Categories Pricing Corporate

Informatika & Programování

Prolog Techniques
Perl for Beginners
Applications of Prolog
Java: Graphical User Interfaces
Java 11: Web applications and Java EE
Artificial Intelligence: Exercises I
IT Strategy & Technology Innovation
Building Real Time Web Applications in PHP and JS
Java 6: JDBC and database applications
An Introduction to Windows Operating System
Cloud Computing
Expert Talk: Adjusting your Tech Mindset
Read between the screens
Communicating with Technology
Introduction to Web Services with Java
Programmed Learning
Using Concurrency and Parallelism Effectively – II
Database Design and Implementation
Must-Have Content for Your Business Website
Pilar 2: Web 3.0
Exercises on Relational Database Theory
Factual Fiction
HR Digital Transformation
IT Audit Support Tools 1 - Book 4
Expert Talk: Technology and Change
Expert Talk: IT and Information Management & Data
Powerful Online Communication
Using and Managing Passwords
Social Selling
Digital Strategy Mapping
SQL: A Comparative Survey
Micro Talk: HR - Privacy and Protection, Part 1
Digitalisation: Future
12 Steps to Social Media Success
Face the Future
IT Audit Guides
Understanding Digital Age Effects
LGPD Compliance Support Tools
Parallel Programming Made Simple
Agile, a Manager’s Guide
Micro Talk: Soft Skills and VR
C# 10: More on WPF
C# 1
Information security for non-technical managers
C# 7: About System Development
Advanced Messaging Using PHP7 and Symfony 5
Law for Computing Students
Hands-on with SAP ERP and IDES
Implementing Corporate Digital Management Actions
Automating Openstack using PHP7
Java 12: WWW and development of the client part
Create your digital legacy
Assessing Information Risks
Windows 7 Install to Secure
Digital Systems Design
Update your digital workplace
Java 4: Java’s type system and collection classes
The 4th Industrial Revolution & the Future of Jobs
R Companion to Introductory Nonparametrics
Data Protection Specialized Controls
Object Oriented Programming using C#
Management of large sets of image data
Internet and Technology Law: A U.S. Perspective
Java 1: Basic syntax and semantics
Professional Audio and Video
PaulOS: Part II
The Digital Transformation Handbook
In Focus: The Role of People Professionals
Understanding Computer Simulation
Java: Classes in Java Applications
Data Protection Impact Assessment
The CEO’s Guide to LGPD Compliance
Policing Cyber Crime
Artificial Intelligence – Agent Behaviour
The Basics of User Experience Design
A Guide to ERP
Digital Thinking and Mobile Teaching
IT Audit Support Tools 2 - Book 5
Digital Age Management Support Tools
GDPR Gap Assessment Tools
Common Types of Attack
Search Engine Advertising
IT-Business Alignment: Part I
How to improve your company’s performance
How to Improve Your Production: Part II
Jump into the Metaverse with SpatialPort
Building Information Modeling
How to Build Software
Applied Business Analysis
Using Concurrency and Parallelism Effectively – I
Expert Talk: Internet of Things
Cyber Scams and You! Volume 1
Data Protection and Privacy Management System
Expert Talk: GDPR
Enhance a Website Project
GDPR Gap Analysis by Article
An Introduction to Matlab
Automation and Robotics
A Practical Introduction to 3D Game Development
C# 12: WWW the Client Side
Java Data Structures and Algorithms
C# 8: Threads and LINQ
Introduction to E-Commerce
IT Management
C# 11: WWW The server side
Managing digital risk
Java 15: More about JavaFX
Mathematics for Computer Scientists
Java 10: Java2D, Drawing of the window
Java 3: Object-oriented programming
Go Data Structures and Algorithms
Introduction to Soft Computing
C# 3: Object Oriented Programming
Technology-Based Entrepreneurship
C# 5: Assemblies, Class Libraries and IO
Metaverse: Sentiment Analysis
Electronics and Computing in Textiles
Java 5: Files and Java IO
Expert Talk: Cyber Security
The adventures of an IT leader
Visual Event Computing
Taming an Uncertain Future
IT Management Controls
Preparing Digital Management Actions
Value Stream Mapping
Go Faster!
Artificial Intelligence: Exercises II
Windows 8.1
Ubuntu® Linux
How to Talk Tech to a Non-Techie Audience
CCNA in 21 Hours
C# 6: ADO.NET and Database Applications
Tech-Know with Uncle URL
Future Performance Measurements in the Age of AI
C# 2: Programs With a Graphical User Interface
Agile Leadership
The complete web developer
Expert Talk: Responsible Use of AI
GDPR Gap Analysis by Process
Expert Talk: Data and Technology
An Insider’s Guide: Website Sourcing Made Easy!
Time to be Productive
Pilar 5: Crypto
A Step-by-Step R Tutorial
IT Management, Part II
Hands-on with SAP S/4HANA and GBI
PaulOS F020: An RTOS for the C8051F020
Business Information Management
Metaverse Overview & Impact
Introduction to Data Visualization
Practical IT Asset Management
DP&P Strategies, Policies and Plans
Paulos F040
Java 20: About the system development process
Pilar 3: NFT's
Productivity: Email Hacks
How to Build a Subscription Movement
Java 16: Mobile phones and Android
Implementing Personal Digital Management Actions
Salesforce Document Generation and Why You Need It
Linux for system administrators and DevOps
Java: The Fundamentals of Objects and Classes
Digital Training @Work
Java 14: Development of applications with JavaFX
Java 9: Swing, Documents and printing
Virtual Must be Part of Your Events Strategy
IT Governance Controls - Book 2
Good Digital Hygiene
Agile for Managers
Visual Cryptography and Its Applications
Programming Security Surveillance Systems
Easy-to-use Team Facilitation Techniques
Pilar 4: DAO's
PaulOS: Part I
Expert Talk: What is Blockchain
Decision-making support systems: Theory & practice
Java 2: Programs with a graphical user interface
Expert Talk: Data Security Protection & Management
The modern information environment
Systems Analysis and Program Development
Learning with Technology
Java 17: More about Java and Android
OOP in PHP and MVC
How to Create High Performance Teams
Object Oriented Programming using Java
Introduction to Social Engineering
4 Digitalisation Tips
Working from Home
Digital Image Processing: Part I
Making the Most of Big Data
Managing Personal Data Breaches
Managing Data Subject Rights
Artificial Intelligence
Managerial Technology Evaluation
Expert Talk: Cryptocurrency Safety
C Programming in Linux
Introduction to Malware
Java 18: Algorithms and data structures
C# 9: GUI programs with WPF
IT Performance Management
C# 1: Basic Syntax and Semantics
Understanding XML: A Software Development Approach
Introduction to Digital Signal and System Analysis
Artificial Intelligence – Agents and Environments
Java 8: Multithreaded programs
Fundamentals of Media Security
C# 4: Important Classes and More
Java 7: About system development
Pilar 1: The Metaverse
Ruby Data Structures and Algorithms
Structured Programming with C++
Large Scale Data Handling in Biology
An Introduction to Relational Database Theory
Semantic Web And Ontology
Expert Talk: AI in Business - the Real Scoop
In Focus: An Agile Approach to Learning Design
Cyberattacks and Cybersecurity
IT-Business Alignment: Part II
How to Improve Your Production: Part I
Java 19: More algorithms and data structures
An Introduction to the Internet of Things
Security and Data Privacy Audit Questionnaires
Effective Personal Data Practices
Metaverse Impact & Risks
Under the Influence
Introduction to Complex Numbers
Strategies of MNCs in the Digital Era
Systems Analysis and Design
Business Information Systems
Expert Talk: Making Online Sales
Managing the use of technology
Philosophy of Artificial Intelligence
Digital Image Processing: Part II
Technology evaluation for entrepreneurs
How to do the Final Year Projects
Java 13: Distributed programming and Java EE
Expert Talk: Adapting to Tech Changes
Cyber Scams and You! Volume 2
Agile Concepts
Business Information Management: Exercises
Digitalisation and Kids
IT Audit Execution Tools - Book 3
Ethical Hacking for Beginners
3D Video Processing and Transmission Fundamentals
In Focus: Learning in an Agile Environment
Scrum: The Basics