Auerbach Publications

Vis mig kun

Strategic IT Governance 2.0

Strategic IT Governance 2.0

Weinzimer, Philip

403,64 DKK

Survival Analysis with Python

Survival Analysis with Python

Nag, Avishek

177,19 DKK

Online Learning Analytics

Online Learning Analytics

Liebowitz, Jay

509,93 DKK

Configuring Internal Controls for Software as a Service

Configuring Internal Controls for Software as a Service

Ee, Chong

403,64 DKK

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

Al-Turjman, Fadi

403,64 DKK

Computer and Cyber Security

Computer and Cyber Security

Gupta, Brij B.

403,64 DKK

Managing IoT Systems for Institutions and Cities

Managing IoT Systems for Institutions and Cities

Benson, Chuck

619,55 DKK

Integrating a Usable Security Protocol into User Authentication Services Design Process

Integrating a Usable Security Protocol into User Authentication Services Design Process

Naqvi, Bilal

403,64 DKK

Information Security Management Handbook

Information Security Management Handbook

Tipton, Harold

3652,37 DKK

Flexible Network Architectures Security

Flexible Network Architectures Security

Rudra, Bhawana

403,64 DKK

Practical AI for Cybersecurity

Practical AI for Cybersecurity

Das, Ravi

403,64 DKK

Project and Program Excellence

Project and Program Excellence

Pavelko, Thomas

546,47 DKK

Database Modeling Step by Step

Database Modeling Step by Step

Powell, Gavin

509,93 DKK

Database Systems

Database Systems

Godbole, Shripad V.

546,47 DKK

Configuration Management, Second Edition

Configuration Management, Second Edition

Robertson, Kim L.

619,55 DKK

IT Project Health Checks

IT Project Health Checks

Purba, Sanjiv

403,64 DKK

Cognitive Internet of Things

Cognitive Internet of Things

Subramanian, Harihara

692,63 DKK

Projects, Government, and Public Policy

Projects, Government, and Public Policy

Gasik, Stanislaw

473,39 DKK

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

Rogerson, Simon

473,39 DKK

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

Rogerson, Simon

473,39 DKK

Insider's Guide to Outsourcing Risks and Rewards

Insider's Guide to Outsourcing Risks and Rewards

Rost, Johann

509,93 DKK

Optimizing Project Management

Optimizing Project Management

Wu, Te

310,39 DKK

Fundamentals of Internet of Things for Non-Engineers

Fundamentals of Internet of Things for Non-Engineers

Kovac, Ronald J.

473,39 DKK

Official (ISC)2 Guide to the CSSLP CBK

Official (ISC)2 Guide to the CSSLP CBK

Paul, Mano

403,64 DKK

Implementing Electronic Document and Record Management Systems

Implementing Electronic Document and Record Management Systems

Adam, Azad

1021,49 DKK

Portfolio Management

Portfolio Management

Wyzalek, John

403,64 DKK

Core Software Security

Core Software Security

Misra, Anmol

403,64 DKK

Securing Converged IP Networks

Securing Converged IP Networks

Macaulay, Tyson

509,93 DKK

How to Build a Cyber-Resilient Organization

How to Build a Cyber-Resilient Organization

Sigler, Ken

619,55 DKK

X Internet

X Internet

Keyes, Jessica

403,64 DKK