Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Authentication

Warning: file_put_contents(cache/omni_fe104ebf0a207348dacf67c57fcc6aab.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Blazor for ASP NET Web Forms Developers
dBooks

Blazor for ASP NET Web Forms Developers

By Daniel Roth, Jeff Fritz, Taylor Southwick

...

View Book →
Cover of Authentic Happiness
Open Library

Authentic Happiness

By Martin Elias Pete Seligman

First published in 2002...

View Book →
Cover of API Traffic Management 101
dBooks

API Traffic Management 101

By Mike Amundsen

From Monitoring to Managing and Beyond...

View Book →
Cover of Authentic childhood
Open Library

Authentic childhood

By Susan Fraser, Susan Fraser, Carol Gestwicki

First published in 2000...

View Book →
Cover of Migrating SQL Server Databases to Azure
dBooks

Migrating SQL Server Databases to Azure

By Carl Rabeler

Microsoft Azure Essentials...

View Book →
Cover of The Authentic Tarot
Open Library

The Authentic Tarot

By Thomas Saunders

First published in 2007...

View Book →
Cover of Webapps in Go
dBooks

Webapps in Go

By Suraj Patil

the anti textbook...

View Book →
Cover of Microsoft Platform and Tools for Mobile App Development
dBooks

Microsoft Platform and Tools for Mobile App Development

By Cesar de la Torre, Simon Calvert

...

View Book →
Cover of DTIC ADA526770: Radionuclide Operational Research & Development
Internet Archive

DTIC ADA526770: Radionuclide Operational Research & Development

By Defense Technical Information Center

The development team responsible for creation of the automated aerosol and xenon sampling systems is continuing to solve problems related to the operation of automated systems for nuclear explosion mo...

View Book →
Cover of Istio Succinctly
dBooks

Istio Succinctly

By Rahul Rai, Tarun Pabbi

...

View Book →
Cover of TS 133 221 - V7.1.0 - Digital cellular telecommunications system (Phase 2+); Universal Mobile Teleco
Internet Archive

TS 133 221 - V7.1.0 - Digital cellular telecommunications system (Phase 2+); Universal Mobile Teleco

By European Telecommunications Standards Institute

Available on Internet Archive....

View Book →
Cover of React Native Notes for Professionals
dBooks

React Native Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Spiritual partnership
Open Library

Spiritual partnership

By Gary Zukav

First published in 2010...

View Book →
Cover of Two phase secure data collection technique for wireless sensor networks
Internet Archive

Two phase secure data collection technique for wireless sensor networks

By Gousia Thahniyath, Priti Mishra, Sundar Raj Moorthy

Wireless sensor networks (WSNs) are the sensors that are dispersed in a different location that can sense the accumulated data in real-time and send it to the central location for the process of data ...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of Computer Aided Verification
dBooks

Computer Aided Verification

By Isil Dillig, Serdar Tasiran

31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...

View Book →
Cover of MongoDB Notes for Professionals
dBooks

MongoDB Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Flexible Session Management in a Distributed Environment
Internet Archive

Flexible Session Management in a Distributed Environment

By Zach Miller, Dan Bradley, Todd Tannenbaum, Igor Sfiligoi

Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this...

View Book →
Cover of PHP Notes for Professionals
dBooks

PHP Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of ORION: ON-DEMAND REGISTRATION AND REVOCATION IN ON-THE-MOVE NETWORKS
Internet Archive

ORION: ON-DEMAND REGISTRATION AND REVOCATION IN ON-THE-MOVE NETWORKS

By Chang, Jack J.

The management complexity, hardware limitations, and lack of scalability in the Marine Corps' traditional networking infrastructure creates an opportunity gap that can be filled by software-defined ne...

View Book →
Cover of Método Authenticity
Open Library

Método Authenticity

By Hugo Hernández

First published in 2024...

View Book →
Cover of C# Notes for Professionals
dBooks

C# Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Kafka: The Definitive Guide
dBooks

Kafka: The Definitive Guide

By Gwen Shapira, Todd Palino, Rajini Sivaram, Krit Petty

Real-Time Data and Stream Processing at Scale...

View Book →
Cover of The dairyman's daughter
Open Library

The dairyman's daughter

By Legh Richmond

First published in 1800...

View Book →
Cover of Apache HTTP Server Cookbook
dBooks

Apache HTTP Server Cookbook

By JCGs

Hot Recipes for the Apache Web Server...

View Book →
Cover of The zealous intruders : the western rediscovery of Palestine
Internet Archive

The zealous intruders : the western rediscovery of Palestine

By Shepherd, Naomi

282 pages, 8 unnumbered pages of plates : 24 cm...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of A distributed password scheme for network operating systems
Internet Archive

A distributed password scheme for network operating systems

By Roth, Christopher

Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations o...

View Book →
Cover of Authentic art deco jewelry designs
Open Library

Authentic art deco jewelry designs

By Franco Deboni

First published in 1982...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Learning Node.js
dBooks

Learning Node.js

By Stack Overflow Community

...

View Book →
Cover of AES Galois Counter Mode for the Secure Shell Transport Layer Protocol
Internet Archive

AES Galois Counter Mode for the Secure Shell Transport Layer Protocol

By K. Igoe, J. Solinas

Secure shell (SSH) is a secure remote-login protocol. SSH provides for algorithms that provide authentication, key agreement, confidentiality, and data-integrity services. The purpose of this document...

View Book →
Cover of 05. Experimental Strategies Of Applying Strong Authentication Using Biometric Finger Print Matching
Internet Archive

05. Experimental Strategies Of Applying Strong Authentication Using Biometric Finger Print Matching

By Unknown Author

The main goal of this approach is to enhance the protection characteristics of identity management and security domains by improving authentication ideas using the Biometric-Fingerprint Matching Syste...

View Book →
Cover of Authentic Beauty
Open Library

Authentic Beauty

By Leslie Ludy

First published in 2003...

View Book →
Cover of Configuring Microsoft SharePoint Hybrid Capabilities
dBooks

Configuring Microsoft SharePoint Hybrid Capabilities

By Jeremy Taylor, Neil Hodgkinson, Manas Biswas

...

View Book →
Cover of Graphical Password Management System Project Report ( 1)
Internet Archive

Graphical Password Management System Project Report ( 1)

By Kamal Acharya

The term “graphical password” refers to a user authentication method where pictorial information is used for validation, instead of an alphanumerical password. This method poses many challenges, s...

View Book →
Cover of Civilisation ou barbarie
Open Library

Civilisation ou barbarie

By Cheikh Anta Diop, Yaa-Lengi Meema Ngemi

First published in 1981...

View Book →
Cover of Learning React Native
dBooks

Learning React Native

By Stack Overflow Community

...

View Book →
Cover of The authenticity project
Open Library

The authenticity project

By Clare Pooley

First published in 2020...

View Book →
Cover of All marketers are liars
Open Library

All marketers are liars

By Seth Godin

First published in 2005...

View Book →
Cover of Learning MongoDB
dBooks

Learning MongoDB

By Stack Overflow Community

...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of A Step By Step Guide To Certificate Attestation For UAE, Kuwait, Saudi Arabia, And Qatar.docx
Internet Archive

A Step By Step Guide To Certificate Attestation For UAE, Kuwait, Saudi Arabia, And Qatar.docx

By adarsh

Certificate attestation is a crucial process for individuals intending to work or study in foreign countries like the UAE, Kuwait, Saudi Arabia, and Qatar. This authentication procedure ensures the va...

View Book →
Cover of Svelte Succinctly
dBooks

Svelte Succinctly

By Ed Freitas

...

View Book →
Cover of Power BI Succinctly
dBooks

Power BI Succinctly

By Pierstefano Tucci

...

View Book →
Cover of The NGINX Real-Time API Handbook
dBooks

The NGINX Real-Time API Handbook

By Karthik Krishnaswamy, Alessandro Fael García

Our NGINX Real-Time API Handbook equips enterprises to deliver reliable, high-performance APIs...

View Book →
Cover of Handbook of Vascular Biometrics
dBooks

Handbook of Vascular Biometrics

By Andreas Uhl, Christoph Busch, Sébastien Marcel, Raymond Vel

...

View Book →
Cover of 305 authentic Art Nouveau jewelry designs
Open Library

305 authentic Art Nouveau jewelry designs

By Maurice Dufrène

First published in 1985...

View Book →
Cover of The Power of Vulnerability
Open Library

The Power of Vulnerability

By Brené Brown

First published in 2012...

View Book →
Cover of Evolve the Monolith to Microservices with Java and Node
dBooks

Evolve the Monolith to Microservices with Java and Node

By Sandro De Santis, Luis Florez, Duy V Nguyen, Eduardo Rosa

...

View Book →
Cover of CKE Volume 2 Issue 1 Pages 25 32
Internet Archive

CKE Volume 2 Issue 1 Pages 25 32

By Unknown Author

Since the invention of electricity, global power grids have been at the forefront of technological advances. The antiquated infrastructure of power system which provides power to the city's homes, fac...

View Book →
Cover of Learning Ruby on Rails
dBooks

Learning Ruby on Rails

By Stack Overflow Community

...

View Book →
Cover of Authentic Bhutanese cookbook
Open Library

Authentic Bhutanese cookbook

By Ugyen Wangchuk Punap

First published in 2010...

View Book →
Cover of Platform Embedded Security Technology Revealed
dBooks

Platform Embedded Security Technology Revealed

By Xiaoyu Ruan

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...

View Book →
Cover of RESTful Web Services
dBooks

RESTful Web Services

By Leonard Richardson, Sam Ruby

Web Services for the Real World...

View Book →
Cover of How To Code in React.js
dBooks

How To Code in React.js

By Joe Morgan

...

View Book →
Cover of Land of plenty
Open Library

Land of plenty

By Fuchsia Dunlop

First published in 2003...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Spring Framework Notes for Professionals
dBooks

Spring Framework Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Enterprise Cloud Strategy
dBooks

Enterprise Cloud Strategy

By Barry Briggs, Eduardo Kassner

...

View Book →
Cover of CakePHP Cookbook Documentation
dBooks

CakePHP Cookbook Documentation

By Cake Software Foundation

Release 4.x...

View Book →
Cover of Build your own Ruby on Rails web applications
Internet Archive

Build your own Ruby on Rails web applications

By Lenz, Patrick, 1978-

xvi, 425 pages : 23 cm...

View Book →
Cover of Laravel 5 Official Documentation
dBooks

Laravel 5 Official Documentation

By Gary Blankenship

...

View Book →
Cover of Authentic recipes from Japan
Open Library

Authentic recipes from Japan

By Takayuki Kosaki, Walter Wagner

First published in 2005...

View Book →
Cover of Tamil Nadu Gazette, 2022-08-03, Ordinary, Part III, Number 31
Internet Archive

Tamil Nadu Gazette, 2022-08-03, Ordinary, Part III, Number 31

By Government of Tamil Nadu

Gazette Type: Ordinary Gazette Number: 31 Date: 2022-08-03 Subject: Statutory Notifications and Orders issued by Heads of Departments Part Number: Part III Gazette Source: URL Notifications: DIRECTORA...

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard
Internet Archive

Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard

By Rupaliben V. Chothe, Sunita P. Ugale, Dinesh M. Chandwadkar,

The ability of advanced encryption standard (AES) algorithm to protect information systems has given cryptography a new dimension. Recent encryption approaches to enhance randomness include the use of...

View Book →
Cover of Role of multibiometric systems in analysis of biological data
Internet Archive

Role of multibiometric systems in analysis of biological data

By Indian Journal of Engineering

Biometric authentication refers to technologies that measure and analyzes human physical and behavioral characteristics for authentication purposes. Examples ofphysical characteristics include fingerp...

View Book →
Cover of Ruby on Rails Notes for Professionals
dBooks

Ruby on Rails Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of The ethics of authenticity
Open Library

The ethics of authenticity

By Charles Taylor

First published in 1991...

View Book →
Cover of Learning PHP
dBooks

Learning PHP

By Stack Overflow Community

...

View Book →
Cover of Access to Online Resources
dBooks

Access to Online Resources

By Kristina Botyriute

A Guide for the Modern Librarian...

View Book →
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of Version Control with Subversion
dBooks

Version Control with Subversion

By C. Michael Pilato, Ben Collins-Sussman, Brian W. Fitzpatrick

Next Generation Open Source Version Control...

View Book →
Cover of New Blind Muti-signature Schemes based on ECDLP
Internet Archive

New Blind Muti-signature Schemes based on ECDLP

By International Journal of Electrical and Computer Engineering

In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most import...

View Book →
Cover of Saveur Cooks Authentic Italian
Open Library

Saveur Cooks Authentic Italian

By Unknown Author

First published in 2001...

View Book →
Cover of Network Virtualization and Cloud Computing
dBooks

Network Virtualization and Cloud Computing

By Nader Benmessaoud, Uma Mudigonda

Microsoft System Center...

View Book →
Cover of DTIC ADA484162: A Formal Analysis of Some Properties of Kerberos 5 Using MSR
Internet Archive

DTIC ADA484162: A Formal Analysis of Some Properties of Kerberos 5 Using MSR

By Defense Technical Information Center

We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the intricate structure of t...

View Book →
Cover of Learning C#
dBooks

Learning C#

By Stack Overflow Community

...

View Book →
Cover of Authentically, Uniquely You
Open Library

Authentically, Uniquely You

By Joyce Meyer

First published in 2021...

View Book →
Cover of RFC3118: Authentication for DHCP Messages
Internet Archive

RFC3118: Authentication for DHCP Messages

By R. Droms, Ed., W. Arbaugh, Ed.

This document defines a new Dynamic Host Configuration Protocol (DHCP) option through which authorization tickets can be easily generated and newly attached hosts with proper authorization can be auto...

View Book →
Cover of Clayton County in Georgia Election Updates and Bulletins Regarding Voter Roll Maintenance
Internet Archive

Clayton County in Georgia Election Updates and Bulletins Regarding Voter Roll Maintenance

By Clayton County Election - Georgia

These election bulletins discuss two-factor authentication, felony disenfranchisement, and Crosscheck. These documents are from November 2016 to June 2019. (GA-DOUGHERTY-19-0670-A)...

View Book →
Cover of Crypto 101
dBooks

Crypto 101

By Laurens Van Houtven

...

View Book →
Cover of Node.js Notes for Professionals
dBooks

Node.js Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Azure Automation
dBooks

Azure Automation

By Michael McKeown

Microsoft Azure Essentials...

View Book →
Cover of Azure Maps Using Blazor Succinctly
dBooks

Azure Maps Using Blazor Succinctly

By Michael Washington

...

View Book →
Cover of Enabling Things to Talk
dBooks

Enabling Things to Talk

By Alessandro Bassi, Martin Bauer, Martin Fiedler, Thorsten Kra

Designing IoT solutions with the IoT Architectural Reference Model...

View Book →