انتشارات Auerbach Publications, Crc
![Architecting the Telecommunication Evolution: Toward Converged Network Services](http://cdn.ketabkoo.com/covers/5/509097-n.jpg)
Architecting the Telecommunication Evolution: Toward Converged Network Services
Vijay K. Gurbani, 2006![Art of Software Modeling](http://cdn.ketabkoo.com/covers/5/509099-n.jpg)
Art of Software Modeling
Benjamin A. Lieberman, 2006![Information security architecture : an integrated approach to security in the organization](http://cdn.ketabkoo.com/covers/5/514488-n.jpg)
Information security architecture : an integrated approach to security in the organization
Jan Killmeyer Tudor, 2006![Information security fundamentals](http://cdn.ketabkoo.com/covers/5/514494-n.jpg)
Information security fundamentals
Thomas R. Peltier, 2004![Information security fundamentals](http://cdn.ketabkoo.com/covers/5/514497-n.jpg)
Information security fundamentals
Thomas R. Peltier, 2013![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514501-n.jpg)
Information security management handbook
Harold F. Tipton, 2006![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514503-n.jpg)
Information security management handbook
Harold F. Tipton, 2007![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514505-n.jpg)
Information security management handbook
Harold F. Tipton, 2003![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514506-n.jpg)
Information security management handbook
Harold F. Tipton, 2008![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514507-n.jpg)
Information security management handbook
Harold F. Tipton, 2001![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514509-n.jpg)
Information security management handbook
Harold F. Tipton, 2008![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514511-n.jpg)
Information security management handbook
Harold F. Tipton, 2008![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514513-n.jpg)
Information security management handbook
Harold F. Tipton, 2008![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514515-n.jpg)
Information security management handbook
Harold F. Tipton, 2002![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514517-n.jpg)
Information security management handbook
Harold F. Tipton, 2000![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514519-n.jpg)
Information security management handbook
Harold F. Tipton, 2004![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514521-n.jpg)
Information security management handbook
Harold F. Tipton, 2007![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514522-n.jpg)
Information security management handbook
Harold F. Tipton, 2006![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514523-n.jpg)
Information security management handbook
Harold F. Tipton, 2006![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514524-n.jpg)
Information security management handbook
Richard O"Hanley, 2013![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514525-n.jpg)
Information security management handbook
Harold F. Tipton, 2011![Information security management handbook](http://cdn.ketabkoo.com/covers/5/514526-n.jpg)