Auerbach Publications

Vis mig kun

Projects and Complexity

Projects and Complexity

Ginevri, Walter

509,93 DKK

Leading Effective Virtual Teams

Leading Effective Virtual Teams

Settle-Murphy, Nancy M.

310,39 DKK

Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

Jr., John J. Trinckes

1094,57 DKK

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

Kahn, David

403,64 DKK

Asset Protection through Security Awareness

Asset Protection through Security Awareness

Speed, Tyler Justin

509,93 DKK

From Projects to Programs

From Projects to Programs

Penkar, Samir

403,64 DKK

Network Attacks and Defenses

Network Attacks and Defenses

Mathew, Sujith Samuel

509,93 DKK

Formal Languages and Computation

Formal Languages and Computation

Meduna, Alexander

509,93 DKK

Successful Program Management

Successful Program Management

Gordon, Robert Lee

583,01 DKK

Strategy and Business Process Management

Strategy and Business Process Management

Lehmann, Carl F.

546,47 DKK

Antipatterns

Antipatterns

DeFranco, Joanna F.

692,63 DKK

Strategic Project Leader

Strategic Project Leader

Ferraro, Jack

509,93 DKK

Core Software Security

Core Software Security

Misra, Anmol

403,64 DKK

Projects and Complexity

Projects and Complexity

Ginevri, Walter

509,93 DKK

Official (ISC)2 Guide to the CSSLP CBK

Official (ISC)2 Guide to the CSSLP CBK

Paul, Mano

403,64 DKK

Reducing Process Costs with Lean, Six Sigma, and Value Engineering Techniques

Reducing Process Costs with Lean, Six Sigma, and Value Engineering Techniques

Quigley, Jon M.

509,93 DKK

Program Management

Program Management

Levin, Ginger

1094,57 DKK

Data Warehouse Designs

Data Warehouse Designs

Silvers, Fon

473,39 DKK

Total Quality Management for Project Management

Total Quality Management for Project Management

Quigley, Jon M.

583,01 DKK

Bring Your Own Devices (BYOD) Survival Guide

Bring Your Own Devices (BYOD) Survival Guide

Keyes, Jessica

1094,57 DKK

Security De-Engineering

Security De-Engineering

Tibble, Ian

403,64 DKK

Transforming Business with Program Management

Transforming Business with Program Management

Subramanian, Satish P.

473,39 DKK

Dynamic Software Development

Dynamic Software Development

Wells, Timothy

802,25 DKK

IP Communications and Services for NGN

IP Communications and Services for NGN

Agbinya, Johnson I

509,93 DKK

Underwater Acoustic Sensor Networks

Underwater Acoustic Sensor Networks

Xiao, Yang

509,93 DKK

Building a Project Work Breakdown Structure

Building a Project Work Breakdown Structure

Miller, Dennis P.

509,93 DKK

Using Technology to Transform  the Value Chain

Using Technology to Transform the Value Chain

Hood, Ray

948,41 DKK

Security De-Engineering

Security De-Engineering

Tibble, Ian

583,01 DKK

Practical Data Mining

Practical Data Mining

Jr., Monte F. Hancock

509,93 DKK

Designing Complex Systems

Designing Complex Systems

Aslaksen, Erik W.

509,93 DKK