انتشارات Auerbach Publications
![PgMP® Exam Practice Test and Study Guide, Fourth Edition](http://cdn.ketabkoo.com/covers/6/651142-n.jpg)
PgMP® Exam Practice Test and Study Guide, Fourth Edition
Ginger Levin, 2013![PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud](http://cdn.ketabkoo.com/covers/6/651143-n.jpg)
PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud
Bintu Harwani, 2013![Practical Data Mining](http://cdn.ketabkoo.com/covers/6/651144-n.jpg)
Practical Data Mining
Monte F. HancockJr, 2011![The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results](http://cdn.ketabkoo.com/covers/6/654734-n.jpg)
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
Michael D. S. Harris, 2008![Information Security Management Handbook, Sixth Edition](http://cdn.ketabkoo.com/covers/6/657847-n.jpg)
Information Security Management Handbook, Sixth Edition
Micki Krause Nozaki, 2011![Information Security Policies and Procedures: A Practitioner's Reference](http://cdn.ketabkoo.com/covers/6/657848-n.jpg)
Information Security Policies and Procedures: A Practitioner's Reference
Dimitris N. Chorafas, 1998![Information Security Policies and Procedures: A Practitioner's Reference](http://cdn.ketabkoo.com/covers/6/657849-n.jpg)
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998![Information Security Policies and Procedures: A Practitioner's Reference](http://cdn.ketabkoo.com/covers/6/657850-n.jpg)
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998![Integral Logistics Management](http://cdn.ketabkoo.com/covers/6/657853-n.jpg)
Integral Logistics Management
Paul Schönsleben, 2007![Introduction to Communications Technologies: A Guide for Non-Engineers](http://cdn.ketabkoo.com/covers/6/657854-n.jpg)
Introduction to Communications Technologies: A Guide for Non-Engineers
Stephan Jones, 2002![The ethical hack : a framework for business value penetration testing](http://cdn.ketabkoo.com/covers/6/659303-n.jpg)
The ethical hack : a framework for business value penetration testing
James S Tiller, 2005![The Ethical Hack: A Framework for Business Value Penetration Testing](http://cdn.ketabkoo.com/covers/6/659305-n.jpg)
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004![Secure Data Provenance and Inference Control with Semantic Web](http://cdn.ketabkoo.com/covers/6/661013-n.jpg)
Secure Data Provenance and Inference Control with Semantic Web
Bhavani Thuraisingham, 2014![Official](http://cdn.ketabkoo.com/covers/6/665539-n.jpg)
Official
Mano Paul, 2013![WiMAX: A Wireless Technology Revolution](http://cdn.ketabkoo.com/covers/6/667178-n.jpg)
WiMAX: A Wireless Technology Revolution
G.S.V. Radha K. Rao, 2007![Wireless Crime and Forensic Investigation](http://cdn.ketabkoo.com/covers/6/667179-n.jpg)
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007![Wireless Crime and Forensic Investigation](http://cdn.ketabkoo.com/covers/6/667180-n.jpg)
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007![Wireless Internet Handbook: Technologies, Standards and Applications](http://cdn.ketabkoo.com/covers/6/667181-n.jpg)
Wireless Internet Handbook: Technologies, Standards and Applications
Borko Furht, 2003![Wireless Sensor Networks: Architectures and Protocols](http://cdn.ketabkoo.com/covers/6/667183-n.jpg)
Wireless Sensor Networks: Architectures and Protocols
Edgar H. CallawayJr., 2003![Wireless sensor networks: architectures and protocols](http://cdn.ketabkoo.com/covers/6/667184-n.jpg)
Wireless sensor networks: architectures and protocols
Edgar H. CallawayJr., 2003![Wireless Sensor Networks: Architectures and Protocols](http://cdn.ketabkoo.com/covers/6/667185-n.jpg)