Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Auerbach Publications
Auerbach Publications
English
close
Showing 1 - 60 out of 916 books
Practical Core Software Security
James F. Ransome, Anmol Misra, Mark S. Merkow
2022
Sign up to read
Practical Core Software Security
James F. Ransome, Anmol Misra, Mark S. Merkow
2022
Ethics of Data and Analytics
Kirsten Martin
2022
Sign up to read
Ethics of Data and Analytics
Kirsten Martin
2022
Secure and Resilient Software
Mark S. Merkow, Lakshmikanth Raghavan
2011
Sign up to read
Secure and Resilient Software
Mark S. Merkow, Lakshmikanth Raghavan
2011
The Sensible Guide to Program Management Professional® Success
Te Wu
2021
Sign up to read
The Sensible Guide to Program Management Professional® Success
Te Wu
2021
Project Management Maturity Model
J. Kent Crawford
2021
Sign up to read
Project Management Maturity Model
J. Kent Crawford
2021
Business Process Management Systems
James F. Chang
2016
Sign up to read
Business Process Management Systems
James F. Chang
2016
Information Technology Control and Audit, Fifth Edition
Angel R. Otero
2018
Sign up to read
Information Technology Control and Audit, Fifth Edition
Angel R. Otero
2018
Sport Business Analytics
C. Keith Harrison, Scott Bukstein
2016
Sign up to read
Sport Business Analytics
C. Keith Harrison, Scott Bukstein
2016
Core Software Security
James Ransome, Anmol Misra
2018
Sign up to read
Core Software Security
James Ransome, Anmol Misra
2018
Requirements Engineering for Software and Systems
Phillip A. Laplante, Mohamad H. Kassab, Mohamad Kassab
2022
Sign up to read
Requirements Engineering for Software and Systems
Phillip A. Laplante, Mohamad H. Kassab, Mohamad Kassab
2022
ERP Systems for Manufacturing Supply Chains
Odd Jøran Sagegg, Erlend Alfnes
2020
Sign up to read
ERP Systems for Manufacturing Supply Chains
Odd Jøran Sagegg, Erlend Alfnes
2020
Information Security Governance
Andrej Volchkov
2018
Sign up to read
Information Security Governance
Andrej Volchkov
2018
PgMP® Practice Test Questions
Ginger Levin, PMP, PgMP
2018
Sign up to read
PgMP® Practice Test Questions
Ginger Levin, PMP, PgMP
2018
Acquiring Card Payments
Ilya Dubinsky
2019
Sign up to read
Acquiring Card Payments
Ilya Dubinsky
2019
PRAGMATIC Security Metrics
W. Krag Brotby, Gary Hinson
2016
Sign up to read
PRAGMATIC Security Metrics
W. Krag Brotby, Gary Hinson
2016
Survival Analysis with Python
Avishek Nag
2021
Sign up to read
Survival Analysis with Python
Avishek Nag
2021
Artificial Intelligence Theory, Models, and Applications
P Kaliraj, T. Devi
2021
Sign up to read
Artificial Intelligence Theory, Models, and Applications
P Kaliraj, T. Devi
2021
Healthcare Informatics
Stephan P. Kudyba
2018
Sign up to read
Healthcare Informatics
Stephan P. Kudyba
2018
The Complete Project Management Office Handbook
Gerard M. Hill
2013
Sign up to read
The Complete Project Management Office Handbook
Gerard M. Hill
2013
AI for Creatives
Vivian Ching, Dinesh Mothi
2025
Sign up to read
AI for Creatives
Vivian Ching, Dinesh Mothi
2025
Artificial Intelligence Solutions for Cyber-Physical Systems
2024
Sign up to read
Artificial Intelligence Solutions for Cyber-Physical Systems
2024
Digital Project Practice for Banking and FinTech
Tobias Endress
2024
Sign up to read
Digital Project Practice for Banking and FinTech
Tobias Endress
2024
FinTech
Parag Y Arjunwadkar
2018
Sign up to read
FinTech
Parag Y Arjunwadkar
2018
Business Analysis for Business Intelligence
Bert Brijs
2016
Sign up to read
Business Analysis for Business Intelligence
Bert Brijs
2016
Cloud Computing Networking
Lee Chao
2015
Sign up to read
Cloud Computing Networking
Lee Chao
2015
Hands-On Inventory Management
Ed C. Mercado
2007
Sign up to read
Hands-On Inventory Management
Ed C. Mercado
2007
Public Key Infrastructure
John R. Vacca
2004
Sign up to read
Public Key Infrastructure
John R. Vacca
2004
Official2 Guide to the CAP CBK
Patrick D. Howard
2016
Sign up to read
Official2 Guide to the CAP CBK
Patrick D. Howard
2016
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Sign up to read
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Software Engineering with UML
Bhuvan Unhelkar
2017
Sign up to read
Software Engineering with UML
Bhuvan Unhelkar
2017
Software Testing
Paul C. Jorgensen
2018
Sign up to read
Software Testing
Paul C. Jorgensen
2018
CISO COMPASS
Todd Fitzgerald
2018
Sign up to read
CISO COMPASS
Todd Fitzgerald
2018
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Sign up to read
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Enterprise Project Management
Claude H. Maley
2023
Sign up to read
Enterprise Project Management
Claude H. Maley
2023
A Practical Introduction to Enterprise Network and Security Management
Bongsik Shin
2021
Sign up to read
A Practical Introduction to Enterprise Network and Security Management
Bongsik Shin
2021
Optimizing Project Management
Te Wu
2020
Sign up to read
Optimizing Project Management
Te Wu
2020
The Complete Guide to Physical Security
Paul R. Baker, Daniel J. Benny
2016
Sign up to read
The Complete Guide to Physical Security
Paul R. Baker, Daniel J. Benny
2016
Antipatterns
Colin J. Neill, Philip A. Laplante, Joanna F. DeFranco
2011
Sign up to read
Antipatterns
Colin J. Neill, Philip A. Laplante, Joanna F. DeFranco
2011
Assessing and Managing Security Risk in IT Systems
John McCumber
2004
Sign up to read
Assessing and Managing Security Risk in IT Systems
John McCumber
2004
Portfolio Management
Carl Marnewick, John Wyzalek
2023
Sign up to read
Portfolio Management
Carl Marnewick, John Wyzalek
2023
Human–Computer Interaction
Gerard Jounghyun Kim
2015
Sign up to read
Human–Computer Interaction
Gerard Jounghyun Kim
2015
AI-Based Data Analytics
2023
Sign up to read
AI-Based Data Analytics
2023
Database Systems
Elvis Foster, Shripad Godbole
2022
Sign up to read
Database Systems
Elvis Foster, Shripad Godbole
2022
Database Design Using Entity-Relationship Diagrams
Sikha Saha Bagui, Richard Walsh Earp
2022
Sign up to read
Database Design Using Entity-Relationship Diagrams
Sikha Saha Bagui, Richard Walsh Earp
2022
Driving Justice, Equity, Diversity, and Inclusion
Kristina Kohl
2022
Sign up to read
Driving Justice, Equity, Diversity, and Inclusion
Kristina Kohl
2022
A Guide to IT Contracting
Michael R. Overly
2021
Sign up to read
A Guide to IT Contracting
Michael R. Overly
2021
Cyber Strategy
Carol A. Siegel, Mark Sweeney
2020
Sign up to read
Cyber Strategy
Carol A. Siegel, Mark Sweeney
2020
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
2019
Sign up to read
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
2019
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Sign up to read
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Project Management Theory and Practice, Third Edition
Gary L. Richardson, Brad M. Jackson
2018
Sign up to read
Project Management Theory and Practice, Third Edition
Gary L. Richardson, Brad M. Jackson
2018
Ethical Hacking and Penetration Testing Guide
Rafay Baloch
2017
Sign up to read
Ethical Hacking and Penetration Testing Guide
Rafay Baloch
2017
Software Methodologies
Capers Jones
2017
Sign up to read
Software Methodologies
Capers Jones
2017
Software-Defined Data Infrastructure Essentials
Greg Schulz
2017
Sign up to read
Software-Defined Data Infrastructure Essentials
Greg Schulz
2017
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Sign up to read
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
Sign up to read
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
The Internet of Things
Pethuru Raj, Anupama C. Raman
2017
Sign up to read
The Internet of Things
Pethuru Raj, Anupama C. Raman
2017
Leading and Managing Innovation
Russell D. Archibald, Shane Archibald
2016
Sign up to read
Leading and Managing Innovation
Russell D. Archibald, Shane Archibald
2016
Software Quality Assurance
Abu Sayed Mahfuz
2016
Sign up to read
Software Quality Assurance
Abu Sayed Mahfuz
2016
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Sign up to read
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Software Project Management
Ashfaque Ahmed
2016
Sign up to read
Software Project Management
Ashfaque Ahmed
2016
1
2
3
...
4
5
6
7
8
9
10
11
12
13
14
15
16