Auerbach Publications

Vis mig kun

Information Security Policies, Procedures, and Standards

Information Security Policies, Procedures, and Standards

Peltier, Thomas R.

802,25 DKK

Business Intelligence for Telecommunications

Business Intelligence for Telecommunications

Pareek, Deepak

948,41 DKK

Packet Forwarding Technologies

Packet Forwarding Technologies

Wu, Weidong

509,93 DKK

Security of Mobile Communications

Security of Mobile Communications

Boudriga, Noureddine

509,93 DKK

Supply Chain Logistics Program for Warehouse Management

Supply Chain Logistics Program for Warehouse Management

Sydow, Joachim

1167,65 DKK

Optimization in Medicine and Biology

Optimization in Medicine and Biology

Lee, Eva K.

2190,77 DKK

Lean Performance ERP Project Management

Lean Performance ERP Project Management

Carroll, Brian J.

802,25 DKK

BYOD for Healthcare

BYOD for Healthcare

Keyes, Jessica

509,93 DKK

Information Security Policies, Procedures, and Standards

Information Security Policies, Procedures, and Standards

Landoll, Douglas J.

273,24 DKK

Project Business Management

Project Business Management

Lehmann, Oliver F.

348,37 DKK

Bursting the Big Data Bubble

Bursting the Big Data Bubble

Liebowitz, Jay

509,93 DKK

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK

Gordon, Adam

583,01 DKK

State of the Art in Intrusion Prevention and Detection

State of the Art in Intrusion Prevention and Detection

Pathan, Al-Sakib Khan

473,39 DKK

Applying Guiding Principles of Effective Program Delivery

Applying Guiding Principles of Effective Program Delivery

Wills, Kerry R.

509,93 DKK

CIO's Guide to Information Security Incident Management

CIO's Guide to Information Security Incident Management

Goucher, Wendy Fiona

403,64 DKK

Data Mining Tools for Malware Detection

Data Mining Tools for Malware Detection

Thuraisingham, Bhavani

1094,57 DKK

Cloud Enterprise Architecture

Cloud Enterprise Architecture

Raj, Pethuru

509,93 DKK

Program Management Leadership

Program Management Leadership

Bojeun, Mark C.

546,47 DKK

Process-Driven SOA

Process-Driven SOA

Zdun, Uwe

509,93 DKK

Complete Guide to Physical Security

Complete Guide to Physical Security

Benny, Daniel J.

473,39 DKK

Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)

Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)

Mena, Jesus

583,01 DKK

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

Mena, Jesus

1094,57 DKK

Business Analysis for Business Intelligence

Business Analysis for Business Intelligence

Brijs, Bert

1094,57 DKK

Debugger's Handbook

Debugger's Handbook

DiMarzio, J.F.

1094,57 DKK

Handbook of IPv4 to IPv6 Transition

Handbook of IPv4 to IPv6 Transition

Minoli, Daniel

509,93 DKK

Modeling Software Behavior

Modeling Software Behavior

Jorgensen, Paul C.

509,93 DKK

Strategic Intelligence

Strategic Intelligence

Liebowitz, Jay

509,93 DKK

Integrated Inductors and Transformers

Integrated Inductors and Transformers

Palmisano, Giuseppe

1094,57 DKK

Data Mining Tools for Malware Detection

Data Mining Tools for Malware Detection

Thuraisingham, Bhavani

1094,57 DKK

Philippine Security in the Age of Terror

Philippine Security in the Age of Terror

Banlaoi, Rommel

509,93 DKK