种子简介
种子名称:
Auerbach
文件类型:
文件数目:
48个文件
文件大小:
583.95 MB
收录时间:
2009-1-25 21:34
已经下载:
3次
资源热度:
82
最近下载:
2024-11-19 13:48
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:7B0BD4F5CB5ACCF7A5D02F5E8D9517A3F5032DB0&dn=Auerbach
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Auerbach.torrent
Auerbach - A Standard for Enterprise Project Management.pdf6.3MB
Auerbach - Active and Programmable Networks for Adaptive Architectures and Services.pdf9.69MB
Auerbach - Best Practices in Business Technology Management.pdf7.89MB
Auerbach - Building Trustworthy Semantic Webs.pdf13.14MB
Auerbach - Business Strategies for the Next Generation Network.pdf4.56MB
Auerbach - Complete Guide to CISM Certification.pdf17.3MB
Auerbach - Context Aware Pervasive Systems.pdf5.27MB
Auerbach - Creating Components Object Oriented Concurrent and Distributed Computing in Java.chm3.02MB
Auerbach - Critical Incident Management.chm2.57MB
Auerbach - Cyber Crime Field Handbook.pdf2.26MB
Auerbach - Cyber Forensics A Field Manual for Collecting Examining & Preserving Evidence of Computer Crimes.pdf3.73MB
Auerbach - Database Design Using Entity-Relationship Diagrams.pdf3.74MB
Auerbach - Defining and Deploying Software Processes.pdf3.69MB
Auerbach - Enhancing LAN Performance 4th Edition.chm13.49MB
Auerbach - Enterprise Systems Backup and Recovery - A Corporate Insurance Policy.pdf7.3MB
Auerbach - Grid Database Design.pdf4.47MB
Auerbach - Handbook Of Video Databases Design and Applications.chm34.22MB
Auerbach - Information Security Management Handbook Volume 2 6th Edition.pdf7.84MB
Auerbach - Information Security Management Handbook, Fifth Edition.pdf42.93MB
Auerbach - Integrating ERP CRM Supply Chain Management and Smart Materials.pdf3.83MB
Auerbach - Investigator's Guide to Steganography.chm6.4MB
Auerbach - Knowledge Retention Strategies and Solutions.pdf4.62MB
Auerbach - Leading IT Projects - The IT Managers Guide.pdf9.59MB
Auerbach - Lightweight Enterprise Architectures.pdf4.95MB
Auerbach - Malicious Bots An Inside Look into the Cyber-Criminal Underground of the Internet.pdf5.77MB
Auerbach - Manage Software Testing.pdf15.58MB
Auerbach - New Directions in Project Management.pdf3.84MB
Auerbach - Official ISC 2 Guide to the CISSP-ISSEP.pdf30.63MB
Auerbach - Oracle 11i E-Business Suite From The Front Lines.chm7.09MB
Auerbach - Packet Forwarding Technologies.pdf14.59MB
Auerbach - Patterns for Performance and Operability.pdf10.56MB
Auerbach - Practical Hacking Techniques and Countermeasures.pdf143.97MB
Auerbach - Reducing Risk with Software Process Improvement.pdf5.11MB
Auerbach - Security in Wireless Mesh Networks.pdf10.05MB
Auerbach - Server Disk Management in a Windows Enviornment.chm2.89MB
Auerbach - Software Sizing Estimation and Risk.Management.pdf11.3MB
Auerbach - Strategic Information Security.chm824.71KB
Auerbach - Sucessful Packaged Software Implementation.pdf3.82MB
Auerbach - The Ethical Hack - A Framework for Business Value Penetration Testing.pdf30.5KB
Auerbach - The Hacker's Handbook The Strategy Behind Breaking into and Defending Networks.pdf18.07MB
Auerbach - Unlicensed Mobile Access Technology.pdf9.74MB
Auerbach - Value Added Services for Next Generation Networks.pdf2.61MB
Auerbach - VMware ESX Essentials in the Virtual Data Center.pdf6.71MB
Auerbach - Web Data Mining and Applications in Business Intelligence and Counter Terrorism.chm24.81MB
Auerbach - Wireless Ad Hoc Networking.pdf9.84MB
Auerbach - Wireless Mesh Networking Architectures Protocols and Standards.pdf6.09MB
Auerbach - Wireless Quality of Service Techniques Standards and Applications.pdf17.26MB
Torrent downloaded from Demonoid.com.txt47B