انتشارات Auerbach Publications, Crc
![Natural Hazards Analysis: Reducing the Impact of Disasters](http://cdn.ketabkoo.com/covers/1/117051-n.jpg)
Natural Hazards Analysis: Reducing the Impact of Disasters
John Pine, 2008![Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)](http://cdn.ketabkoo.com/covers/1/118234-n.jpg)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008![Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)](http://cdn.ketabkoo.com/covers/1/118235-n.jpg)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Borko Furht, Syed A. Ahson, 2008![Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks](http://cdn.ketabkoo.com/covers/1/118298-n.jpg)
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007![Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks](http://cdn.ketabkoo.com/covers/1/118299-n.jpg)
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007![Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks](http://cdn.ketabkoo.com/covers/1/118300-n.jpg)
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
John J. Amoss, Daniel Minoli, 2007![Satellite Systems Engineering in an IPv6 Environment](http://cdn.ketabkoo.com/covers/1/118326-n.jpg)
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009![Satellite Systems Engineering in an IPv6 Environment](http://cdn.ketabkoo.com/covers/1/118327-n.jpg)
Satellite Systems Engineering in an IPv6 Environment
Daniel Minoli, 2009![Security in an IPv6 Environment](http://cdn.ketabkoo.com/covers/1/118329-n.jpg)
Security in an IPv6 Environment
Daniel Minoli, Jake Kouns, 2008![Implementing electronic document and record management systems](http://cdn.ketabkoo.com/covers/1/121414-n.jpg)
Implementing electronic document and record management systems
Azad Adam, 2008![Inter- and intra-vehicle communications](http://cdn.ketabkoo.com/covers/1/121462-n.jpg)
Inter- and intra-vehicle communications
Gilbert Held, 2008![Android Malware and Analysis](http://cdn.ketabkoo.com/covers/1/122522-n.jpg)
Android Malware and Analysis
Ken Dunham, 2014![Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)](http://cdn.ketabkoo.com/covers/1/128931-n.jpg)
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006![Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)](http://cdn.ketabkoo.com/covers/1/128932-n.jpg)
Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006![Practical hacking techniques and countermeasures](http://cdn.ketabkoo.com/covers/1/129943-n.jpg)
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006![Practical hacking techniques and countermeasures](http://cdn.ketabkoo.com/covers/1/129944-n.jpg)
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006![Profiling hackers: the science of criminal profiling as applied to the world of hacking](http://cdn.ketabkoo.com/covers/1/129949-n.jpg)
Profiling hackers: the science of criminal profiling as applied to the world of hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008![Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking](http://cdn.ketabkoo.com/covers/1/129950-n.jpg)
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008![Securing and controlling Cisco routers](http://cdn.ketabkoo.com/covers/1/130910-n.jpg)
Securing and controlling Cisco routers
Peter T. Davis, 2002![Securing and controlling Cisco routers](http://cdn.ketabkoo.com/covers/1/130911-n.jpg)
Securing and controlling Cisco routers
Peter T. Davis, 2002![Information Security Risk Analysis](http://cdn.ketabkoo.com/covers/1/131540-n.jpg)
Information Security Risk Analysis
Thomas R. Peltier, 2005![A Supply Chain Logistics Program for Warehouse Management](http://cdn.ketabkoo.com/covers/1/134332-n.jpg)
A Supply Chain Logistics Program for Warehouse Management
David E. Mulcahy, Joachim Sydow, 2008![A Practical Guide to Content Delivery Networks](http://cdn.ketabkoo.com/covers/1/145972-n.jpg)
A Practical Guide to Content Delivery Networks
Gilbert Held, 2005![Building a wireless office](http://cdn.ketabkoo.com/covers/1/145975-n.jpg)