Search Results - Auerbach Publications
Suggested Topics within your search.
Suggested Topics within your search.
- Management 25
- Security measures 24
- Computer security 22
- Computer networks 17
- Computer software 16
- Information technology 14
- Data protection 13
- Development 13
- Data processing 12
- Project management 11
- Wireless communication systems 11
- Quality control 8
- Business 6
- Computer crimes 6
- Software engineering 6
- Telecommunication 6
- Business enterprises 5
- Business logistics 5
- Mobile communication systems 5
- Mobile computing 5
- Risk assessment 5
- Access control 4
- Database design 4
- Evaluation 4
- IEEE 80216 (Standard) 4
- Investigation 4
- Knowledge management 4
- Production management 4
- Risk management 4
- Strategic planning 4
-
1
New Directions in Project Management
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
2
Maximizing business performance through software packages best practices for justification, selection, and implementation
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
3
Building a wireless network
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
4
Securing and controlling Cisco routers
Published 2002“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
5
Using the common criteria for IT security evaluation
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
6
The ABCs of TCP/IP
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
7
Computer telephony integration
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
8
IS management handbook
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
9
Maximizing the Enterprise Information Assets
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
10
Surviving security how to integrate people, process, and technology
Published 2003“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
11
Complex IT project management 16 steps to success
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
12
Network perimeter security building defense in-depth
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
13
Oracle 11i E-Business Suite from the front lines
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
14
Real process improvement using the CMMI
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
15
Strategic information security
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
16
The Ethical Hack a framework for business value penetration testing
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Book -
17
Assessing and managing security risk in IT systems a structured methodology
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
18
Performance assurance for IT systems
Published 2005“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
19
Practical network design techniques a complete guide for WANs and LANs
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown -
20
Software architecture design patterns in Java
Published 2004“…Auerbach Publications…”
Click Here to View Status and Holdings.
Unknown