Resultance GmbH
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

10 Things Which Can Disqualify You From Leadership Checklist (But are rarely talked about)

10 Things Which Can Disqualify You From Leadership Checklist ...

Brian Dodd

Leading the Unleadable

Leading the Unleadable

Alan Willett

Metrics-Based Process Mapping: Identifying and Eliminating Waste in Office and Service Processes

Metrics-Based Process Mapping: Identifying and Eliminating Waste ...

Karen Martin & Mike Osterling

Agile Processes in Software Engineering and Extreme Programming – Workshops

Agile Processes in Software Engineering and Extreme Programming ...

Michael Rosemann & John Mylopoulos & Michael J. Shaw & Clemens Szyperski & Rashina Hoda & Wil van der Aalst

Change Management in Nonprofit Organizations: Theory and Practice

Change Management in Nonprofit Organizations: Theory and Practice

Kunle Akingbola & Sean Edmund Rogers & Alina Baluch

Category: Security

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...

Klaus-Rainer Müller

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Rick Howard

Cloud Native Software Security Handbook: Unleash the Power of Cloud Native Tools for Robust Security in Modern Applications

Cloud Native Software Security Handbook: Unleash the Power of ...

Mihir. Shah

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...

Lester Nichols

Book Details

...