Auerbach Publications

Vis mig kun

Handbook of Data Center Management

Handbook of Data Center Management

Bradley, Wayne C.

802,25 DKK

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Khan, Latifur

403,64 DKK

Information and Communication Technologies in Healthcare

Information and Communication Technologies in Healthcare

Groom, Frank M.

729,17 DKK

CIO's Guide to Risk

CIO's Guide to Risk

Keyes, Jessica

546,47 DKK

Understanding the New European Data Protection Rules

Understanding the New European Data Protection Rules

Lambert, Paul

403,64 DKK

Enterprise Architecture for Digital Business

Enterprise Architecture for Digital Business

Unhelkar, Bhuvan

546,47 DKK

Insider's Guide to Outsourcing Risks and Rewards

Insider's Guide to Outsourcing Risks and Rewards

Rost, Johann

509,93 DKK

Wireless Crime and Forensic Investigation

Wireless Crime and Forensic Investigation

Kipper, Gregory

509,93 DKK

Official (ISC)2(R) Guide to the CISSP(R)-ISSEP(R) CBK(R)

Official (ISC)2(R) Guide to the CISSP(R)-ISSEP(R) CBK(R)

Hansche, Susan

403,64 DKK

Virtualization and Private Cloud with VMware Cloud Suite

Virtualization and Private Cloud with VMware Cloud Suite

Chao, Lee

546,47 DKK

Hands-On Project Office

Hands-On Project Office

Kesner, Richard M.

1094,57 DKK

Logical Database Design Principles

Logical Database Design Principles

Clark, Terry

948,41 DKK

Insourcing Innovation

Insourcing Innovation

Slocum, Michael

619,55 DKK

Best Practices in Business Technology Management

Best Practices in Business Technology Management

Andriole, Stephen J.

1094,57 DKK

Political Risk Management for the Global Supply Chain

Political Risk Management for the Global Supply Chain

Kliem, Ralph L.

403,64 DKK

Inspiring Remote Tech Teams

Inspiring Remote Tech Teams

Smith, Hubbert

209,76 DKK

Wireless Internet Handbook

Wireless Internet Handbook

Ilyas, Mohammad

403,64 DKK

Internet of Things Security

Internet of Things Security

Doshi, Nishant

509,93 DKK

Managing IoT Systems for Institutions and Cities

Managing IoT Systems for Institutions and Cities

Benson, Chuck

619,55 DKK

How to Build a Cyber-Resilient Organization

How to Build a Cyber-Resilient Organization

Sigler, Ken

619,55 DKK

Applied Edge AI

Applied Edge AI

Minu, R.I.

436,85 DKK

Fraud Auditing Using CAATT

Fraud Auditing Using CAATT

Aghili, Shaun

403,64 DKK

Adaptive Security Management Architecture

Adaptive Security Management Architecture

Tiller, James S.

509,93 DKK

Assessing and Insuring Cybersecurity Risk

Assessing and Insuring Cybersecurity Risk

Das, Ravi

473,39 DKK

C++ Template Metaprogramming in Practice

C++ Template Metaprogramming in Practice

Wei, Li

948,41 DKK

Blue Shark Team-Building

Blue Shark Team-Building

Sheikh, Rizwan Amin

403,64 DKK

Big Data Analytics

Big Data Analytics

Alam, Mansaf

288,10 DKK

Wireless Mesh Networking

Wireless Mesh Networking

Hu, Honglin

1094,57 DKK

Design and Implementation of the RT-Thread Operating System

Design and Implementation of the RT-Thread Operating System

Zhu, Tianlong

692,63 DKK

Corporate Governance

Corporate Governance

Raval, Vasant

473,39 DKK