انتشارات Auerbach Publications
![The Ethical Hack: A Framework for Business Value Penetration Testing](http://cdn.ketabkoo.com/covers/5/593989-n.jpg)
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004![Making Your Data Center Energy Efficient](http://cdn.ketabkoo.com/covers/5/595052-n.jpg)
Making Your Data Center Energy Efficient
Gilbert Held, 2011![Using Technology to Transform the Value Chain](http://cdn.ketabkoo.com/covers/5/595842-n.jpg)
Using Technology to Transform the Value Chain
Fred Kuglin, 2008![Interpreting the CMMI (R): A Process Improvement Approach, Second Edition](http://cdn.ketabkoo.com/covers/5/598201-n.jpg)
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Margaret K. Kulpa, 2008![Interpreting the CMMI: A Process Improvement Approach](http://cdn.ketabkoo.com/covers/5/598203-n.jpg)
Interpreting the CMMI: A Process Improvement Approach
Margaret Kulpa, 2003![The Green and Virtual Data Center](http://cdn.ketabkoo.com/covers/6/602069-n.jpg)
The Green and Virtual Data Center
Greg Schulz, 2009![Security Software Development: Assessing and Managing Security Risks](http://cdn.ketabkoo.com/covers/6/604555-n.jpg)
Security Software Development: Assessing and Managing Security Risks
Douglas A. AshbaughCISSP, 2008![Security in Sensor Networks](http://cdn.ketabkoo.com/covers/6/611513-n.jpg)
Security in Sensor Networks
Yang Xiao, 2006![Organizational Crisis Management: The Human Factor](http://cdn.ketabkoo.com/covers/6/618420-n.jpg)
Organizational Crisis Management: The Human Factor
Gerald Lewis, 2006![Security in Distributed, Grid, Mobile, and Pervasive Computing](http://cdn.ketabkoo.com/covers/6/619845-n.jpg)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007![Security in Distributed, Grid, Mobile, and Pervasive Computing](http://cdn.ketabkoo.com/covers/6/619846-n.jpg)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007![Security in Distributed, Grid, Mobile, and Pervasive Computing](http://cdn.ketabkoo.com/covers/6/619847-n.jpg)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007![Security in Distributed, Grid, Mobile, and Pervasive Computing](http://cdn.ketabkoo.com/covers/6/619848-n.jpg)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007![Lightweight Enterprise Architectures](http://cdn.ketabkoo.com/covers/6/619885-n.jpg)
Lightweight Enterprise Architectures
Fenix Theuerkorn, 2004![Introduction to Light Emitting Diode Technology and Applications](http://cdn.ketabkoo.com/covers/6/625608-n.jpg)
Introduction to Light Emitting Diode Technology and Applications
Gilbert Held, 2008![Leadership in Chaordic Organizations](http://cdn.ketabkoo.com/covers/6/626059-n.jpg)
Leadership in Chaordic Organizations
Beverly Gay McCarter, 2012![Manage Software Testing](http://cdn.ketabkoo.com/covers/6/630123-n.jpg)
Manage Software Testing
Peter Farrell-Vinay, 2008![Managing A Network Vulnerability Assessment](http://cdn.ketabkoo.com/covers/6/630124-n.jpg)
Managing A Network Vulnerability Assessment
Thomas R. Peltier, 2003![Managing A Network Vulnerability Assessmentib](http://cdn.ketabkoo.com/covers/6/630125-n.jpg)
Managing A Network Vulnerability Assessmentib
Thomas R. Peltier, 2003![Managing A Network Vulnerability AssessmentiB](http://cdn.ketabkoo.com/covers/6/630126-n.jpg)
Managing A Network Vulnerability AssessmentiB
Thomas R. Peltier, 2003![Managing Lean Projects](http://cdn.ketabkoo.com/covers/6/630127-n.jpg)
Managing Lean Projects
Ralph L. Kliem, 2015![Mastering the Rules of Competitive Strategy: A Resource Guide for Managers](http://cdn.ketabkoo.com/covers/6/630128-n.jpg)
Mastering the Rules of Competitive Strategy: A Resource Guide for Managers
Norton Paley, 2007![Mastering the Rules of Competitive Strategy: A Resource Guide for Managers](http://cdn.ketabkoo.com/covers/6/630129-n.jpg)