Auerbach Publications

Vis mig kun

Secrets of a Cyber Security Architect

Secrets of a Cyber Security Architect

Schoenfield, Brook S. E.

546,47 DKK

Healthcare Informatics

Healthcare Informatics

Kudyba, Stephan P.

403,64 DKK

Determining Project Requirements

Determining Project Requirements

Jonasson, Hans

509,93 DKK

Global Information Warfare

Global Information Warfare

Kovacich, Gerald L.

1094,57 DKK

Ethics and Governance in Project Management

Ethics and Governance in Project Management

Medina, Alicia

403,64 DKK

Software and Systems Architecture in Action

Software and Systems Architecture in Action

Sangwan, Raghvinder S.

509,93 DKK

Systematic Strategic Planning

Systematic Strategic Planning

Butuner, Hakan

509,93 DKK

Project Portfolio Management in Theory and Practice

Project Portfolio Management in Theory and Practice

Moustafaev, Jamal

403,64 DKK

Case Studies in Strategic Planning

Case Studies in Strategic Planning

Butuner, Hakan

403,64 DKK

Conducting Network Penetration and Espionage in a Global Environment

Conducting Network Penetration and Espionage in a Global Environment

Middleton, Bruce

509,93 DKK

PCI Compliance

PCI Compliance

Bhargav, Abhay

1094,57 DKK

Cognitive Hack

Cognitive Hack

Bone, James

348,37 DKK

Results-Based Systematic Operational Improvement

Results-Based Systematic Operational Improvement

Butuner, Hakan

403,64 DKK

Mastering the Five Tiers of Audit Competency

Mastering the Five Tiers of Audit Competency

Butera, Ann

436,85 DKK

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK

Gordon, Adam

583,01 DKK

Managing Lean Projects

Managing Lean Projects

Kliem, Ralph L.

546,47 DKK

Software-Defined Data Infrastructure Essentials

Software-Defined Data Infrastructure Essentials

Schulz, Greg

403,64 DKK

Big Data in the Arts and Humanities

Big Data in the Arts and Humanities

Carlucci, Daniela

403,64 DKK

Data Analytics Applications in Latin America and Emerging Economies

Data Analytics Applications in Latin America and Emerging Economies

Rodriguez, Eduardo

403,64 DKK

Research Analytics

Research Analytics

Cantu-Ortiz, Francisco J.

403,64 DKK

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Sigler, Ken

403,64 DKK

Strategic CIO

Strategic CIO

Weinzimer, Philip

1094,57 DKK

How to Reduce the Cost of Software Testing

How to Reduce the Cost of Software Testing

Kulkarni, Govind

583,01 DKK

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Sigler, Ken

403,64 DKK

Supply Chain Risk Management

Supply Chain Risk Management

Kohnke, Anne

583,01 DKK

Creating Smart Enterprises

Creating Smart Enterprises

Kale, Vivek

1094,57 DKK

Understanding Interaction: The Relationships Between People, Technology, Culture, and the Environment

Understanding Interaction: The Relationships Between People, Technology, Culture, and the Environment

Bongers, Bert

288,10 DKK

Protecting Mobile Networks and Devices

Protecting Mobile Networks and Devices

Zhou, Jianying

403,64 DKK

Insider Threat

Insider Threat

Thompson, Eleanor E.

403,64 DKK

Results-Based Systematic Operational Improvement

Results-Based Systematic Operational Improvement

Butuner, Hakan

403,64 DKK