نتایج جستجو

Beginning SQL Server 2000 DBA: From Novice to Professional
Tony Bain, Baya Pavliashvili, Joseph Sack, Michael Benkovich, Brian Freeman (auth.), 2004
Expert PL/SQL Practices: for Oracle Developers and DBAs
John Beresniewicz, Adrian Billington, Martin Büchi, Melanie Caffrey, Ron Crisco, Lewis Cunningham, Dominic Delmolino, Sue Harper, Torben Holm, Connor McDonald, Arup Nanda, Stephan Petit, Michael Rosenblum, Robyn Sands, Riyaj Shamsudeen (auth.), 2011
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
Enterprise (Star Trek: My Brother's Keeper, Book 3)
Michael Jan Friedman, 1999
Enterprise Resource Planning: Implementation and Management Accounting Change in a Transitional Country
Ahmed Kholeif, Magdy Abdel -Kader, Michael Sherer, 2008
Ethics for the Information Age
Michael J. Quinn, 2014
Organizational Behavior
Michael A. Hitt, Adrienne Colella, C. Chet Miller, 2010
Podcast Solutions: The Complete Guide to Podcasting
Michael Geoghegan, Dan Klass, 2005
Star Trek: Enterprise: Kobayashi Maru (Star Trek : Enterprise)
Michael A. Martin, Andy Mangels, 2008
Starting a Successful Business (Sunday Times Business Enterprise)
Michael J Morris, 2005
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
Debra S. Isaac, Michael J. Isaac, 2003
AVIEN Malware Defense Guide for the Enterprise
David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja, 2007
AVIEN Malware Defense Guide for the Enterprise
David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja, 2007
Building Enterprise Ready Telephony Systems with sipXecs 4.0
Michael W. Picher, 2009