Warning: file_put_contents(cache/omni_0e8c43d4c3a32054fc652325ca347a34.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
API Traffic Management 101
From Monitoring to Managing and Beyond...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Linux Network Administrator's Guide
Unix-compatible operating system...
View Book →
Access to Online Resources
A Guide for the Modern Librarian...
View Book →
The NGINX Real-Time API Handbook
Our NGINX Real-Time API Handbook equips enterprises to deliver reliable, high-performance APIs...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
RESTful Web Services
Web Services for the Real World...
View Book →
Evolve the Monolith to Microservices with Java and Node
...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
Version Control with Subversion
Next Generation Open Source Version Control...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Handbook of Vascular Biometrics
...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Java Web Scraping Handbook
Learn advanced Web Scraping techniques...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Kafka: The Definitive Guide
Real-Time Data and Stream Processing at Scale...
View Book →