انتشارات Auerbach Publications
![Adaptive Security Management Architecture](http://cdn.ketabkoo.com/covers/2/235119-n.jpg)
Adaptive Security Management Architecture
James S. Tiller, 2010![Fundamentals of DSL Technology](http://cdn.ketabkoo.com/covers/2/246138-n.jpg)
Fundamentals of DSL Technology
Philip Golden, 2004![Implementation and applications of DSL technology](http://cdn.ketabkoo.com/covers/2/246141-n.jpg)
Implementation and applications of DSL technology
Philip Golden, 2008![Enhancing Computer Security with Smart Technology](http://cdn.ketabkoo.com/covers/2/250140-n.jpg)
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2006![Enhancing Computer Security with Smart Technology](http://cdn.ketabkoo.com/covers/2/250141-n.jpg)
Enhancing Computer Security with Smart Technology
V. Rao Vemuri, 2005![Core Software Security: Security at the Source](http://cdn.ketabkoo.com/covers/2/253910-n.jpg)
Core Software Security: Security at the Source
James Ransome, 2013![HOWTO Secure and Audit Oracle 10g and 11g](http://cdn.ketabkoo.com/covers/2/255920-n.jpg)
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009![HOWTO Secure and Audit Oracle 10g and 11g](http://cdn.ketabkoo.com/covers/2/255921-n.jpg)
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009![A Guide to IT Contracting: Checklists, Tools, and Techniques](http://cdn.ketabkoo.com/covers/2/256353-n.jpg)
A Guide to IT Contracting: Checklists, Tools, and Techniques
Michael R. Overly, 2012![Leading the internal audit function](http://cdn.ketabkoo.com/covers/2/256793-n.jpg)
Leading the internal audit function
Fountain, 2016![Software engineering foundations : a software science perspective](http://cdn.ketabkoo.com/covers/2/257632-n.jpg)
Software engineering foundations : a software science perspective
Yingxu Wang, 2008![Critical Incident Management](http://cdn.ketabkoo.com/covers/2/258668-n.jpg)
Critical Incident Management
Alan B. Sterneckert, 2003![Critical Incident Management](http://cdn.ketabkoo.com/covers/2/258669-n.jpg)
Critical Incident Management
Alan B. Sterneckert, 2003![802.1X Port-Based Authentication](http://cdn.ketabkoo.com/covers/2/266288-n.jpg)
802.1X Port-Based Authentication
Edwin Lyle Brown, 2006![A Guide to Publishing for Academics: Inside the Publish or Perish Phenomenon](http://cdn.ketabkoo.com/covers/2/270885-n.jpg)
A Guide to Publishing for Academics: Inside the Publish or Perish Phenomenon
Jay Liebowitz, 2015![Adaptive, Dynamic, and Resilient Systems](http://cdn.ketabkoo.com/covers/2/270886-n.jpg)
Adaptive, Dynamic, and Resilient Systems
Niranjan Suri, 2014![Millimeter Wave Technology in Wireless PAN, LAN, and MAN](http://cdn.ketabkoo.com/covers/2/271045-n.jpg)