Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Auerbach Publications
Auerbach Publications
English
close
Showing 841 - 894 out of 894 books
Enhancing Computer Security with Smart Technology
V. Rao Vemuri
2005
Sign up to read
Enhancing Computer Security with Smart Technology
V. Rao Vemuri
2005
Guide to Optimal Operational Risk and BASEL II
Ioannis S. Akkizidis, Vivianne Bouchereau
2005
Sign up to read
Guide to Optimal Operational Risk and BASEL II
Ioannis S. Akkizidis, Vivianne Bouchereau
2005
Software Engineering Quality Practices
Ronald Kirk Kandt
2005
Sign up to read
Software Engineering Quality Practices
Ronald Kirk Kandt
2005
Fundamentals of DSL Technology
2005
Sign up to read
Fundamentals of DSL Technology
2005
Official2® Guide to the CISSP®-ISSEP® CBK®
Susan Hansche
2005
Sign up to read
Official2® Guide to the CISSP®-ISSEP® CBK®
Susan Hansche
2005
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Sign up to read
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Sign up to read
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Performance Modeling and Analysis of Bluetooth Networks
Jelena Misic, Vojislav B. Misic
2005
Sign up to read
Performance Modeling and Analysis of Bluetooth Networks
Jelena Misic, Vojislav B. Misic
2005
Wireless Mesh Networks
Gilbert Held
2005
Sign up to read
Wireless Mesh Networks
Gilbert Held
2005
Flexible Software Design
Bruce Johnson, Walter W. Woolfolk, Robert Miller, Cindy Johnson
2005
Sign up to read
Flexible Software Design
Bruce Johnson, Walter W. Woolfolk, Robert Miller, Cindy Johnson
2005
The ROI from Software Quality
Khaled El Emam
2005
Sign up to read
The ROI from Software Quality
Khaled El Emam
2005
Grid Database Design
April J. Wells
2005
Sign up to read
Grid Database Design
April J. Wells
2005
Reducing Risk with Software Process Improvement
Louis Poulin
2005
Sign up to read
Reducing Risk with Software Process Improvement
Louis Poulin
2005
Strategic Software Engineering
Fadi P. Deek, James A. M. McHugh, Osama M. Eljabiri
2005
Sign up to read
Strategic Software Engineering
Fadi P. Deek, James A. M. McHugh, Osama M. Eljabiri
2005
Database and Applications Security
Bhavani Thuraisingham
2005
Sign up to read
Database and Applications Security
Bhavani Thuraisingham
2005
Logical Database Design Principles
John Garmany, Jeff Walker, Terry Clark
2005
Sign up to read
Logical Database Design Principles
John Garmany, Jeff Walker, Terry Clark
2005
Network Design
Teresa C. Piliouras
2004
Sign up to read
Network Design
Teresa C. Piliouras
2004
The Windows Serial Port Programming Handbook
Ying Bai
2004
Sign up to read
The Windows Serial Port Programming Handbook
Ying Bai
2004
MPLS for Metropolitan Area Networks
Nam-Kee Tan
2004
Sign up to read
MPLS for Metropolitan Area Networks
Nam-Kee Tan
2004
Outsourcing Software Development Offshore
Tandy Gold
2004
Sign up to read
Outsourcing Software Development Offshore
Tandy Gold
2004
Network Security Technologies
Kwok T. Fung
2004
Sign up to read
Network Security Technologies
Kwok T. Fung
2004
Assessing and Managing Security Risk in IT Systems
John McCumber
2004
Sign up to read
Assessing and Managing Security Risk in IT Systems
John McCumber
2004
Lightweight Enterprise Architectures
Fenix Theuerkorn
2004
Sign up to read
Lightweight Enterprise Architectures
Fenix Theuerkorn
2004
Information Security Policies and Procedures
Thomas R. Peltier
2004
Sign up to read
Information Security Policies and Procedures
Thomas R. Peltier
2004
Practical Network Design Techniques
Gilbert Held, S. Ravi Jagannathan
2004
Sign up to read
Practical Network Design Techniques
Gilbert Held, S. Ravi Jagannathan
2004
Information Security Policies and Procedures
Thomas R. Peltier
2004
Sign up to read
Information Security Policies and Procedures
Thomas R. Peltier
2004
The Hands-On Project Office
Richard M. Kesner
2003
Sign up to read
The Hands-On Project Office
Richard M. Kesner
2003
Surviving Security
Amanda Andress
2003
Sign up to read
Surviving Security
Amanda Andress
2003
Strategic Information Security
John Wylder
2003
Sign up to read
Strategic Information Security
John Wylder
2003
The ABCs of LDAP
Reinhard E. Voglmaier
2003
Sign up to read
The ABCs of LDAP
Reinhard E. Voglmaier
2003
Network Perimeter Security
Cliff Riggs
2003
Sign up to read
Network Perimeter Security
Cliff Riggs
2003
Investigator's Guide to Steganography
Gregory Kipper
2003
Sign up to read
Investigator's Guide to Steganography
Gregory Kipper
2003
Server Disk Management in a Windows Environment
Drew Robb
2003
Sign up to read
Server Disk Management in a Windows Environment
Drew Robb
2003
The Laws of Software Process
Phillip G. Armour
2003
Sign up to read
The Laws of Software Process
Phillip G. Armour
2003
Wireless Sensor Networks
Jr., Edgar H. Callaway, Edgar H. Callaway, Jr.
2003
Sign up to read
Wireless Sensor Networks
Jr., Edgar H. Callaway, Edgar H. Callaway, Jr.
2003
IS Management Handbook
Carol V. Brown, Heikki Topi
2003
Sign up to read
IS Management Handbook
Carol V. Brown, Heikki Topi
2003
Using the Common Criteria for IT Security Evaluation
Debra S. Herrmann
2002
Sign up to read
Using the Common Criteria for IT Security Evaluation
Debra S. Herrmann
2002
Healthcare Information Systems
2002
Sign up to read
Healthcare Information Systems
2002
Healthcare Information Systems
Kevin Beaver
2002
Sign up to read
Healthcare Information Systems
Kevin Beaver
2002
Computer Telephony Integration
William A. Yarberry Jr.
2002
Sign up to read
Computer Telephony Integration
William A. Yarberry Jr.
2002
Complete Book of Remote Access
2002
Sign up to read
Complete Book of Remote Access
2002
The ABCs of TCP/IP
Gilbert Held
2002
Sign up to read
The ABCs of TCP/IP
Gilbert Held
2002
The ABCs of IP Addressing
Gilbert Held
2001
Sign up to read
The ABCs of IP Addressing
Gilbert Held
2001
Building an Information Security Awareness Program
Mark B. Desman
2001
Sign up to read
Building an Information Security Awareness Program
Mark B. Desman
2001
A Practical Guide to Security Engineering and Information Assurance
Debra S. Herrmann
2001
Sign up to read
A Practical Guide to Security Engineering and Information Assurance
Debra S. Herrmann
2001
Enterprise Systems Integration
Judith M. Myerson
2001
Sign up to read
Enterprise Systems Integration
Judith M. Myerson
2001
New Directions in Project Management
2001
Sign up to read
New Directions in Project Management
2001
High-Performance Web Databases
Sanjiv Purba
2000
Sign up to read
High-Performance Web Databases
Sanjiv Purba
2000
Financial Services Information Systems
Jessica Keyes
2000
Sign up to read
Financial Services Information Systems
Jessica Keyes
2000
Financial Services Information Systems
Jessica Keyes
2000
Sign up to read
Financial Services Information Systems
Jessica Keyes
2000
Multi-Operating System Networking
Raj Rajagopal
1999
Sign up to read
Multi-Operating System Networking
Raj Rajagopal
1999
Effective Use of Teams for IT Audits
Martin Krist
1999
Sign up to read
Effective Use of Teams for IT Audits
Martin Krist
1999
Handbook of Technology in Financial Services
Jessica Keyes
1998
Sign up to read
Handbook of Technology in Financial Services
Jessica Keyes
1998
Handbook of Technology in Financial Services
Jessica Keyes
1998
Sign up to read
Handbook of Technology in Financial Services
Jessica Keyes
1998
1
...
2
3
4
5
6
7
8
9
10
11
12
13
14
15