نتایج جستجو
![Vault Career Guide to Supply Chain Management (Vault Career Library)](http://cdn.ketabkoo.com/covers/1/107098-n.jpg)
Vault Career Guide to Supply Chain Management (Vault Career Library)
Javed Khan, 2007![Thermofluid Modeling for Energy Efficiency Applications](http://cdn.ketabkoo.com/covers/1/109908-n.jpg)
Thermofluid Modeling for Energy Efficiency Applications
Hassan, N. M. S.; Khan, M. M. K, 2015![Configuring Symantec Anti: Virus Enterprise Edition](http://cdn.ketabkoo.com/covers/1/113571-n.jpg)
Configuring Symantec Anti: Virus Enterprise Edition
Laura E. Hunter, Athar A. Khan, JayCee Taylor, James Stanger, Ph.D., and Robert J. Shimonski (Auth.), 2003![Configuring Symantec AntiVirus Enterprise Edition](http://cdn.ketabkoo.com/covers/1/113572-n.jpg)
Configuring Symantec AntiVirus Enterprise Edition
Author(s): Laura E. Hunter, Athar A. Khan, JayCee Taylor, James Stanger, Ph.D., and Robert J. Shimonski, 2003![Biomedical Data Management and Graph Online Querying: VLDB 2015 Workshops, Big-O(Q) and DMAH, Waikoloa, HI, USA, August 31 – September 4, 2015, Revised Selected Papers](http://cdn.ketabkoo.com/covers/1/114453-n.jpg)
Biomedical Data Management and Graph Online Querying: VLDB 2015 Workshops, Big-O(Q) and DMAH, Waikoloa, HI, USA, August 31 – September 4, 2015, Revised Selected Papers
Fusheng Wang, Gang Luo, Chunhua Weng, Arijit Khan, Prasenjit Mitra, Cong Yu (eds.), 2016![Muslim Reformist Political Thought: Revivalists, Modernists and Free Will](http://cdn.ketabkoo.com/covers/1/116339-n.jpg)
Muslim Reformist Political Thought: Revivalists, Modernists and Free Will
Sarfraz Khan, 2010![Disaster Risk Reduction Approaches in Pakistan](http://cdn.ketabkoo.com/covers/1/117488-n.jpg)
Disaster Risk Reduction Approaches in Pakistan
Atta-Ur- Rahman, Amir Nawaz Khan, Rajib Shaw (eds.), 2015![Nitric Oxide in Plants: Metabolism and Role in Stress Physiology](http://cdn.ketabkoo.com/covers/1/121539-n.jpg)
Nitric Oxide in Plants: Metabolism and Role in Stress Physiology
M. Nasir Khan, Mohammad Mobin, Firoz Mohammad, Francisco J. Corpas (eds.), 2014![Data Mining Tools for Malware Detection](http://cdn.ketabkoo.com/covers/1/122530-n.jpg)
Data Mining Tools for Malware Detection
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham, 2011![Intervention Architecture: Building for Change](http://cdn.ketabkoo.com/covers/1/124637-n.jpg)
Intervention Architecture: Building for Change
Aga Khan Foundation, Homi Bhabha, 2007![Green Networking and Communications: ICT for Sustainability](http://cdn.ketabkoo.com/covers/1/127290-n.jpg)
Green Networking and Communications: ICT for Sustainability
Shafiullah Khan, Jaime LloretMauri, 2013![Akram Khan: Dancing New Interculturalism](http://cdn.ketabkoo.com/covers/1/128412-n.jpg)
Akram Khan: Dancing New Interculturalism
Royona Mitra (auth.), 2015![Cisco Security Specialist's Guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130668-n.jpg)
Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Cisco Security Specialist's Guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130669-n.jpg)
Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Cisco security specialist's guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130670-n.jpg)
Cisco security specialist's guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Cisco Security Specialist's Guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130671-n.jpg)
Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Cisco Security Specialist's Guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130672-n.jpg)
Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Cisco Security Specialist's Guide to PIX Firewall](http://cdn.ketabkoo.com/covers/1/130673-n.jpg)
Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, 2002![Network Design and Case Studies (CCIE Fundamentals) (2nd Edition)](http://cdn.ketabkoo.com/covers/1/130972-n.jpg)
Network Design and Case Studies (CCIE Fundamentals) (2nd Edition)
Cisco Systems Inc., Tom Thomas, Atif Khan, 1999![The secret history of the Mongol queens: how the daughters of Genghis Khan rescued his empire](http://cdn.ketabkoo.com/covers/1/135925-n.jpg)
The secret history of the Mongol queens: how the daughters of Genghis Khan rescued his empire
J. McIver Weatherford, 2010![The Secret History of the Mongol Queens: How the Daughters of Genghis Khan Rescued His Empire](http://cdn.ketabkoo.com/covers/1/135926-n.jpg)
The Secret History of the Mongol Queens: How the Daughters of Genghis Khan Rescued His Empire
J. McIver Weatherford, 2010![Climate Change Risks and Food Security in Bangladesh (Earthscan Climate)](http://cdn.ketabkoo.com/covers/1/136108-n.jpg)
Climate Change Risks and Food Security in Bangladesh (Earthscan Climate)
Winston Yu, Mozaharul Alam, Ahmadul Hassan, Abu Saleh Khan, Alex Ruane, Cynthia Rosenzweig, David Major, James Thurlow, 2010![Halophytes for food security in dry lands](http://cdn.ketabkoo.com/covers/1/136169-n.jpg)