انتشارات Auerbach
Data Protection: Ensuring Data Availability
Preston de Guise, 2017
A Guide to selecting software measures and metrics
Jones, Capers, 2017
Results-based systematic operational improvement
Butuner, Hakan, 2017
Software Adaptation in an Open Environment: a software architecture perspective
Yu Zhou, Taolue Chen, 2017
Risk Thinking for Cloud-Based Application Services
BAUER, ERIC, 2017
Cognitive hack : the new battleground in cybersecurity... the human mind
Bone, James, 2017
The Internet of things : enabling technologies, platforms, and use cases
Raj, Pethuru; Raman, Anupama C, 2017
Walling out the insiders : controlling access to improve organizational security
Erbschloe, Michael, 2017
Data Analytics for Internal Auditors
Richard E. Cascarino, 2017
Programming Languages for MIS Concepts and Practice
Hai Wang, 2014
Cloud Computing Networking
Lee Chao, 2015
Actionable Intelligence in Healthcare
Jay Liebowitz, Amanda Dawson, 2017
Big Data Strategies for Agile Business
Bhuvan Unhelkar, 2017
Practitioner’s Guide to Business Impact Analysis
Priti Sikdar, 2017
Panzerwrecks 3 German Armour 1944-1945
Lee Archer, William Auerbach, 2006
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken Sigler, Dan Shoemaker, Anne Kohnke, 2017
Managing Complex Construction Projects : a Systems Approach
Briesemeister, John K, 2018
Applied cloud deep semantic recognition : advanced anomaly detection
Rad, Paul; Roopaei, Mehdi, 2018
Enterprise Cloud Computing for Non-Engineers
Frank M. Groom, Stephan S. Jones, 2018
Logical Database Design Principles
John Garmany, Jeff Walker, Terry Clark, 2005
FinTech: The Technology Driving Disruption in the Financial Services Industry
Parag Y Arjunwadkar, 2018
Multimedia watermarking techniques and applications
Kirovski, Darko; Furht, Borivoje, 2006
