Warning: file_put_contents(cache/omni_65de75cf84b9bda33c1929b681b265dc.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →Encyclopedia of Software Engineering Three-Volume Set (Print)
Software engineering requires specialized knowledge of a broad spectrum of topics, including the construction of software and the platforms, applications, and environments in which the software operat...
View Book →
Vessel Health and Preservation: The Right Approach for Vascular Access
...
View Book →
14th International Congress for Applied Mineralogy (ICAM2019)
Belgorod State Technological University named after V. G. Shukhov, 23–27 September 2019, Belgorod, Russia...
View Book →Studies of welfare populations : data collection and research issues
x, 526 p. ; 23 cm...
View Book →AP European history : all access
vii, 566 pages : 28 cm...
View Book →Business Process Management Workshops
This book constitutes the thoroughly refereed post-workshop proceedings of 6 internationl workshops held in Brisbane, Australia, in conjunction with the 5th International Conference on Business Proces...
View Book →Medical and Care Compunetics 4
The role of the International Council on Medical and Care Compunetics (ICMCC) with regards to patient-related ICT has become obvious with the start of the Record Access Portal. This work aims to come ...
View Book →Comparative third sector governance in Asia : structure, process, and political economy
xiv, 341 p. ; 25 cm...
View Book →
Tobacco Control Policy in the Netherlands
Between Economy, Public Health, and Ideology...
View Book →
Access to Online Resources
A Guide for the Modern Librarian...
View Book →Technoscience and environmental justice : expert cultures in a grassroots movement
viii, 298 p. : 23 cm...
View Book →
Primary Angioplasty
A Practical Guide...
View Book →
Cold Micro Metal Forming
Research Report of the Collaborative Research Center "Micro Cold Forming" (SFB 747), Bremen, Germany...
View Book →
Safer Healthcare
Strategies for the Real World...
View Book →
The South Texas Health Status Review
A Health Disparities Roadmap...
View Book →
AI based Robot Safe Learning and Control
...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →Biofuels in Africa : opportunities, prospects, and challenges
1 online resource (xxxii, 184 pages)...
View Book →
Your Post has been Removed
Tech Giants and Freedom of Speech...
View Book →
Automatic Control with Experiments
...
View Book →
Protest Movements in Asylum and Deportation
...
View Book →
National Constitutions in European and Global Governance: Democracy, Rights, the Rule of Law
National Reports...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Responsive Open Learning Environments
Outcomes of Research from the ROLE Project...
View Book →The Egalitarian city : issues of rights, distribution, access, and power
xiv, 223 pages : 25 cm...
View Book →Access Control, Authentication, and Public Key Infrastructure
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a pr...
View Book →
Drones and the Creative Industry
Innovative Strategies for European SMEs...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Access Control for Databases
A comprehensive survey of the foundational models and recent research trends in access control models and mechanisms for database management systems....
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Modes of Bio-Bordering
The Hidden (Dis)integration of Europe...
View Book →
SQL Server Source Control Basics
...
View Book →
Anti-Microbial Resistance in Global Perspective
...
View Book →The Whole Process of E-commerce Security Management System
This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole proces...
View Book →
Evaluating Information Retrieval and Access Tasks
NTCIR's Legacy of Research Impact...
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →
Competition Authorities in South Eastern Europe
Building Institutions in Emerging Markets...
View Book →
Towards a Systemic Theory of Irregular Migration
Explaining Ecuadorian Irregular Migration in Amsterdam and Madrid...
View Book →
Making Medicines in Africa
The Political Economy of Industrializing for Local Health...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →CompTIA Security+ Certification Boxed Set (Exam SY0-301)
The best fully integrated CompTIA Security+ self-study package featuring 1200+ practice exam questions. Save 12% on this Boxed Set—with bonus electronic content! CompTIA Security+ Certification Boxe...
View Book →
Twin-Control
A Digital Twin Approach to Improve Machine Tools Lifecycle...
View Book →
Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice
Within the past 10 years, tremendous innovations have been brought forth in information diffusion and management. Such technologies as social media have transformed the way that information is dissemi...
View Book →
Guide to Understanding Discretionary Access Control in Trusted Systems
No description available....
View Book →Access Control in Data Management Systems
Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly cru...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →
The Emigrant Communities of Latvia
National Identity, Transnational Belonging, and Diaspora Politics...
View Book →
Professional Web Accessibility Auditing Made Easy
Essential Skills for Web Developers, Content Creators, and Designers...
View Book →
Inside Asylum Bureaucracy: Organizing Refugee Status Determination in Austria
...
View Book →
Reactive Power Control in AC Power Systems
Fundamentals and Current Issues...
View Book →
Disrupting Finance
FinTech and Strategy in the 21st Century...
View Book →
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
Intelligent Methods for the Factory of the Future...
View Book →Computational Science and Its Applications - ICCSA 2006
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 pa...
View Book →
The Future of Election Administration
Cases and Conversations...
View Book →
Introduction to Permanent Plug and Abandonment of Wells
...
View Book →Easy Access: The Reference Handbook for Writers
Available on Internet Archive....
View Book →STRAYER POD- ACCESS CONTROL and IDENTITY MANAGEMENT 3E
Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized d...
View Book →
Techlash
The Future of the Socially Responsible Tech Organization...
View Book →
Version Control with Subversion
Next Generation Open Source Version Control...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Information Infrastructures within European Health Care
Working with the Installed Base...
View Book →
NL ARMS Netherlands Annual Review of Military Studies 2020
Deterrence in the 21st Century—Insights from Theory and Practice...
View Book →
Control Theory Tutorial
Basic Concepts Illustrated by Software Examples...
View Book →
Social Theory of Fear
Terror, Torture, and Death in a Post-Capitalist World...
View Book →Internet of Things and Access Control
This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large...
View Book →
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →The Los Angeles Angels of Anaheim
48 pages : 24 cm...
View Book →
Earth Observation Open Science and Innovation
...
View Book →
Mobilities of the Highly Skilled towards Switzerland
The Role of Intermediaries in Defining "Wanted Immigrants"...
View Book →Handbook of research on teaching
1 online resource (ix, 1539 pages) :...
View Book →Canadian medicare : we need it and we can keep it
1 online resource...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →Peterson's ultimate new SAT tool kit
viii, 597 pages : 27 cm +...
View Book →"Code of Massachusetts regulations, 2008"
Archival snapshot of entire looseleaf Code of Massachusetts Regulations held by the Social Law Library of Massachusetts as of January 2020....
View Book →
Public Health Ethics: Cases Spanning the Globe
...
View Book →
The Illusion of Risk Control
What Does it Take to Live With Uncertainty?...
View Book →
Parents and digital technology : how to raise the connected generation
1 online resource...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Access Control Systems
This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access contro...
View Book →
Measurement and Control of Charged Particle Beams
...
View Book →
Vermin, Victims and Disease
British Debates over Bovine Tuberculosis and Badgers...
View Book →
Risk Communication for the Future
Towards Smart Risk Governance and Safety Management...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Creating Healthy and Sustainable Buildings
An Assessment of Health Risk Factors...
View Book →
Advancing Energy Policy
Lessons on the integration of Social Sciences and Humanities...
View Book →
Advances in Energy System Optimization
Proceedings of the 2nd International Symposium on Energy System Optimization...
View Book →
Surgical Ophthalmic Oncology
A Collaborative Open Access Reference...
View Book →iRODS primer: integrated rule-oriented data system
/type/text...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Renewables for Energy Access and Sustainable Development in East Africa
...
View Book →
Environmental Governance in Latin America
...
View Book →Attribute-Based Access Control
This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information...
View Book →
Stochastics of Environmental and Financial Economics
Centre of Advanced Study, Oslo, Norway, 2014-2015...
View Book →VMware vSphere 4 implementation
xxviii, 659 p. : 23 cm...
View Book →
Advancing the Science of Cancer in Latinos
...
View Book →
Enabling Sustainable Energy Transitions
Practices of legitimation and accountable governance...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Energy in Africa
Challenges and Opportunities...
View Book →
Flexitranstore
Special Session in the 21st International Symposium on High Voltage Engineering (ISH 2019)...
View Book →
Biological Invasions in South Africa
...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 1)
Comparing Access to Welfare Entitlements...
View Book →
Sowing Legume Seeds, Reaping Cash
A Renaissance within Communities in Sub-Saharan Africa...
View Book →Official (ISC)2 Guide to the CISSP CBK
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global co...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
Collective Actions in Europe
A Comparative, Economic and Transsystemic Analysis...
View Book →Role-based Access Control
The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access control methods to RBAC....
View Book →
Indigenous Life Projects and Extractivism
Ethnographies from South America...
View Book →
Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, G
xi, 97 p. : 25 cm...
View Book →Who's buying household furnishings, services and supplies
1 online resource (138 pages)...
View Book →
Linux Appliance Design
A Hands-on Guide to Building Linux Appliances...
View Book →Custom Office and Access 2016 IUPUI
Available on Internet Archive....
View Book →