-n.jpg)
BYOD for Healthcare
Jessica Keyes, 2014![Business process management systems : strategy and implementation](http://cdn.ketabkoo.com/covers/2/219567-n.jpg)
Business process management systems : strategy and implementation
James F Chang, 2006![Process-Centric Architecture for Enterprise Software Systems (Infosys Press)](http://cdn.ketabkoo.com/covers/2/219623-n.jpg)
Process-Centric Architecture for Enterprise Software Systems (Infosys Press)
Parameswaran Seshan, 2010![Software Patterns, Knowledge Maps, and Domain Analysis](http://cdn.ketabkoo.com/covers/2/220649-n.jpg)
Software Patterns, Knowledge Maps, and Domain Analysis
Anshu Basia, 2015![Android Security: Attacks and Defenses](http://cdn.ketabkoo.com/covers/2/224018-n.jpg)
Android Security: Attacks and Defenses
Anmol Misra, 2013![Android Security: Attacks and Defenses](http://cdn.ketabkoo.com/covers/2/224019-n.jpg)
Android Security: Attacks and Defenses
Anmol Misra, 2013![Android Security_ Attacks and Defenses](http://cdn.ketabkoo.com/covers/2/224020-n.jpg)
Android Security_ Attacks and Defenses
Anmol Misra, 2013![Certified Function Point Specialist Examination Guide](http://cdn.ketabkoo.com/covers/2/225118-n.jpg)
Certified Function Point Specialist Examination Guide
David Garmus, 2010![Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile](http://cdn.ketabkoo.com/covers/2/232962-n.jpg)
Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile
Rebecca Copeland, 2008![Adaptive Security Management Architecture](http://cdn.ketabkoo.com/covers/2/235119-n.jpg)
Adaptive Security Management Architecture
James S. Tiller, 2010![Fundamentals of DSL Technology](http://cdn.ketabkoo.com/covers/2/246138-n.jpg)
Fundamentals of DSL Technology
Philip Golden, 2004![Implementation and applications of DSL technology](http://cdn.ketabkoo.com/covers/2/246141-n.jpg)
Implementation and applications of DSL technology
Philip Golden, 2008![Enhancing Computer Security with Smart Technology](http://cdn.ketabkoo.com/covers/2/250140-n.jpg)
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2006![Enhancing Computer Security with Smart Technology](http://cdn.ketabkoo.com/covers/2/250141-n.jpg)
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2005![HOWTO Secure and Audit Oracle 10g and 11g](http://cdn.ketabkoo.com/covers/2/255920-n.jpg)
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009![Software engineering foundations : a software science perspective](http://cdn.ketabkoo.com/covers/2/257632-n.jpg)