Auerbach Publications

Vis mig kun

Collaborative Cyber Threat Intelligence

Collaborative Cyber Threat Intelligence

Skopik, Florian

403,64 DKK

Knowledge Management in Practice

Knowledge Management in Practice

Rhem, Anthony J.

403,64 DKK

Applied Cloud Deep Semantic Recognition

Applied Cloud Deep Semantic Recognition

Najafirad, Peyman (Paul Rad)

403,64 DKK

Security and Auditing of Smart Devices

Security and Auditing of Smart Devices

Cozart, Richard

348,37 DKK

Enterprise Cloud Computing for Non-Engineers

Enterprise Cloud Computing for Non-Engineers

Jones, Stephan S.

403,64 DKK

Handbook of Data Management

Handbook of Data Management

Purba, Sanjiv

4383,17 DKK

Earned Benefit Program Management

Earned Benefit Program Management

Piney, Crispin

403,64 DKK

Earned Benefit Program Management

Earned Benefit Program Management

Piney, Crispin

403,64 DKK

Maximizing The Enterprise Information Assets

Maximizing The Enterprise Information Assets

Sevilla, Christine

948,41 DKK

Ethical Hack

Ethical Hack

Tiller, James S.

509,93 DKK

Ethics and the Internal Auditor's Political Dilemma

Ethics and the Internal Auditor's Political Dilemma

Fountain, Lynn

692,63 DKK

Software Configuration Management

Software Configuration Management

Keyes, Jessica

509,93 DKK

UML for Developing Knowledge Management Systems

UML for Developing Knowledge Management Systems

Rhem, Anthony J.

509,93 DKK

Realizing Strategy through Projects: The Executive's Guide

Realizing Strategy through Projects: The Executive's Guide

Marnewick, Carl

403,64 DKK

Supply Chain Risk Management

Supply Chain Risk Management

Kohnke, Anne

583,01 DKK

Improving Business Performance

Improving Business Performance

S, Ramani

583,01 DKK

Project Management in Extreme Situations

Project Management in Extreme Situations

Lievre, Pascal

619,55 DKK

Software Methodologies

Software Methodologies

Jones, Capers

403,64 DKK

Application Servers for E-Business

Application Servers for E-Business

Lindgren, Lisa E.

948,41 DKK

Fraud Hotlines

Fraud Hotlines

Binns, Chelsea A.

273,24 DKK

Performance Assurance for IT Systems

Performance Assurance for IT Systems

King, Brian

509,93 DKK

Assessing and Managing Security Risk in IT Systems

Assessing and Managing Security Risk in IT Systems

McCumber, John

619,55 DKK

Creating Components

Creating Components

Kann, Charles W.

875,33 DKK

Outsourcing Software Development Offshore

Outsourcing Software Development Offshore

Gold, Tandy

948,41 DKK

Software Metrics

Software Metrics

Pandian, C. Ravindranath

948,41 DKK

ABCs of LDAP

ABCs of LDAP

Voglmaier, Reinhard E.

802,25 DKK

Public Key Infrastructure

Public Key Infrastructure

Vacca, John R.

509,93 DKK

Network Perimeter Security

Network Perimeter Security

Riggs, Cliff

509,93 DKK

Designing a Total Data Solution

Designing a Total Data Solution

Breakfield, Charles V.

403,64 DKK

Multi-Operating System Networking

Multi-Operating System Networking

Rajagopal, Raj

403,64 DKK