Resultance GmbH
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Thesis (Public)

Discover (Random Books)

Logistics Management and Strategy: Competing Through the Supply Chain

Logistics Management and Strategy: Competing Through the Supply ...

Alan Harrison & Remko I. van Hoek

Company of One (Paul Jarvis) Book Summary

Company of One (Paul Jarvis) Book Summary

Paul Minors

Fundamentals of Technology Project Management

Fundamentals of Technology Project Management

Colleen Garton & Erika McCulloch

Strategische Planung der Fertigungstiefe bei Unsicherheit und Dynamik: Ein simulationsbasierter Ansatz am Beispiel der Fertigung von Traktionsbatterien

Strategische Planung der Fertigungstiefe bei Unsicherheit und ...

Christian Huth

Succession Planning in the Library: Developing Leaders, Managing Change

Succession Planning in the Library: Developing Leaders, Managing ...

Paula M. Singer & Gail Griffith

Category: Security

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Rick Howard

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...

Klaus-Rainer Müller

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...

Lester Nichols

Cloud Native Software Security Handbook: Unleash the Power of Cloud Native Tools for Robust Security in Modern Applications

Cloud Native Software Security Handbook: Unleash the Power of ...

Mihir. Shah

Book Details

...