Auerbach Publications

Vis mig kun

DesignedUp

DesignedUp

Carter, Emma

348,37 DKK

Risk Analytics

Risk Analytics

Rodriguez, Eduardo

692,63 DKK

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks

Wu, Jie

509,93 DKK

Business Intelligence for Small and Medium-Sized Enterprises

Business Intelligence for Small and Medium-Sized Enterprises

Mansingh, Gunjan

619,55 DKK

Cryptography for Payment Professionals

Cryptography for Payment Professionals

Dubinsky, Ilya

948,41 DKK

Evolving Landscape of Ethical Digital Technology

Evolving Landscape of Ethical Digital Technology

Rogerson, Simon

436,85 DKK

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Kassab, Mohamad H.

546,47 DKK

Business Continuity Planning

Business Continuity Planning

Doughty, Ken

1094,57 DKK

Security Software Development

Security Software Development

CISSP, Douglas A. Ashbaugh

509,93 DKK

CISO Leadership

CISO Leadership

Krause, Micki

403,64 DKK

Assessing and Insuring Cybersecurity Risk

Assessing and Insuring Cybersecurity Risk

Das, Ravi

473,39 DKK

Essential Enterprise Blockchain Concepts and Applications

Essential Enterprise Blockchain Concepts and Applications

Saini, Deepak Kumar

692,63 DKK

Enterprise Level Security

Enterprise Level Security

Simpson, William R.

403,64 DKK

Database Design Using Entity-Relationship Diagrams

Database Design Using Entity-Relationship Diagrams

Earp, Richard Walsh

509,93 DKK

Project Management Maturity Model

Project Management Maturity Model

Crawford, J. Kent

348,37 DKK

Creating Smart Enterprises

Creating Smart Enterprises

Kale, Vivek

1094,57 DKK

Managing IT Performance to Create Business Value

Managing IT Performance to Create Business Value

Keyes, Jessica

1094,57 DKK

Information Assurance Architecture

Information Assurance Architecture

Willett, Keith D.

509,93 DKK

Flexible Network Architectures Security

Flexible Network Architectures Security

Rudra, Bhawana

403,64 DKK

Cryptocurrency Concepts, Technology, and Applications

Cryptocurrency Concepts, Technology, and Applications

Liebowitz, Jay

403,64 DKK

Cryptocurrency Concepts, Technology, and Applications

Cryptocurrency Concepts, Technology, and Applications

Liebowitz, Jay

403,64 DKK

Security of Self-Organizing Networks

Security of Self-Organizing Networks

Pathan, Al-Sakib Khan

509,93 DKK

PMI-PBA(R) Exam Practice Test and Study Guide

PMI-PBA(R) Exam Practice Test and Study Guide

Williamson, Brian

546,47 DKK

Multi-Objective Optimization in Computer Networks Using Metaheuristics

Multi-Objective Optimization in Computer Networks Using Metaheuristics

Fabregat, Ramon

403,64 DKK

TV Content Analysis

TV Content Analysis

Lian, Shiguo

1094,57 DKK

Introduction to Mobile Communications

Introduction to Mobile Communications

Mayne, Alan

509,93 DKK

Frugal CISO

Frugal CISO

Anderson, Kerry Ann

403,64 DKK

Insider Computer Fraud

Insider Computer Fraud

Brancik, Kenneth

509,93 DKK

Cryptography for Payment Professionals

Cryptography for Payment Professionals

Dubinsky, Ilya

948,41 DKK

7 Qualities of Highly Secure Software

7 Qualities of Highly Secure Software

Paul, Mano

546,47 DKK