Free Delivery Over $100
1307 books were found.
Read More >>
"While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal... Read More >>
This book provides business people and lawyers (both in-house and in private practice) with an easily understandable... Read More >>
This book records the author’s years of feelings and experiences in the software industry. In his own practices,... Read More >>
Nonfunctional Requirements in Mobile Application Development is an empirical study of how non-functional requirements... Read More >>
The authors bring a “voice from the trenches” describing best practices for effective security development. This... Read More >>
This book covers the concepts of cloud reliability engineering along with various best practices in the industries... Read More >>
This model for measuring project management maturity is updated to the PMI’s PMBOK® Guide, 6th Edition. The book... Read More >>
In this new book, the Author shares his experience and expertise to help you navigate today’s dangerous cybersecurity... Read More >>
Previous edition: published as Communicating pictures by David R. Bull. 2014. Read More >>
This book presents a new approach to the issue of project management, showing how it can be approached through the... Read More >>
Ecosystems and Technology: Idea Generation and Content Model Processing presents important new innovations in the... Read More >>
This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production... Read More >>
This book is dedicated to technological challenges and management with special emphasis on new advances and challenges... Read More >>
This new volume looks at information security management system standards, risk management associated with information... Read More >>
This volume shows how ICT (information and communications technology) can play the role of a driver of business... Read More >>
The book proposal presents a modeling framework for Virtual Enterprise focused on process composition by consolidating... Read More >>
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate... Read More >>
This book provides every necessary detail required to develop the secure searchable encryption scheme using both... Read More >>