Resultance GmbH
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

Beating the System:Using Creativity to Outsmart Bureaucracies - Abstract

Beating the System:Using Creativity to Outsmart Bureaucracies ...

Russell Lincoln Ackoff & Sheldon Rovin

From Know-It-Alls to Learn-It-Alls - Executive Development in the Era of Self-Refining Algorithms, Collaborative Filtering and Wearable Computing (Paper)

From Know-It-Alls to Learn-It-Alls - Executive Development in ...

Mihnea Moldoveanu & Das Narayandas

The Rules of Project Risk Management: Implementation Guidelines for Major Projects

The Rules of Project Risk Management: Implementation Guidelines ...

Mr Robert Chapman

Free Will and Consciousness in the Multiverse

Free Will and Consciousness in the Multiverse

Christian D. Schade

The Standard for Organizational Project Management (OPM)

The Standard for Organizational Project Management (OPM)

Project Management Institute

Category: Security

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...

Klaus-Rainer Müller

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Rick Howard

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...

Lester Nichols

Cloud Native Software Security Handbook: Unleash the Power of Cloud Native Tools for Robust Security in Modern Applications

Cloud Native Software Security Handbook: Unleash the Power of ...

Mihir. Shah

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing

Book Details

...