انتشارات Auerbach Publications
![Theory of Science and Technology Transfer and Applications](http://cdn.ketabkoo.com/covers/4/443668-n.jpg)
Theory of Science and Technology Transfer and Applications
Sifeng Liu, 2009![Securing E-Business Applications and Communications](http://cdn.ketabkoo.com/covers/4/446828-n.jpg)
Securing E-Business Applications and Communications
Jonathan S. Held, 2001![Wireless Mesh Networks](http://cdn.ketabkoo.com/covers/4/450223-n.jpg)
Wireless Mesh Networks
Gilbert Held, 2005![Wireless Mesh Networks](http://cdn.ketabkoo.com/covers/4/450224-n.jpg)
Wireless Mesh Networks
Gilbert Held, 2005![Managing Projects in Trouble: Achieving Turnaround and Success](http://cdn.ketabkoo.com/covers/4/450907-n.jpg)
Managing Projects in Trouble: Achieving Turnaround and Success
Ralph L. KliemPMP, 2011![Vehicular Networks](http://cdn.ketabkoo.com/covers/4/452011-n.jpg)
Vehicular Networks
Hassnaa Moustafa, 2009![High-Performance Web Databases: Design, Development, and Deployment](http://cdn.ketabkoo.com/covers/4/452990-n.jpg)
High-Performance Web Databases: Design, Development, and Deployment
Sanjiv Purba, 2000![The IFPUG Guide to IT and Software Measurement](http://cdn.ketabkoo.com/covers/4/460724-n.jpg)
The IFPUG Guide to IT and Software Measurement
IFPUG, 2012![IMS: A New Model for Blending Applications](http://cdn.ketabkoo.com/covers/4/461244-n.jpg)
IMS: A New Model for Blending Applications
Mark Wuthnow, 2009![IMS: A New Model for Blending Applications (Informa Telecoms & Media)](http://cdn.ketabkoo.com/covers/4/461245-n.jpg)
IMS: A New Model for Blending Applications (Informa Telecoms & Media)
Mark Wuthnow, 2009![Database Development and Management](http://cdn.ketabkoo.com/covers/4/466846-n.jpg)
Database Development and Management
Lee Chao, 2006![The Practical Guide to HIPAA Privacy and Security Compliance](http://cdn.ketabkoo.com/covers/4/471050-n.jpg)
The Practical Guide to HIPAA Privacy and Security Compliance
Kevin Beaver, 2004![The Practical Guide to HIPAA Privacy and Security Compliance](http://cdn.ketabkoo.com/covers/4/471051-n.jpg)
The Practical Guide to HIPAA Privacy and Security Compliance
Kevin Beaver, 2003![The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition](http://cdn.ketabkoo.com/covers/4/471052-n.jpg)
The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition
Rebecca Herold, 2014![Software Requirements: Encapsulation, Quality, And Reuse](http://cdn.ketabkoo.com/covers/4/475276-n.jpg)
Software Requirements: Encapsulation, Quality, And Reuse
Rick Lutowski, 2005![Software Requirements: Encapsulation, Quality, and Reuse](http://cdn.ketabkoo.com/covers/4/475278-n.jpg)
Software Requirements: Encapsulation, Quality, and Reuse
Rick Lutowski, 2005![Design and Safety Assessment of Critical Systems](http://cdn.ketabkoo.com/covers/4/477695-n.jpg)
Design and Safety Assessment of Critical Systems
Marco Bozzano, 2010![Business, Marketing, and Management Principles for IT and Engineering](http://cdn.ketabkoo.com/covers/4/477885-n.jpg)
Business, Marketing, and Management Principles for IT and Engineering
Dimitris N. Chorafas, 2011![Business, Marketing, and Management Principles for IT and Engineering](http://cdn.ketabkoo.com/covers/4/477887-n.jpg)
Business, Marketing, and Management Principles for IT and Engineering
Dimitris N. Chorafas, 2011![The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture](http://cdn.ketabkoo.com/covers/4/478770-n.jpg)
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture
Kerry Ann Anderson, 2014![VMware ESX Essentials in the Virtual Data Center](http://cdn.ketabkoo.com/covers/4/480388-n.jpg)
VMware ESX Essentials in the Virtual Data Center
David Marshall, 2008![Investigations in the workplace](http://cdn.ketabkoo.com/covers/4/484405-n.jpg)
Investigations in the workplace
Eugene Ferraro, 2006![Project management maturity model second edition](http://cdn.ketabkoo.com/covers/4/484477-n.jpg)