Computer Communications Security: Principles, Standard Protocols and Techniques
Computer Crime: A Crimefighter's Handbook
Computer Forensics: Incident Response Essentials
Computer Modern Typefaces: Computers & Typesetting / E
Computer Professional's Quick Reference
Computer Rules: A Guide to Formulating Computer Operating and Security Policy for Users
Computer Security: Art and Science
Computer Security Reference Book
Computers Under Attack: Intruders, Worms, and Viruses
Computing Calamities: Lessons Learned from Products, Projects, and Companies that Failed
Concepts in Enterprise Resource Planning
Conclusion: International Enterprise — Unit 12 3rd Ed.
Conclusion: Planning Your Resource Use: Managing Resources for the Market — Block 8
Confessions of a Management Consultant turned CEO: A Balanced View of Leadership
Conquering the Chaos: Win in India, Win Everywhere
Consulting Demons: Inside the Unscrupulous World of Global Corporate Consulting 2nd Ed.
Contemporary Strategy Analysis: Concepts, Techniques, Applications 3rd Ed.
Contingent Risk and Policy Issues: Financial Strategy — Unit 9
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation