انتشارات Auerbach Publications, Crc
![Critical Incident Management](http://cdn.ketabkoo.com/covers/2/258668-n.jpg)
Critical Incident Management
Alan B. Sterneckert, 2003![Critical Incident Management](http://cdn.ketabkoo.com/covers/2/258669-n.jpg)
Critical Incident Management
Alan B. Sterneckert, 2003![802.1X Port-Based Authentication](http://cdn.ketabkoo.com/covers/2/266288-n.jpg)
802.1X Port-Based Authentication
Edwin Lyle Brown, 2006![A Guide to Publishing for Academics: Inside the Publish or Perish Phenomenon](http://cdn.ketabkoo.com/covers/2/270885-n.jpg)
A Guide to Publishing for Academics: Inside the Publish or Perish Phenomenon
Jay Liebowitz, 2015![Millimeter Wave Technology in Wireless PAN, LAN, and MAN](http://cdn.ketabkoo.com/covers/2/271045-n.jpg)
Millimeter Wave Technology in Wireless PAN, LAN, and MAN
Shao-Qiu Xiao, 2008![Security in RFID and Sensor Networks](http://cdn.ketabkoo.com/covers/2/271070-n.jpg)
Security in RFID and Sensor Networks
Yan Zhang, 2009![WiMAX Network Planning and Optimization](http://cdn.ketabkoo.com/covers/2/271081-n.jpg)
WiMAX Network Planning and Optimization
Yan Zhang, 2009![WiMAX Network Planning and Optimization](http://cdn.ketabkoo.com/covers/2/271082-n.jpg)
WiMAX Network Planning and Optimization
Yan Zhang, 2009![Conducting Network Penetration and Espionage in a Global Environment](http://cdn.ketabkoo.com/covers/3/302872-n.jpg)
Conducting Network Penetration and Espionage in a Global Environment
Bruce Middleton, 2014![Logical Database Design Principles](http://cdn.ketabkoo.com/covers/3/320368-n.jpg)
Logical Database Design Principles
John Garmany, 2005![The Debugger's Handbook](http://cdn.ketabkoo.com/covers/3/355730-n.jpg)
The Debugger's Handbook
J.F. DiMarzio, 2007![The Handbook of Mobile Middleware](http://cdn.ketabkoo.com/covers/3/367879-n.jpg)
The Handbook of Mobile Middleware
Paolo Bellavista, 2007![The Handbook of Mobile Middleware](http://cdn.ketabkoo.com/covers/3/367880-n.jpg)
The Handbook of Mobile Middleware
Paolo Bellavista, 2007![Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)](http://cdn.ketabkoo.com/covers/3/369474-n.jpg)