انتشارات Auerbach Publications, Crc
![Maximizing The Enterprise Information Assets](http://cdn.ketabkoo.com/covers/3/370768-n.jpg)
Maximizing The Enterprise Information Assets
Timothy Wells, 2003![Building Trustworthy Semantic Webs](http://cdn.ketabkoo.com/covers/3/378312-n.jpg)
Building Trustworthy Semantic Webs
Bhavani Thuraisingham, 2008![Crisis Management Planning and Execution](http://cdn.ketabkoo.com/covers/3/378645-n.jpg)
Crisis Management Planning and Execution
Edward S. Devlin, 2007![Effective Opportunity Management for Projects](http://cdn.ketabkoo.com/covers/3/379549-n.jpg)
Effective Opportunity Management for Projects
M. Kemal Atesmen, 2008![Multi-Objective Optimization in Computer Networks Using Metaheuristics](http://cdn.ketabkoo.com/covers/3/394748-n.jpg)
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Yezid Donoso, 2007![Project Management Maturity Model, Third Edition](http://cdn.ketabkoo.com/covers/4/405768-n.jpg)
Project Management Maturity Model, Third Edition
J. Kent Crawford, 2014![The Art of Agile Practice: A Composite Approach for Projects and Organizations](http://cdn.ketabkoo.com/covers/4/418497-n.jpg)
The Art of Agile Practice: A Composite Approach for Projects and Organizations
Bhuvan Unhelkar, 2012![Simplified TRIZ: New problem solving applications for engineers](http://cdn.ketabkoo.com/covers/4/429764-n.jpg)
Simplified TRIZ: New problem solving applications for engineers
Kalevi Rantanen, 2007![Security of Self-Organizing Networks: MANET, WSN, WMN, VANET](http://cdn.ketabkoo.com/covers/4/433198-n.jpg)
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Al-Sakib Khan Pathan, 2010![TV Content Analysis: Techniques and Applications](http://cdn.ketabkoo.com/covers/4/436589-n.jpg)
TV Content Analysis: Techniques and Applications
Yiannis Kompatsiaris, 2012![Program Management Complexity: A Competency Model](http://cdn.ketabkoo.com/covers/4/439725-n.jpg)
Program Management Complexity: A Competency Model
Ginger Levin, 2011![Securing Cloud and Mobility: A Practitioner's Guide](http://cdn.ketabkoo.com/covers/4/440479-n.jpg)
Securing Cloud and Mobility: A Practitioner's Guide
Ian Lim, 2013![Theory of Science and Technology Transfer and Applications](http://cdn.ketabkoo.com/covers/4/443668-n.jpg)
Theory of Science and Technology Transfer and Applications
Sifeng Liu, 2009![Securing E-Business Applications and Communications](http://cdn.ketabkoo.com/covers/4/446828-n.jpg)
Securing E-Business Applications and Communications
Jonathan S. Held, 2001![Wireless Mesh Networks](http://cdn.ketabkoo.com/covers/4/450223-n.jpg)
Wireless Mesh Networks
Gilbert Held, 2005![Wireless Mesh Networks](http://cdn.ketabkoo.com/covers/4/450224-n.jpg)
Wireless Mesh Networks
Gilbert Held, 2005![Managing Projects in Trouble: Achieving Turnaround and Success](http://cdn.ketabkoo.com/covers/4/450907-n.jpg)
Managing Projects in Trouble: Achieving Turnaround and Success
Ralph L. KliemPMP, 2011![Vehicular Networks](http://cdn.ketabkoo.com/covers/4/452011-n.jpg)