انتشارات Auerbach Publications
The Ethical Hack: A Framework for Business Value Penetration Testing
James S. Tiller, 2004
Making Your Data Center Energy Efficient
Gilbert Held, 2011
Using Technology to Transform the Value Chain
Fred Kuglin, 2008
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Margaret K. Kulpa, 2008
Interpreting the CMMI: A Process Improvement Approach
Margaret Kulpa, 2003
The Green and Virtual Data Center
Greg Schulz, 2009
Security Software Development: Assessing and Managing Security Risks
Douglas A. AshbaughCISSP, 2008
Security in Sensor Networks
Yang Xiao, 2006
Organizational Crisis Management: The Human Factor
Gerald Lewis, 2006
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Lightweight Enterprise Architectures
Fenix Theuerkorn, 2004
Introduction to Light Emitting Diode Technology and Applications
Gilbert Held, 2008
Leadership in Chaordic Organizations
Beverly Gay McCarter, 2012
Manage Software Testing
Peter Farrell-Vinay, 2008
Managing A Network Vulnerability Assessment
Thomas R. Peltier, 2003
Managing A Network Vulnerability Assessmentib
Thomas R. Peltier, 2003
Managing A Network Vulnerability AssessmentiB
Thomas R. Peltier, 2003
Managing Lean Projects
Ralph L. Kliem, 2015
Mastering the Rules of Competitive Strategy: A Resource Guide for Managers
Norton Paley, 2007
