Auerbach Publications

Vis mig kun

Cyber Fraud

Cyber Fraud

Howard, Rick

509,93 DKK

7 Qualities of Highly Secure Software

7 Qualities of Highly Secure Software

Paul, Mano

546,47 DKK

Security without Obscurity

Security without Obscurity

Stapleton, J.J.

403,64 DKK

Privacy Papers

Privacy Papers

Herold, Rebecca

403,64 DKK

Digital Innovation for Pandemics

Digital Innovation for Pandemics

Sidhu, Navjot

436,85 DKK

Android Security

Android Security

Dubey, Abhishek

509,93 DKK

Ethics and the Internal Auditor's Political Dilemma

Ethics and the Internal Auditor's Political Dilemma

Fountain, Lynn

692,63 DKK

Art of Linux Kernel Design

Art of Linux Kernel Design

Yang, Lixiang

619,55 DKK

Guide to the De-Identification of Personal Health Information

Guide to the De-Identification of Personal Health Information

Emam, Khaled El

403,64 DKK

Research Analytics

Research Analytics

Cantu-Ortiz, Francisco J.

403,64 DKK

New Triple Constraints for Sustainable Projects, Programs, and Portfolios

New Triple Constraints for Sustainable Projects, Programs, and Portfolios

Haugan, Gregory T.

509,93 DKK

Service Delivery Platforms

Service Delivery Platforms

Ilyas, Mohammad

509,93 DKK

Stakeholder Engagement

Stakeholder Engagement

Baugh, Amy

436,85 DKK

Business Analysis, Requirements, and Project Management

Business Analysis, Requirements, and Project Management

Cox, Karl

436,85 DKK

Retail Supply Chain Management

Retail Supply Chain Management

Odegaard, Mary Ann

1021,49 DKK

Return On Process (ROP)

Return On Process (ROP)

West, Michael

1094,57 DKK

Securing Cloud and Mobility

Securing Cloud and Mobility

Hourani, Paul

509,93 DKK

CIO's Guide to Oracle Products and Solutions

CIO's Guide to Oracle Products and Solutions

Keyes, Jessica

509,93 DKK

Knowledge Retention

Knowledge Retention

Liebowitz, Jay

729,17 DKK

Leading the Internal Audit Function

Leading the Internal Audit Function

Fountain, Lynn

348,37 DKK

Information Security Management Handbook, Volume 5

Information Security Management Handbook, Volume 5

Tipton, Harold F.

403,64 DKK

Securing E-Business Applications and Communications

Securing E-Business Applications and Communications

Bowers, John

1021,49 DKK

Flexible Software Design

Flexible Software Design

Johnson, Cindy

509,93 DKK

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Held, Gilbert

619,55 DKK

Cyber Forensics

Cyber Forensics

Menendez, Doug

1094,57 DKK

Security in an IPv6 Environment

Security in an IPv6 Environment

Kouns, Jake

802,25 DKK

Programming Languages for Business Problem Solving

Programming Languages for Business Problem Solving

Wang, Hai

948,41 DKK

IT Auditing and Sarbanes-Oxley Compliance

IT Auditing and Sarbanes-Oxley Compliance

Chorafas, Dimitris N.

509,93 DKK

Network Design for IP Convergence

Network Design for IP Convergence

Donoso, Yezid

509,93 DKK

Theory and Approaches of Unascertained Group Decision-Making

Theory and Approaches of Unascertained Group Decision-Making

Zhu, Jianjun

403,64 DKK