Collections
Analysis and design of information systems, 3rd ed.
Availability : 1 copies available for loan
Guide to security assurance for cloud computing
Availability : 1 copies available for loan
Cloud computing and security : first international conference, ICCCS 2015 Nanjing, China, August 13–15, 2015 Revised Selected Papers
Availability : 1 copies available for loan
Cloud computing for enterprise architectures
Availability : 1 copies available for loan
Business intelligence: the savvy manager's guide, 2nd ed.
Availability : 1 copies available for loan
Using information to develop a culture of customer centricity: customer centricity, analytics, and information utilization
Availability : 1 copies available for loan
Maximizing return on investment using erp applications
Availability : 1 copies available for loan
Network intrusion analysis: methodologies, tools, and techniques for incident analysis and response
Availability : 1 copies available for loan
IT manager's handbook: getting your job done
Availability : 1 copies available for loan
Information systems research methods, epistemology, and applications
Availability : 1 copies available for loan