Search Results - Auerbach
Suggested Topics within your search.
Suggested Topics within your search.
- Management 50
- Computer security 41
- Computer networks 33
- Security measures 31
- Data protection 26
- Information technology 23
- Computer software 22
- Data processing 22
- Development 18
- Wireless communication systems 14
- Project management 13
- Business 12
- Business enterprises 11
- Business logistics 11
- Quality control 9
- Risk management 8
- Computer crimes 7
- Database design 7
- Management information systems 7
- Mobile communication systems 7
- Software engineering 7
- Telecommunication 7
- Database management 6
- Electronic data processing departments 6
- Information resources management 6
- Mobile computing 6
- Risk assessment 6
- Access control 5
- Investigation 5
- Knowledge management 5
-
221
Hands-on inventory management
Published 2008“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
222
Natural hazards analysis reducing the impact of disasters
Published 2009“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
223
Underwater acoustic sensor networks
Published 2010“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
224
Data-driven block ciphers for fast telecommunication systems
Published 2008“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
225
Design Science Research Methods and Patterns Innovating Information and Communication Technology
Published 2008“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
226
ITIL service management implementation and operation
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
227
Secure semantic service-oriented systems
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
228
Wireless quality of service techniques, standards and applications
Published 2009“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
229
Mechanics of user identification and authentication fundamentals of identity management
Published 2007“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
230
A practical guide to security assessments
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
231
Understanding surveillance technologies spy devices, privacy, history & applications
Published 2007“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
232
Mobile Web 2.0 developing and delivering services to mobile devices
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
233
Integrated inductors and transformers characterization, design, and modeling for RF and MM-wave applications
Published 2010“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
234
Knowledge Management and E-Learning
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
235
Optimization of regional industrial structures and applications
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
236
Retail security and loss prevention solutions
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
237
Cyber security essentials
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
238
Encyclopedia of software engineering
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
239
Security of self-organizing networks MANET, WSN, WMN, VANET
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
240
Data center storage cost-effective strategies, implementation, and management
Published 2011“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown