انتشارات Auerbach Publications
![Portfolio Management: A Strategic Approach](http://cdn.ketabkoo.com/covers/9/943862-n.jpg)
Portfolio Management: A Strategic Approach
Ginger Levin, 2014![Software Metrics: A Guide to Planning, Analysis, and Application](http://cdn.ketabkoo.com/covers/9/945295-n.jpg)
Software Metrics: A Guide to Planning, Analysis, and Application
C. Ravindranath Pandian, 2003![The Complete Book of Middleware](http://cdn.ketabkoo.com/covers/9/951374-n.jpg)
The Complete Book of Middleware
Judith M. Myerson, 2002![Official](http://cdn.ketabkoo.com/covers/9/976678-n.jpg)
Official
Diana-Lynn Contesti, 2007![Testing Code Security](http://cdn.ketabkoo.com/covers/9/977680-n.jpg)
Testing Code Security
Maura A. van der Linden, 2007![Service-Oriented Architecture: SOA Strategy, Methodology, and Technology](http://cdn.ketabkoo.com/covers/9/994947-n.jpg)
Service-Oriented Architecture: SOA Strategy, Methodology, and Technology
James P. Lawler, 2007![The ROI from Software Quality](http://cdn.ketabkoo.com/covers/10/1000654-n.jpg)
The ROI from Software Quality
Khaled El Emam, 2005![Secure Semantic Service-Oriented Systems](http://cdn.ketabkoo.com/covers/10/1010576-n.jpg)
Secure Semantic Service-Oriented Systems
Bhavani Thuraisingham, 2010![Information security risk analysis](http://cdn.ketabkoo.com/covers/10/1027972-n.jpg)
Information security risk analysis
Peltier, Thomas R, 2010![A guide to IT contracting: checklists, tools, and techniques](http://cdn.ketabkoo.com/covers/10/1028751-n.jpg)
A guide to IT contracting: checklists, tools, and techniques
Karlyn, Matthew A.; Overly, Michael R, 2013![A guide to IT contracting: checklists, tools, and techniques](http://cdn.ketabkoo.com/covers/10/1029016-n.jpg)
A guide to IT contracting: checklists, tools, and techniques
Karlyn, Matthew A.; Overly, Michael R, 2013![Enterprise Level Security](http://cdn.ketabkoo.com/covers/10/1029037-n.jpg)
Enterprise Level Security
Simpson, William Randolph, 2016![Knowledge management in practice](http://cdn.ketabkoo.com/covers/10/1029830-n.jpg)
Knowledge management in practice
Rhem, Anthony J, 2016![Leading the internal audit function](http://cdn.ketabkoo.com/covers/10/1030102-n.jpg)
Leading the internal audit function
Fountain, Lynn, 2016![Project portfolio management in practice: thirty case studies from around the world](http://cdn.ketabkoo.com/covers/10/1031783-n.jpg)
Project portfolio management in practice: thirty case studies from around the world
Moustafaev, Jamal, 2016![Making it in IT](http://cdn.ketabkoo.com/covers/10/1031899-n.jpg)
Making it in IT
Critchley, Terry, 2017![Data protection officer: profession, rules, and role](http://cdn.ketabkoo.com/covers/10/1032041-n.jpg)
Data protection officer: profession, rules, and role
Lambert, Paul, 2016![Wildlife Forensic Investigation Principles and Practice](http://cdn.ketabkoo.com/covers/10/1034189-n.jpg)
Wildlife Forensic Investigation Principles and Practice
John E. Cooper, 2013![Data Protection: Ensuring Data Availability](http://cdn.ketabkoo.com/covers/10/1056380-n.jpg)
Data Protection: Ensuring Data Availability
Preston de Guise, 2017![A Guide to selecting software measures and metrics](http://cdn.ketabkoo.com/covers/10/1056384-n.jpg)
A Guide to selecting software measures and metrics
Jones, Capers, 2017![Results-based systematic operational improvement](http://cdn.ketabkoo.com/covers/10/1056389-n.jpg)
Results-based systematic operational improvement
Butuner, Hakan, 2017![Software Adaptation in an Open Environment: a software architecture perspective](http://cdn.ketabkoo.com/covers/10/1056512-n.jpg)
Software Adaptation in an Open Environment: a software architecture perspective
Yu Zhou, Taolue Chen, 2017![Risk Thinking for Cloud-Based Application Services](http://cdn.ketabkoo.com/covers/10/1056515-n.jpg)
Risk Thinking for Cloud-Based Application Services
BAUER, ERIC, 2017![Cognitive hack : the new battleground in cybersecurity... the human mind](http://cdn.ketabkoo.com/covers/10/1057647-n.jpg)