Showing 241-252 of 390 Books
No Image Available Guide to Discrete Mathematics Category: Information Technology By:Gerard O’Regan
No Image Available Fundamentals of Discrete Math for Computer... Category: Information Technology By:Tom Jenkyns and Ben Stephenson
No Image Available What is Qualitative Research? Category: Business, General Studies, Information Technology, Research By:Martyn Hammersley
No Image Available Information Security: Design, Implementation, Measurement, and... Category: Entrepreneurship and Technology Innovation, Information Security Management, Information Technology By:Timothy P. Layton
No Image Available Information Security Fundamentals Category: Business, Information Security Management, Information Technology By:Thomas R. Peltier
No Image Available Information security: principles and practice Category: Business, Information Security Management, Information Technology By:Mark Stamp
No Image Available E-commerce 2021–2022: business, technology and society Category: Business, Entrepreneurship and Technology Innovation, Information Technology By:Kenneth C. Laudon and Carol Guercio Traver
No Image Available Principles of Information Security Category: Entrepreneurship and Technology Innovation, Information Security Management, Information Technology By:Michael E. Whitman and Herbert J. Mattord
No Image Available BIOMETRIC USER AUTHENTICATION FOR IT SECURITY:... Category: Entrepreneurship and Technology Innovation, Information Security Management, Information Technology By:Claus Vielhauer
No Image Available Principles of Operations Management Category: Accounting and Taxation, Business, Information Technology, MEng. Industrial Engineering, Supply Chain Management By:Jay Heizer, Barry Render and Chuck Munson
No Image Available Accounting Information Systems Category: Accounting and Taxation, Accounting with Computing, Information Technology, MSC Accounting & Finance By:Vernon J. Richardson, C. Janie Chang & Rodney Smith
No Image Available Learn More Python 3 The Hard... Category: Information Security Management By:Zed A. Shaw