Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Auerbach Publications
Auerbach Publications
English
close
Showing 841 - 900 out of 916 books
Building Software
Nikhilesh Krishnamurthy, Amitabh Saran
2007
Sign up to read
Building Software
Nikhilesh Krishnamurthy, Amitabh Saran
2007
Software Engineering Foundations
Yingxu Wang
2007
Sign up to read
Software Engineering Foundations
Yingxu Wang
2007
Distributed Antenna Systems
2007
Sign up to read
Distributed Antenna Systems
2007
Mechanics of User Identification and Authentication
Dobromir Todorov
2007
Sign up to read
Mechanics of User Identification and Authentication
Dobromir Todorov
2007
Effective Software Maintenance and Evolution
Stanislaw Jarzabek
2007
Sign up to read
Effective Software Maintenance and Evolution
Stanislaw Jarzabek
2007
Wireless Ad Hoc Networking
2007
Sign up to read
Wireless Ad Hoc Networking
2007
Six Sigma Software Development
Christine B. Tayntor
2007
Sign up to read
Six Sigma Software Development
Christine B. Tayntor
2007
Six Sigma Software Development
Christine B. Tayntor
2007
Sign up to read
Six Sigma Software Development
Christine B. Tayntor
2007
Computer Forensics
Robert C. Newman
2007
Sign up to read
Computer Forensics
Robert C. Newman
2007
Eaches or Pieces Order Fulfillment, Design, and Operations Handbook
David E. Mulcahy
2007
Sign up to read
Eaches or Pieces Order Fulfillment, Design, and Operations Handbook
David E. Mulcahy
2007
Eaches or Pieces Order Fulfillment, Design, and Operations Handbook
David E. Mulcahy
2007
Sign up to read
Eaches or Pieces Order Fulfillment, Design, and Operations Handbook
David E. Mulcahy
2007
The Art of Software Modeling
Benjamin A. Lieberman
2006
Sign up to read
The Art of Software Modeling
Benjamin A. Lieberman
2006
Business Strategies for the Next-Generation Network
Nigel Seel
2006
Sign up to read
Business Strategies for the Next-Generation Network
Nigel Seel
2006
RFID in the Supply Chain
Judith M. Myerson
2006
Sign up to read
RFID in the Supply Chain
Judith M. Myerson
2006
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
Fred Cohen
2006
Sign up to read
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
Fred Cohen
2006
Programming Language Fundamentals by Example
D.E. Stevenson
2006
Sign up to read
Programming Language Fundamentals by Example
D.E. Stevenson
2006
Practical Hacking Techniques and Countermeasures
Mark D. Spivey
2006
Sign up to read
Practical Hacking Techniques and Countermeasures
Mark D. Spivey
2006
TCP Performance over UMTS-HSDPA Systems
Mohamad Assaad, Djamal Zeghlache
2006
Sign up to read
TCP Performance over UMTS-HSDPA Systems
Mohamad Assaad, Djamal Zeghlache
2006
Process-Based Software Project Management
F. Alan Goodman
2006
Sign up to read
Process-Based Software Project Management
F. Alan Goodman
2006
Modeling Software with Finite State Machines
Ferdinand Wagner, Ruedi Schmuki, Thomas Wagner, Peter Wolstenholme
2006
Sign up to read
Modeling Software with Finite State Machines
Ferdinand Wagner, Ruedi Schmuki, Thomas Wagner, Peter Wolstenholme
2006
Handbook of Supply Chain Management
James B. Ayers
2006
Sign up to read
Handbook of Supply Chain Management
James B. Ayers
2006
Organizational Crisis Management
Gerald Lewis
2006
Sign up to read
Organizational Crisis Management
Gerald Lewis
2006
Information Security Architecture
Jan Killmeyer
2006
Sign up to read
Information Security Architecture
Jan Killmeyer
2006
Information Security Architecture
Jan Killmeyer
2006
Sign up to read
Information Security Architecture
Jan Killmeyer
2006
Embedded Linux System Design and Development
P. Raghavan, Amol Lad, Sriram Neelakandan
2005
Sign up to read
Embedded Linux System Design and Development
P. Raghavan, Amol Lad, Sriram Neelakandan
2005
Wireless Security Handbook
Aaron E. Earle
2005
Sign up to read
Wireless Security Handbook
Aaron E. Earle
2005
Fundamentals of DSL Technology
2005
Sign up to read
Fundamentals of DSL Technology
2005
Fundamentals of DSL Technology
Philip Golden, Hervé Dedieu, Krista S. Jacobsen
2005
Sign up to read
Fundamentals of DSL Technology
Philip Golden, Hervé Dedieu, Krista S. Jacobsen
2005
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Sign up to read
Improving Service Quality in the Global Economy
Michael Milakovich, Harvey W. Blanch
2005
Performance Modeling and Analysis of Bluetooth Networks
Jelena Misic, Vojislav B. Misic
2005
Sign up to read
Performance Modeling and Analysis of Bluetooth Networks
Jelena Misic, Vojislav B. Misic
2005
Wireless Mesh Networks
Gilbert Held
2005
Sign up to read
Wireless Mesh Networks
Gilbert Held
2005
Flexible Software Design
Bruce Johnson, Walter W. Woolfolk, Robert Miller, Cindy Johnson
2005
Sign up to read
Flexible Software Design
Bruce Johnson, Walter W. Woolfolk, Robert Miller, Cindy Johnson
2005
The ROI from Software Quality
Khaled El Emam
2005
Sign up to read
The ROI from Software Quality
Khaled El Emam
2005
Grid Database Design
April J. Wells
2005
Sign up to read
Grid Database Design
April J. Wells
2005
Reducing Risk with Software Process Improvement
Louis Poulin
2005
Sign up to read
Reducing Risk with Software Process Improvement
Louis Poulin
2005
Strategic Software Engineering
Fadi P. Deek, James A. M. McHugh, Osama M. Eljabiri
2005
Sign up to read
Strategic Software Engineering
Fadi P. Deek, James A. M. McHugh, Osama M. Eljabiri
2005
Database and Applications Security
Bhavani Thuraisingham
2005
Sign up to read
Database and Applications Security
Bhavani Thuraisingham
2005
The Windows Serial Port Programming Handbook
Ying Bai
2004
Sign up to read
The Windows Serial Port Programming Handbook
Ying Bai
2004
MPLS for Metropolitan Area Networks
Nam-Kee Tan
2004
Sign up to read
MPLS for Metropolitan Area Networks
Nam-Kee Tan
2004
Outsourcing Software Development Offshore
Tandy Gold
2004
Sign up to read
Outsourcing Software Development Offshore
Tandy Gold
2004
Network Security Technologies
Kwok T. Fung
2004
Sign up to read
Network Security Technologies
Kwok T. Fung
2004
Lightweight Enterprise Architectures
Fenix Theuerkorn
2004
Sign up to read
Lightweight Enterprise Architectures
Fenix Theuerkorn
2004
Information Security Policies and Procedures
Thomas R. Peltier
2004
Sign up to read
Information Security Policies and Procedures
Thomas R. Peltier
2004
Practical Network Design Techniques
Gilbert Held, S. Ravi Jagannathan
2004
Sign up to read
Practical Network Design Techniques
Gilbert Held, S. Ravi Jagannathan
2004
Information Security Policies and Procedures
Thomas R. Peltier
2004
Sign up to read
Information Security Policies and Procedures
Thomas R. Peltier
2004
Software Configuration Management
Jessica Keyes
2004
Sign up to read
Software Configuration Management
Jessica Keyes
2004
The Hands-On Project Office
Richard M. Kesner
2003
Sign up to read
The Hands-On Project Office
Richard M. Kesner
2003
Surviving Security
Amanda Andress
2003
Sign up to read
Surviving Security
Amanda Andress
2003
Strategic Information Security
John Wylder
2003
Sign up to read
Strategic Information Security
John Wylder
2003
The ABCs of LDAP
Reinhard E. Voglmaier
2003
Sign up to read
The ABCs of LDAP
Reinhard E. Voglmaier
2003
Network Perimeter Security
Cliff Riggs
2003
Sign up to read
Network Perimeter Security
Cliff Riggs
2003
Investigator's Guide to Steganography
Gregory Kipper
2003
Sign up to read
Investigator's Guide to Steganography
Gregory Kipper
2003
Critical Incident Management
Alan B. Sterneckert
2003
Sign up to read
Critical Incident Management
Alan B. Sterneckert
2003
Server Disk Management in a Windows Environment
Drew Robb
2003
Sign up to read
Server Disk Management in a Windows Environment
Drew Robb
2003
Software Metrics
C. Ravindranath Pandian
2003
Sign up to read
Software Metrics
C. Ravindranath Pandian
2003
Wireless Sensor Networks
Jr., Edgar H. Callaway, Edgar H. Callaway, Jr.
2003
Sign up to read
Wireless Sensor Networks
Jr., Edgar H. Callaway, Edgar H. Callaway, Jr.
2003
Using the Common Criteria for IT Security Evaluation
Debra S. Herrmann
2002
Sign up to read
Using the Common Criteria for IT Security Evaluation
Debra S. Herrmann
2002
Healthcare Information Systems
2002
Sign up to read
Healthcare Information Systems
2002
Computer Telephony Integration
William A. Yarberry Jr.
2002
Sign up to read
Computer Telephony Integration
William A. Yarberry Jr.
2002
Complete Book of Remote Access
2002
Sign up to read
Complete Book of Remote Access
2002
1
...
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16