Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Certified in the Governance of Enterprise IT (CGEIT) Course Handbook & Exam Questions, Author: Ps Publishing
Title: The Seventh Sense: Power, Fortune, and Survival in the Age of Networks, Author: Joshua Cooper Ramo
eBook $2.99 $17.99 Current price is $2.99, Original price is $17.99.
Title: How to Sell Your Art Online: Live a Successful Creative Life on Your Own Terms, Author: Cory Huff
Title: LinkedIn For Dummies, Author: Joel Elad
Title: From Gutenberg to Google: The History of Our Future, Author: Tom Wheeler
Title: The Compete Ccna 200-301 Study Guide: Network Engineering Edition, Author: Joe Spoto
Title: Die SharePoint 2010 Gebote: 1. Du sollst lernen die Grundlagen, Author: Daniel Mettler
Title: Active Directory For Dummies, Author: Steve Clines
Title: Hands-on ESP32 with Arduino IDE: Unleash the power of IoT with ESP32 and build exciting projects with this practical guide, Author: Asim Zulfiqar
Title: Event Processing: Designing IT Systems for Agile Companies: Designing IT Systems for Agile Companies, Author: K. Mani Chandy
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Collaborate or Perish!: Reaching Across Boundaries in a Networked World, Author: William Bratton
Title: Top-Down Network Design, Author: Priscilla Oppenheimer
Title: The Ethical Hack: A Framework for Business Value Penetration Testing, Author: James S. Tiller
Title: Storage Area Networks For Dummies, Author: Christopher Poelker
Title: Microsoft SharePoint 2010: Building Solutions for SharePoint 2010, Author: Sahil Malik
Title: Service-Oriented Architecture Governance for the Services Driven Enterprise, Author: Eric A. Marks
Title: Enterprise Operations Management Handbook, Second Edition, Author: Steven F. Blanding
Title: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques, Author: Timothy

Pagination Links