Resultance GmbH
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Thesis (Public)

Discover (Random Books)

Strategisches Produktmanagement nach Open Product Management Workflow: Das Produktmanagement-Buch, das Schritt für Schritt die Produktmanager-Aufgaben erklärt und Werkzeuge aus der Praxis liefert

Strategisches Produktmanagement nach Open Product Management ...

Frank Lemser

Devops in Practice

Devops in Practice

Danilo Sato

Strategic Management: Concepts and Cases: Competitiveness and Globalization

Strategic Management: Concepts and Cases: Competitiveness and ...

Michael A. Hitt & R. Duane Ireland & Robert E. Hoskisson

Tackle What's Next: Own Your Story, Stack Wins, and Achieve Your Goals in Business and Life

Tackle What's Next: Own Your Story, Stack Wins, and Achieve ...

Eric Wood

Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014, Proceedings

Business Process Management: 12th International Conference, ...

Shazia Sadiq & Pnina Soffer & Hagen Völzer

Category: Security

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...

Klaus-Rainer Müller

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Implementing an Information Security Management System: Security ...

Abhishek Chopra & Mukund Chaudhary

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Rick Howard

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...

Lester Nichols

Cloud Native Software Security Handbook: Unleash the Power of Cloud Native Tools for Robust Security in Modern Applications

Cloud Native Software Security Handbook: Unleash the Power of ...

Mihir. Shah

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow

Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing

Book Details

...