Warning: file_put_contents(cache/omni_b1619a1935db2507d228db497cd1af81.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Build Your Own First-Person Shooter in Unity
...
View Book →
Cybersecurity Ops with Bash
First published in 2019...
View Book →
Plant Physiology, Development and Metabolism
...
View Book →CIA Reading Room cia-rdp79b00873a001400010009-0: STATUS REPORT AUGUST 1969
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP79B00873A001400010009-0 *Mb I to CO Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP79B00873...
View Book →A transient response analysis of a multi-loop computation servomechanism in the SUBROC MK 75, Attack
Thesis (MS)--U.S. Naval Postgraduate School, 1960...
View Book →LCSH Section A
A (Locomotive) (Not Subd Geog) BT Locomotives A + A Building, Yale (New Haven, Conn.) USE Yale Art and Architecture Building (New Haven, Conn.) A-1 (Attack plane) USE Skyraider (Attack plane) A-3...
View Book →
97 Things Every SRE Should Know
Collective Wisdom from the Experts...
View Book →
DTIC ADA059770: A Dynamic Analysis of the Medium Tank Battalion Conducting Hasty Offensive Operation
An analysis of alternate offensive tactics was conducted using the computer-assisted manual war game BATTLE (Battalion Analyzer and Tactical Trainer for Local Engagements). The purpose of the study wa...
View Book →
One Hundred Years of Chemical Warfare: Research, Deployment, Consequences
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →Automotive Security Analyzer for Exploitability Risks
First published in 2024...
View Book →
Computational Conflict Research
...
View Book →
Large-Scale Cognitive Assessment
Analyzing PIAAC Data...
View Book →
Android Application Development for the Intel Platform
...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
CIA Reading Room cia-rdp91b00390r000200200023-1: POLYGRAPH PROTECTION ACT OF 1987
? Declassified in Part - Sanitized Copy Approved for Release 2013/01/17 : WO . CIA-RDP91B00390R000200200023-1SLIP 3/ WIT TO: (Name, office symbol, room number, Initials Date building, Agency/7st) 1. S...
View Book →
Copyright title pages, 1856
Collection of title pages that were deposited by authors and publishers as evidence of the intention to publish. Some title pages document works that were substantially altered before publication or w...
View Book →
Campbell biology
First published in 2015...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →CIA Reading Room cia-rdp80t00246a068400030001-9: ENGLISH TRANSLATION OF HERALD OF ANTIAIRCRAFT DEFEN
~// 50X1-HUM Declassified in Part - Sanitized Copy Approved for Release 2013/03/19: CIA-RDP80T00246A068400030001-9 CENTRAL INTELLIGENCE A~NCY C-O-N=F-I-D-E-N-T-I-A-L NO FOREIGN DISS~M COUNTRY USSR SUB...
View Book →
Open Workbook of Cryptology
A project-based introduction to crypto in Python...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Copyright title pages, 1866
Collection of title pages that were deposited by authors and publishers as evidence of the intention to publish. Some title pages document works that were substantially altered before publication or w...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →LCSH A
A (Locomotive) (Not Subd Geog) BT Locomotives A (The letter) BT Alphabet A + A Building, Yale (New Haven, Conn.) USE Yale Art and Architecture Building (New Haven, Conn.) A-1 (Attack plane) USE S...
View Book →
Niche Wars
Australia in Afghanistan and Iraq, 2001-2014...
View Book →Chess Tournament Scoring Sheets
First published in 2019...
View Book →Depression and How to Analyze People
First published in 2016...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →CIA Reading Room cia-rdp91-00403r000100960018-2: FR:SHVARTS N TO:SILVO I E
AND APPLICATI"OS-P-ECTS OF MICROWAVERECEIVING SYSTEMS WITH SEMICONDUCTOR DEVICESOU0 COPYRIGHT INFO REFER OTHERS TO FSTCARM/FSTCYHT-372-80SHVARTS, NAUM ZINOV'YEVICH 000000259388I/LINEYNYYE TRANZISTORNI...
View Book →
Cloud Design Patterns
Prescriptive Architecture Guidance for Cloud Applications...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →CIA Reading Room cia-rdp91-00403r000200460022-1: FR:FROLOVSKI N M TO:KUROCHKIN P A
~'~Ogneupory, Vol 12, No 5-6, May-June 1971, pp 1-61.Full tr by Consultants Bureau, pp 275-411.Available Ly SerialsJan 72'&T~'7) 'L 3~Ogneupory, Vol 12, No 3-4) March-April 1971, pp 1.62.Full tr by Co...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Understanding Computers Today and Tomorrow
First published in 2003...
View Book →
Cartesian meditations
First published in 1960...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Oslo Manual on Select Topics of the Law of Armed Conflict
Rules and Commentary...
View Book →NASA Technical Reports Server (NTRS) 19970026005: Design of An Improved Miniature Ion Neutral Mass S
The ion optics of NASA's Ion Neutral Mass Spectrometer (INMS) sensor was simulated with three dimensional models of the open source, the quadrupole deflector, the exit lens system and the quadrupole m...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →2025 08 08 Spoofed Kentucky Attorney General Evidence Spark Point Bethesda Maryland Not Proof Proint
This archive shows an email I received from the "Attorney General" in Kentucky, that turned out actually to be a spoofed email that went through SparkPoint in Bethesda Maryland rather than ProofPoint ...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →DTIC ADA210759: Network Analyzer for Nonstatic Jamming
The survivability of a packet radio network (PRNET) under jamming attack is an important issue. The goal of this research is to develop the analytical methods for understanding as well as predicting t...
View Book →
Overcoming Anxiety for Dummies
First published in 2002...
View Book →
NASA Technical Reports Server (NTRS) 20120016262: Rugged, Portable, Real-Time Optical Gaseous Analyz
Hydrogen fluoride (HF) is a primary evolved combustion product of fluorinated and perfluorinated hydrocarbons. HF is produced during combustion by the presence of impurities and hydrogen- containing p...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →CIA Reading Room cia-rdp91-00929r000100460034-4: FR:VASILYEVA T.T. TO:VASINA T.V.
aynthoolo of td-AmiwCaltolylle Acids Prm or.,4., u/-Totraeblorealkamm, by A. N. Ikemeyanor,It- 1h. rral4linao L. I. Zakhu kin, E. 1.pp.RVMWj Per, 2hur Obahch Mdm, Vol VMg ft9; 1957s PP 2418-2422.Sal -...
View Book →Cognitive Behavioural Therapy to Improve Your Life
First published in 2021...
View Book →CIA Reading Room cia-rdp91-00403r000100900011-5: FR:POSRAZHANSKAYA S G TO:MALIATSKII S M
PODRAZHANSKAYA, S. G.//TRUDY MOLODYKH UCHENYKH VSESOYUZlNOGO NAL)CHNO-ISSLEDOVATEL'SKOGOTOEL HAUCHNO-T..//0010011170.V----,NO004. PP 0088-0091EKWNICKSKOI IWOWTSII IONTIJTHE WEIGHT OF LIVER OF BALTIC C...
View Book →Development of a portable spectroscopic sensor to measure wood and fibre properties in standing moun
iv, 33 p. :...
View Book →DTIC ADA107315: Diagnostic and Condition Monitoring System Assessment for Army Helicopter Modular Tu
Needs for and means of improving D&CM and troubleshooting to modules and LRUs for T700-GE-700 engine in Army environment were studied. Recommendations are: (1) Do not modify existing METS for modular ...
View Book →
Toxicological effects of fine particulate matter derived from the destruction of the World Trade Cen
"EPA 600/R-02/028." "December 2002." Includes bibliographical references (p. 50-53). Also available online. Also available in digital form....
View Book →
Modern Web Development on the JAMstack
Modern Techniques for Ultra Fast Sites and Web Applications...
View Book →
NL ARMS Netherlands Annual Review of Military Studies 2020
Deterrence in the 21st Century—Insights from Theory and Practice...
View Book →
Social Theory of Fear
Terror, Torture, and Death in a Post-Capitalist World...
View Book →
The NGINX Real-Time API Handbook
Our NGINX Real-Time API Handbook equips enterprises to deliver reliable, high-performance APIs...
View Book →
Historical Background of Wang Yang-ming's Philosophy of Mind
From the Perspective of his Life Story...
View Book →Cyber security vulnerabilities during long term evolution power-saving discontinuous reception proto
Long Term Evolution (LTE) is a wireless access communications network that consists of base stations called eNodeBs (eNBs), which allow connectivity between the mobile device or user equipment (UE) an...
View Book →
Copyright title pages, 1863
Collection of title pages that were deposited by authors and publishers as evidence of the intention to publish. Some title pages document works that were substantially altered before publication or w...
View Book →DTIC ADA449252: Preventing Misuse of Operator Privilege (PMOP)
This document is the final report for PMOP, a project of the DARPA/IPTO Self-Regenerative Systems (SRS) program performed by MIT and Teknowledge. Insiders are distinguished by the fact that they have ...
View Book →CIA Reading Room cia-rdp84-00581r000100370040-3: AUTHORS FR: MISKIDZH YAN, S.P. TO: MITZ, S.
Stliidy of Non-aqueoua Binary L*J~qiiW Byateras bye.m.f. Mnasure-ments. 1. Acc~via Acid.-AmineSyst3m, by F. N. Kozlenku., S. 11:1.4 pp.RUSSIM., per, Zhur Fiz hChim., Vol rMV',, Lo 211960: PP 349-355.C...
View Book →DTIC ADA045489: Study to Identify Stress Corrosion Prone Parts on the TA-7C Aircraft.
This program was aimed at determining which parts in the TA-7C aircraft are prone to stress corrosion cracking, and then establish corrective measures encompassing: (1) inpsection criteria including N...
View Book →State Space Reduction in the Maude-NRL Protocol Analyzer
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational propertie...
View Book →
"The Holy Scriptures" analyzed
First published in 1841...
View Book →
Copyright title pages, 1862
Collection of title pages that were deposited by authors and publishers as evidence of the intention to publish. Some title pages document works that were substantially altered before publication or w...
View Book →
An Enhanced Graphical User Interface for Analyzing the Vulnerability of Electrical Power Systems to
First published in 2003...
View Book →
Copyright title pages, 1857
Collection of title pages that were deposited by authors and publishers as evidence of the intention to publish. Some title pages document works that were substantially altered before publication or w...
View Book →
WSES Handbook of Mass Casualties Incidents Management
...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →