Auerbach Publications

Vis mig kun

Understanding Broadband over Power Line

Understanding Broadband over Power Line

Held, Gilbert

509,93 DKK

Secure Semantic Service-Oriented Systems

Secure Semantic Service-Oriented Systems

Thuraisingham, Bhavani

1167,65 DKK

Architecting Secure Software Systems

Architecting Secure Software Systems

Chaitanya, Manish

509,93 DKK

Enterprise Systems Backup and Recovery

Enterprise Systems Backup and Recovery

Guise, Preston de

729,17 DKK

WiMAX Network Planning and Optimization

WiMAX Network Planning and Optimization

Zhang, Yan

1167,65 DKK

Business, Marketing, and Management Principles for IT and Engineering

Business, Marketing, and Management Principles for IT and Engineering

Chorafas, Dimitris N.

509,93 DKK

SMACing the Bank

SMACing the Bank

Maiya, Rajashekara

403,64 DKK

Business Intelligence and Big Data

Business Intelligence and Big Data

Olszak, Celina M.

692,63 DKK

Project Planning and Project Success

Project Planning and Project Success

Serrador, Pedro

509,93 DKK

Integrated IT Performance Management

Integrated IT Performance Management

Bainey, Kenneth

1094,57 DKK

Handbook of Mobile Broadcasting

Handbook of Mobile Broadcasting

Ahson, Syed A.

509,93 DKK

Agile for Project Managers

Agile for Project Managers

Canty, Denise

436,85 DKK

Evolving Innovation Ecosystems

Evolving Innovation Ecosystems

Stimmel, Carol L.

692,63 DKK

Security and Auditing of Smart Devices

Security and Auditing of Smart Devices

Cozart, Richard

348,37 DKK

Knowledge Management and E-Learning

Knowledge Management and E-Learning

Frank, Michael

1094,57 DKK

Theory of Science and Technology Transfer and Applications

Theory of Science and Technology Transfer and Applications

Guo, Benhai

509,93 DKK

Wireless Quality of Service

Wireless Quality of Service

Denko, Mieso K.

509,93 DKK

Benefits Realization Management

Benefits Realization Management

Serra, Carlos Eduardo Martins

619,55 DKK

Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography

Szygenda, Stephen A.

403,64 DKK

Determining Project Requirements

Determining Project Requirements

Jonasson, Hans

509,93 DKK

Eaches or Pieces Order Fulfillment, Design, and Operations Handbook

Eaches or Pieces Order Fulfillment, Design, and Operations Handbook

Mulcahy, David E.

359,43 DKK

Knowledge Management, Business Intelligence, and Content Management

Knowledge Management, Business Intelligence, and Content Management

Keyes, Jessica

509,93 DKK

Call Center Continuity Planning

Call Center Continuity Planning

Rowan, Jim

509,93 DKK

Connective Technologies in the Supply Chain

Connective Technologies in the Supply Chain

Kumar, Sameer

948,41 DKK

Making Data Work

Making Data Work

Odaro, Edosa

403,64 DKK

Mastering the Rules of Competitive Strategy

Mastering the Rules of Competitive Strategy

Paley, Norton

948,41 DKK

Building an Enterprise-Wide Business Continuity Program

Building an Enterprise-Wide Business Continuity Program

Okolita, Kelley

509,93 DKK

Complete Guide to Security and Privacy Metrics

Complete Guide to Security and Privacy Metrics

Herrmann, Debra S.

1167,65 DKK

Strategic Software Engineering

Strategic Software Engineering

Eljabiri, Osama M.

1094,57 DKK

Mobile Opportunistic Networks

Mobile Opportunistic Networks

Denko, Mieso K.

509,93 DKK