انتشارات Crc Press, Auerbach Publications
Software and Systems Architecture in Action
Raghvinder Sangwan, 2014
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
Tyson Macaulay, Bryan L. Singer, 2011
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits
James S. Tiller, 2011
Ethical Hacking and Penetration Testing Guide
Rafay Baloch, 2014
Big Data Analytics Strategies for the Smart Grid
Carol L. Stimmel, 2014
Big Data, Mining, and Analytics: Components of Strategic Decision Making
Stephan Kudyba, 2014
Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making
Jay Liebowitz, 2014
A Guide to Lean Six Sigma Management Skills
Howard S Gitlow, 2009
Data Mining Tools for Malware Detection
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham, 2011
Construction Program Management
Joseph Delaney, 2013
Information Security Risk Analysis
Thomas R. Peltier, 2010
BYOD for Healthcare
Jessica Keyes, 2014
Core Software Security: Security at the Source
James Ransome, 2013
HOWTO Secure and Audit Oracle 10g and 11g
Ron Ben-Natan, 2009
A Guide to IT Contracting: Checklists, Tools, and Techniques
Michael R. Overly, 2012
Leading the internal audit function
Fountain, 2016
Adaptive, Dynamic, and Resilient Systems
Niranjan Suri, 2014
Web-Based and Traditional Outsourcing
Vivek Sharma, 2011
Understanding Information Retrieval Systems: Management, Types, and Standards
Marcia J. Bates, 2011
Total Quality Management for Project Management
Kim H. Pries, 2012
The State of the Art in Intrusion Prevention and Detection
Al-Sakib Khan Pathan, 2014
The SAP Materials Management Handbook
Ashfaque Ahmed, 2014
The Portal to Lean Production: Principles and Practices for Doing More with Less
John Nicholas, 2005
