انتشارات Auerbach Publications
![Mechanics of User Identification and Authentication: Fundamentals of Identity Management](http://cdn.ketabkoo.com/covers/6/630130-n.jpg)
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Dobromir Todorov, 2007![Mobile Telemedicine: A Computing and Networking Perspective](http://cdn.ketabkoo.com/covers/6/630132-n.jpg)
Mobile Telemedicine: A Computing and Networking Perspective
Yang Xiao, 2008![Modeling Software Behavior: A Craftsman's Approach](http://cdn.ketabkoo.com/covers/6/630134-n.jpg)
Modeling Software Behavior: A Craftsman's Approach
Paul C. Jorgensen, 2009![Modeling Software with Finite State Machines: A Practical Approach](http://cdn.ketabkoo.com/covers/6/630135-n.jpg)
Modeling Software with Finite State Machines: A Practical Approach
Ferdinand Wagner, 2006![Simple Statistical Methods for Software Engineering: Data and Patterns](http://cdn.ketabkoo.com/covers/6/638110-n.jpg)
Simple Statistical Methods for Software Engineering: Data and Patterns
C. Ravindranath Pandian, 2015![Practical project management : for building and construction](http://cdn.ketabkoo.com/covers/6/651121-n.jpg)
Practical project management : for building and construction
Ottosson, 2012![Private Security and the Investigative Process, Third Edition](http://cdn.ketabkoo.com/covers/6/651122-n.jpg)
Private Security and the Investigative Process, Third Edition
Charles P. Nemeth, 2010![Process-Based Software Project Management](http://cdn.ketabkoo.com/covers/6/651123-n.jpg)
Process-Based Software Project Management
F. Alan Goodman, 2006![Program Management Leadership: Creating Successful Team Dynamics](http://cdn.ketabkoo.com/covers/6/651124-n.jpg)
Program Management Leadership: Creating Successful Team Dynamics
Mark C. Bojeun, 2013![Programming Languages for Business Problem Solving](http://cdn.ketabkoo.com/covers/6/651125-n.jpg)
Programming Languages for Business Problem Solving
Shouhong Wang, 2007![Project management theory and practice](http://cdn.ketabkoo.com/covers/6/651126-n.jpg)
Project management theory and practice
Richardson, 2010![Secure and resilient software development](http://cdn.ketabkoo.com/covers/6/651128-n.jpg)
Secure and resilient software development
Mark S Merkow, 2010![Secure and Resilient Software Development](http://cdn.ketabkoo.com/covers/6/651129-n.jpg)
Secure and Resilient Software Development
Raghavan, Lakshmikanth, 2010![Security for Service Oriented Architectures](http://cdn.ketabkoo.com/covers/6/651130-n.jpg)
Security for Service Oriented Architectures
Walter Williams, 2014![Intrusion Detection Networks: A Key to Collaborative Security](http://cdn.ketabkoo.com/covers/6/651133-n.jpg)
Intrusion Detection Networks: A Key to Collaborative Security
Carol Fung, 2013![Large Scale and Big Data: Processing and Management](http://cdn.ketabkoo.com/covers/6/651137-n.jpg)
Large Scale and Big Data: Processing and Management
Sherif Sakr, 2014![Multimedia Watermarking Techniques and Applications](http://cdn.ketabkoo.com/covers/6/651138-n.jpg)
Multimedia Watermarking Techniques and Applications
Darko Kirovski, 2006![Official (ISC)2® Guide to the CCFP CBK](http://cdn.ketabkoo.com/covers/6/651139-n.jpg)
Official (ISC)2® Guide to the CCFP CBK
Peter Stephenson, 2014![Official (ISC)2® Guide to the ISSAP® CBK, Second Edition](http://cdn.ketabkoo.com/covers/6/651140-n.jpg)
Official (ISC)2® Guide to the ISSAP® CBK, Second Edition
ISC)² Corporate, 2013![PCI Compliance: The Definitive Guide](http://cdn.ketabkoo.com/covers/6/651141-n.jpg)