انتشارات Auerbach Publications
PgMP® Exam Practice Test and Study Guide, Fourth Edition
Ginger Levin, 2013
PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud
Bintu Harwani, 2013
Practical Data Mining
Monte F. HancockJr, 2011
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
Michael D. S. Harris, 2008
Information Security Management Handbook, Sixth Edition
Micki Krause Nozaki, 2011
Information Security Policies and Procedures: A Practitioner's Reference
Dimitris N. Chorafas, 1998
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998
Information Security Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier, 1998
Integral Logistics Management
Paul Schönsleben, 2007
Introduction to Communications Technologies: A Guide for Non-Engineers
Stephan Jones, 2002
The ethical hack : a framework for business value penetration testing
James S Tiller, 2005
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004
Secure Data Provenance and Inference Control with Semantic Web
Bhavani Thuraisingham, 2014
Official
Mano Paul, 2013
WiMAX: A Wireless Technology Revolution
G.S.V. Radha K. Rao, 2007
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007
Wireless Crime and Forensic Investigation
Gregory Kipper, 2007
Wireless Internet Handbook: Technologies, Standards and Applications
Borko Furht, 2003
Wireless Sensor Networks: Architectures and Protocols
Edgar H. CallawayJr., 2003
Wireless sensor networks: architectures and protocols
Edgar H. CallawayJr., 2003
