Title: TRANSFORMING RESOURCES: STEP-BY-STEP STRATEGIES FOR DIGITAL INNOVATION AND SUSTAINABILITY, Author: Sreekanth Muktevi
Title: The New Face of Woke Education, Author: Priscilla West
Title: Digital Minimalism: Choosing a Focused Life in a Noisy World, Author: Cal Newport
Title: Reclaiming Conversation: The Power of Talk in a Digital Age, Author: Sherry Turkle
Title: Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked, Author: Adam Alter
Title: Tools and Weapons: The Promise and the Peril of the Digital Age, Author: Brad Smith
Title: Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, Author: Cathy O'Neil
Title: What Will Be: How the New World of Information Will Change Our Lives, Author: Michael L. Dertouzos
Title: The New Face of Woke Education, Author: Priscilla West
Title: Hacked, Now What? Protect Your Business From Cybercriminals, Author: Nathalie Claes
Title: World Without Mind: The Existential Threat of Big Tech, Author: Franklin Foer
Title: The End of Absence: Reclaiming What We've Lost in a World of Constant Connection, Author: Michael John Harris
Title: You Are Not a Gadget: A Manifesto, Author: Jaron Lanier
Title: Summary Secrets of the Millionaire Mind: Financial Freedom And Success The Hidden Secrets & Habits Of Rich And Successful People How To Acquire The Habits And Thinking Of The Rich, Author: Natalie J Fox
Title: Design and Build Modern Datacentres, A to Z practical guide, Author: Engineer Said AL Hosni
Title: Finding the Missing Pieces: How to Solve the Puzzle of Digital Modernization and Transformation, Author: Jim Lambert
Title: Learning To Use iMac For Everyone: The Complete Instruction To Operate And Set Up The New iMac 2020:, Author: Tad Mall
Title: The Ultimate Guide to Building a Successful IT Service Desk: Strategies for Enterprise Corporations, Author: Shameka Mccarthy
Title: Succeed In Software: A Comprehensive Guide To Software Career Excellence, Author: Sean Cannon
Title: Ethical Hacking: Complete Guide to Networks Defense Strategies and Information Security Risk Assessment, Author: Megane Noel

Pagination Links