e-library
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Shelves
  • Information Technology (Public)

Discover (Random Books)

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes (Home Technology Manuals)

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves ...

Marlon Buchanan

The 7 Habits of Highly Effective People

The 7 Habits of Highly Effective People

Stephen R. Covey

Lean Six Sigma Secrets for the CIO

Lean Six Sigma Secrets for the CIO

Peter T. Davis & William Bentley

The Meditations: An Emperor's Guide to Mastery (Stoic Philosophy Book 2)

The Meditations: An Emperor's Guide to Mastery (Stoic Philosophy ...

Marcus Aurelius & Ancient Renewal & Sam Torode

IT Governance

IT Governance

Alan Calder & Steve Watkins

Tiny Beautiful Things

Tiny Beautiful Things

Cheryl Strayed

Isaca - COBIT 5 Framework A Business Framework for the Governance and Management of Enterprise IT-Isaca (2012)

Isaca - COBIT 5 Framework A Business Framework for the Governance ...

ISACA www.isaca.org

Deep Work

Deep Work

Cal Newport

Publisher: Ancient Renewal

The Meditations: An Emperor's Guide to Mastery (Stoic Philosophy Book 2)

The Meditations: An Emperor's Guide to Mastery (Stoic Philosophy ...

Marcus Aurelius & Ancient Renewal & Sam Torode

Book Details

...