نتایج جستجو
![Managing Business Risk: A Practical Guide to Protecting Your Business](http://cdn.ketabkoo.com/covers/1/127703-n.jpg)
Managing Business Risk: A Practical Guide to Protecting Your Business
Jonathan Reuvid, 2008![Managing Business Risk: A Practical Guide to Protecting Your Business](http://cdn.ketabkoo.com/covers/1/127704-n.jpg)
Managing Business Risk: A Practical Guide to Protecting Your Business
Jonathan Reuvid, 2007![Managing Business Risk: A Practical Guide to Protecting Your Business](http://cdn.ketabkoo.com/covers/1/127705-n.jpg)
Managing Business Risk: A Practical Guide to Protecting Your Business
Jonathan Reuvid, 2010![Managing Business Risk: A Practical Guide to Protecting Your Business](http://cdn.ketabkoo.com/covers/1/127706-n.jpg)
Managing Business Risk: A Practical Guide to Protecting Your Business
Jonathan Reuvid, 2005![Mergers and Acquisitions](http://cdn.ketabkoo.com/covers/1/127707-n.jpg)
Mergers and Acquisitions
Jonathan Reuvid, 2007![Mergers and Acquisitions: A Practical Guide for Private Companies and Their Advisers](http://cdn.ketabkoo.com/covers/1/127708-n.jpg)
Mergers and Acquisitions: A Practical Guide for Private Companies and Their Advisers
Jonathan Reuvid, 2007![Expert Oracle Practices: Oracle Database Administration from the](http://cdn.ketabkoo.com/covers/1/127831-n.jpg)
Expert Oracle Practices: Oracle Database Administration from the
Pete Finnigan, Alex Gorbachev, Randolf Geist, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Joze Senegacnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood, 2010![Expert Oracle Practices: Oracle Database Administration from the Oak Table](http://cdn.ketabkoo.com/covers/1/127832-n.jpg)
Expert Oracle Practices: Oracle Database Administration from the Oak Table
Pete Finnigan, Alex Gorbachev, Randolf Geist, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Joze Senegacnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood, 2010![Expert Oracle Practices: Oracle Database Administration from the Oak Table](http://cdn.ketabkoo.com/covers/1/127833-n.jpg)
Expert Oracle Practices: Oracle Database Administration from the Oak Table
Melanie Caffrey, Pete Finnigan, Randolf Geist, Alex Gorbachev, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Jože Senegačnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood (auth.), 2010![Oracle Insights: Tales of the Oak Table](http://cdn.ketabkoo.com/covers/1/127835-n.jpg)
Oracle Insights: Tales of the Oak Table
Mogens Nørgaard, James Morle, Dave Ensor, Tim Gorman, Kyle Hailey, Anjo Kolk, Jonathan Lewis, Connor McDonald, Cary Millsap, David Ruthven, Gaja Krishna Vaidyanatha (auth.), 2004![Cognition, Vol. 7, No. 4](http://cdn.ketabkoo.com/covers/1/128028-n.jpg)
Cognition, Vol. 7, No. 4
Jose Morais, Luz Cary, Jesus Alegria, Paul Bertelson, Guy Woodruff, David Premack, J. Langford, V.M. Holmes, L. Jonathan Cohen, Daniel Kahneman, Amos Tversky, Andrew W. Ellis & Anthony F. Jorm, 1979![Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook](http://cdn.ketabkoo.com/covers/1/129286-n.jpg)
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007![Gray Hat Hacking: The Ethical Hacker's Handbook](http://cdn.ketabkoo.com/covers/1/129287-n.jpg)
Gray Hat Hacking: The Ethical Hacker's Handbook
Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams, 2011![Gray Hat Hacking: The Ethical Hacker’s Handbook](http://cdn.ketabkoo.com/covers/1/129288-n.jpg)
Gray Hat Hacking: The Ethical Hacker’s Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007![Hacking and Securing iOS Applications](http://cdn.ketabkoo.com/covers/1/129295-n.jpg)
Hacking and Securing iOS Applications
Jonathan Zdziarski, 2012![Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It](http://cdn.ketabkoo.com/covers/1/129296-n.jpg)
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012![Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It](http://cdn.ketabkoo.com/covers/1/129297-n.jpg)
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012![Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It](http://cdn.ketabkoo.com/covers/1/129298-n.jpg)
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012![Gray hat hacking : the ethical hacker's handbook](http://cdn.ketabkoo.com/covers/1/129691-n.jpg)
Gray hat hacking : the ethical hacker's handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2011![Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition](http://cdn.ketabkoo.com/covers/1/129692-n.jpg)
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Shon Harris, Allen Harper, Jonathan Ness, Terron Williams, Gideon Lenkey, 2011![Cisco Frame Relay Solutions Guide](http://cdn.ketabkoo.com/covers/1/130280-n.jpg)
Cisco Frame Relay Solutions Guide
Jonathan Chin, 2004![Intrusion Prevention Fundamentals](http://cdn.ketabkoo.com/covers/1/130630-n.jpg)
Intrusion Prevention Fundamentals
Earl Carter, Jonathan Hogue, 2006![Headache](http://cdn.ketabkoo.com/covers/1/130719-n.jpg)
Headache
Todd J. Schwedt, Jonathan P. Gladstone, R. Allan Purdy, David W. Dodick, 2010![Headache (Cambridge Pocket Clinicians)](http://cdn.ketabkoo.com/covers/1/130720-n.jpg)