Resultance GmbH
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Thesis (Public)

Discover (Random Books)

The SAGE Handbook of Qualitative Data Collection

The SAGE Handbook of Qualitative Data Collection

Uwe Flick

Top 10 Types of Leadership Power

Top 10 Types of Leadership Power

WikiJob

Evolutionary Deep Learning: Genetic Algorithms and Neural Networks

Evolutionary Deep Learning: Genetic Algorithms and Neural Networks

Michael Lanham

Berkshire Encyclopedia of Sustainability 3/10: The Law and Politics of Sustainability

Berkshire Encyclopedia of Sustainability 3/10: The Law and Politics ...

Willis Jenkins & Daniel S. Fogel & Klaus Bosselmann & J. B. Ruhl

Project Management Next Generation: The Pillars for Organizational Excellence

Project Management Next Generation: The Pillars for Organizational ...

Harold Kerzner & Al Zeitoun & Ricardo Viana Vargas

Category: Security

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...

Lester Nichols

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing

Cloud Native Software Security Handbook: Unleash the Power of Cloud Native Tools for Robust Security in Modern Applications

Cloud Native Software Security Handbook: Unleash the Power of ...

Mihir. Shah

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Rick Howard

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...

Klaus-Rainer Müller

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Book Details

...