Search Results - Auerbach
Suggested Topics within your search.
Suggested Topics within your search.
- Management 50
- Computer security 41
- Computer networks 33
- Security measures 31
- Data protection 26
- Information technology 23
- Computer software 22
- Data processing 22
- Development 18
- Wireless communication systems 14
- Project management 13
- Business 12
- Business enterprises 11
- Business logistics 11
- Quality control 9
- Risk management 8
- Computer crimes 7
- Database design 7
- Management information systems 7
- Mobile communication systems 7
- Software engineering 7
- Telecommunication 7
- Database management 6
- Electronic data processing departments 6
- Information resources management 6
- Mobile computing 6
- Risk assessment 6
- Access control 5
- Investigation 5
- Knowledge management 5
-
81
New Directions in Project Management
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
82
Enterprise system architectures building client/server and web-based systems
Published 2000“…Auerbach Pub.…”
Click Here to View Status and Holdings.
Unknown -
83
Global information warfare how businesses, governments, and others achieve objectives and attain competitive advantages
Published 2002“…Auerbach Pub.…”
Click Here to View Status and Holdings.
Unknown -
84
Maximizing business performance through software packages best practices for justification, selection, and implementation
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
85
Building a wireless network
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
86
Securing and controlling Cisco routers
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
87
Using the common criteria for IT security evaluation
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
88
The ABCs of TCP/IP
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
89
Computer telephony integration
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
90
IS management handbook
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
91
Maximizing the Enterprise Information Assets
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
92
Surviving security how to integrate people, process, and technology
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
93
Complex IT project management 16 steps to success
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
94
Network perimeter security building defense in-depth
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
95
Oracle 11i E-Business Suite from the front lines
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
96
Real process improvement using the CMMI
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
97
Strategic information security
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
98
The Ethical Hack a framework for business value penetration testing
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
99
Assessing and managing security risk in IT systems a structured methodology
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
100
Performance assurance for IT systems
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown