Auerbach Publications

Vis mig kun

Critical Incident Management

Critical Incident Management

Sterneckert, Alan B.

509,93 DKK

Business Analytics

Business Analytics

Liebowitz, Jay

802,25 DKK

Information Security Policy Development for Compliance

Information Security Policy Development for Compliance

Williams, Barry L.

619,55 DKK

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Pathan, Al-Sakib Khan

509,93 DKK

Applied Edge AI

Applied Edge AI

Minu, R.I.

436,85 DKK

Transformative Digital Technology for Effective Workplace Learning

Transformative Digital Technology for Effective Workplace Learning

O'Donnell, Ria

436,85 DKK

Data Analytics for Internal Auditors

Data Analytics for Internal Auditors

Cascarino, Richard E.

403,64 DKK

Secrets of a Cyber Security Architect

Secrets of a Cyber Security Architect

Schoenfield, Brook S. E.

546,47 DKK

Deployment of Rare Earth Materials in Microware Devices, RF Transmitters, and Laser Systems

Deployment of Rare Earth Materials in Microware Devices, RF Transmitters, and Laser Systems

A. R. Jha, Ph.D.

436,85 DKK

Cyberspace and Cybersecurity

Cyberspace and Cybersecurity

Kostopoulos, George

403,64 DKK

Process Improvement and CMMI for Systems and Software

Process Improvement and CMMI for Systems and Software

Baker, Emanuel

509,93 DKK

Human Change Management Body of Knowledge (HCMBOK(R))

Human Change Management Body of Knowledge (HCMBOK(R))

Campos, Carla

403,64 DKK

Conducting Network Penetration and Espionage in a Global Environment

Conducting Network Penetration and Espionage in a Global Environment

Middleton, Bruce

509,93 DKK

Embedded Software Development for Safety-Critical Systems

Embedded Software Development for Safety-Critical Systems

Hobbs, Chris

403,64 DKK

Project Business Management

Project Business Management

Lehmann, Oliver F.

348,37 DKK

Project Management Capability Assessment

Project Management Capability Assessment

Lewis, Barry D.

546,47 DKK

Big Data Analytics with Applications in Insider Threat Detection

Big Data Analytics with Applications in Insider Threat Detection

Khan, Latifur

403,64 DKK

Retaining Expert Knowledge

Retaining Expert Knowledge

Salvatore, Peggy

546,47 DKK

Noiseless Steganography

Noiseless Steganography

Desoky, Abdelrahman

473,39 DKK

Cyber Security Essentials

Cyber Security Essentials

Howard, Rick

583,01 DKK

Creating a Greater Whole

Creating a Greater Whole

Schwartz, Susan G.

403,64 DKK

Converging NGN Wireline and Mobile 3G Networks with IMS

Converging NGN Wireline and Mobile 3G Networks with IMS

Copeland, Rebecca

509,93 DKK

Information Security Cost Management

Information Security Cost Management

Lim, Ian

509,93 DKK

Service Delivery Platforms

Service Delivery Platforms

Ilyas, Mohammad

509,93 DKK

Program Management Complexity

Program Management Complexity

Ward, J. LeRoy

546,47 DKK

Intimate Supply Chain

Intimate Supply Chain

Ross, David Frederick

948,41 DKK

Security in RFID and Sensor Networks

Security in RFID and Sensor Networks

Kitsos, Paris

509,93 DKK

Internet of Things

Internet of Things

Ning, Huansheng

509,93 DKK

CISO Soft Skills

CISO Soft Skills

Gentile, Skye

619,55 DKK

Satellite Systems Engineering in an IPv6 Environment

Satellite Systems Engineering in an IPv6 Environment

Minoli, Daniel

509,93 DKK