انتشارات Auerbach

Big Data Analytics: Applications in Business and Marketing
Kiran Chaudhary, Mansaf Alam, 2022
Essential Enterprise Blockchain Concepts and Applications
Kavita Saini (editor), Pethuru Raj Chelliah (editor), Deepak Kumar Saini (editor), 2021
The Design and Implementation of the RT-Thread Operating System
Qiu Yi, Xiong Puxiang, Tianlong Zhu, 2020
Business Intelligence and Big Data: Drivers of Organizational Success
Celina M. Olszak, 2020
Practical Security for Agile and DevOps
Mark S. Merkow, 2022
The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases
Pethuru Raj (editor), T Poongodi (editor), Balamurugan Balusamy (editor), Manju Khari (editor), 2020
Return On Process
Michael West, 2013
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
W. Krag Brotby, Gary Hinson, 2013
Outsourcing Software Development Offshore
Tandy Gold, 2004
Official (ISC)2® Guide to the CCFP CBK®
Peter Stephenson, 2014
PCI Compliance: The Definitive Guide
Abhay Bhargav, 2014
Web-Based and Traditional Outsourcing
Vivek Sharma, Varun Sharma, K.S. Rajasekaran, 2011
Cyber Strategy: Risk-Driven Security and Resiliency
Carol A. Siegel, Mark Sweeney, 2020
Web-Based and Traditional Outsourcing
Vivek Sharma, Varun Sharma, K.S. Rajasekaran, 2011
Artificial Intelligence Theory, Models, and Applications
P Kaliraj (editor), T. Devi (editor), 2021
Practical Risk Management for the CIO
Mark Scherling, 2011
Software Quality Assurance: Integrating Testing, Security, and Audit
Abu Sayed Mahfuz, 2021
Practical Core Software Security: A Reference Framework
James F Ransome, Mark S Merkow, Anmol, 2022
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Sikha Saha Bagui, Richard Walsh Earp, 2022
Artificial Intelligence and Smart Agriculture Applications
Utku Kose (editor), V.B. Surya Prasath (editor), M.Rubaiyat Hossain Mondal (editor), Prajoy Podder (editor), Subrato Bharati (editor), 2022