Title: Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World, Author: Don Tapscott
Title: The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe, Author: William Poundstone
Title: Making Things Happen: Mastering Project Management, Author: Scott Berkun
Title: Computer Forensics and Digital Investigation with EnCase Forensic v7, Author: Suzanne Widup
Title: A-Z of Capacity Management: Practical Guide for Implementing Enterprise IT Monitoring & Capacity Planning, Author: Dominic Ogbonna
Title: DNS Security: Defending the Domain Name System, Author: Allan Liska
Title: Transformation and Your New EHR: The Communications and Change Leadership Playbook for Implementing Electronic Health Records, Author: Dennis R. Delisle
Title: Cybernetic Revolutionaries: Technology and Politics in Allende's Chile, Author: Eden Medina
Title: Here Comes Everybody: The Power of Organizing Without Organizations, Author: Clay Shirky
Title: The American Scientist and Diplomacy, Author: Mario Nabliba
Title: Microsoft Visual C++ Windows Applications by Example, Author: Stefan Bjornander
Title: Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World, Author: Don Tapscott
Title: Perfect Software And Other Illusions About Testing, Author: Gerald Weinberg
Title: Incident Response and Computer Forensics, Third Edition, Author: Jason T. Luttgens
Title: Privacy in Context: Technology, Policy, and the Integrity of Social Life, Author: Helen Nissenbaum
Title: Understanding IT in Construction, Author: Ming Sun
Title: Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use, Author: Fred Trotter
Title: The Future of Ideas: The Fate of the Commons in a Connected World, Author: Lawrence Lessig
Title: The New Childhood: Raising Kids to Thrive in a Connected World, Author: Jordan Shapiro
Title: Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, Author: Heru Susanto

Pagination Links