Warning: file_put_contents(cache/omni_61a2368891a837e01d04c6cae9d2a8db.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Pentecostalism and Witchcraft
Spiritual Warfare in Africa and Melanesia...
View Book →
The Potato Crop
Its Agricultural, Nutritional and Social Contribution to Humankind...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
PHP: The Right Way
Your guide to PHP best practices, coding standards, and authoritative tutorials...
View Book →
Fading Foundations
Probability and the Regress Problem...
View Book →
White Paper on Joint Replacement
Status of Hip and Knee Arthroplasty Care in Germany...
View Book →
Advancing Human Assessment
The Methodological, Psychological and Policy Contributions of ETS...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Stable Isotopes to Trace Migratory Birds and to Identify Harmful Diseases
An Introductory Guide...
View Book →
White Gold: The Commercialisation of Rice Farming in the Lower Mekong Basin
...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Enhancing Smallholder Farmers' Access to Seed of Improved Legume Varieties Through Multi-stakeh
Learning from the TLIII project Experiences in sub-Saharan Africa and South Asia...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Optimization of Process Flowsheets through Metaheuristic Techniques
...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Managed Software Evolution
...
View Book →
Semiotics in Mathematics Education
...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Environmental Governance of the Baltic Sea
...
View Book →
Heterogeneity, High Performance Computing, Self-Organization and the Cloud
...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Digital Business Models
Concepts, Models, and the Alphabet Case Study...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
The Climate-Smart Agriculture Papers
Investigating the Business of a Productive, Resilient and Low Emission Future...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Asian Century… on a Knife-edge
A 360 Degree Analysis of Asia's Recent Economic Development...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Migration, Gender and Social Justice
Perspectives on Human Insecurity...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Real-time Linked Dataspaces
Enabling Data Ecosystems for Intelligent Systems...
View Book →
Linked Democracy
Foundations, Tools, and Applications...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Evaluating Climate Change Action for Sustainable Development
...
View Book →
Asylum Determination in Europe
Ethnographic Perspectives...
View Book →
Semantic Systems. The Power of AI and Knowledge Graphs
15th International Conference, SEMANTiCS 2019, Karlsruhe, Germany, September 9–12, 2019, Proceedings...
View Book →
Solving the Powertrain Puzzle
10th Schaeffler Symposium April 3/4, 2014...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →
The Bluefin Tuna Fishery in the Bay of Biscay
Its Relationship with the Crisis of Catches of Large Specimens in the East Atlantic Fisheries from the 1960s...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
The Missing Link
An Introduction to Web Development and Programming...
View Book →
Sustainable Supply Chains
A Research-Based Textbook on Operations and Strategy...
View Book →
Synchronized Factories
Latin America and the Caribbean in the Era of Global Value Chains...
View Book →
Regulatory Pathways For Smart Grid Development in China
...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Next Generation Supply Chains
A Roadmap for Research and Innovation...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →