Warning: file_put_contents(cache/omni_1f658479c73b1e5c9968302451311fe9.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Bats in the Anthropocene: Conservation of Bats in a Changing World
...
View Book →
A Treatise on Systems (volume 1)
Analytical Descriptions of Human-Information Networks...
View Book →
Communicating, Networking: Interacting
The International Year of Global Understanding - IYGU...
View Book →Executive Education Profile and FAQ
Executive Education Profile and FAQ Frequently Asked Questions & Answers about Executive Education Who? Question: Who offers best-in-class executive education? Answer: The Executive Education Institut...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →
Introduction to Digital Systems Design
...
View Book →
Social Media Mining
An Introduction...
View Book →The Journal of Experimental Medicine
No description available....
View Book →
Vote Buying in Indonesia
The Mechanics of Electoral Bribery...
View Book →
Finding the Limits of the Limes
Modelling Demography, Economy and Transport on the Edge of the Roman Empire...
View Book →Deep Talent
What's the secret to finding the right person for the job? And how do you ensure your existing employees thrive and flourish in the workplace? Deep Talent answers these questions and more, as it demon...
View Book →
P5 eHealth: An Agenda for the Health Technologies of the Future
...
View Book →CIA Reading Room cia-rdp90-00965r000605090030-2: WHITE HOUSE CONTRA PLAN MAY PREDATE AID CUTOFF
Declassified in Part - Sanitized Copy Approved for Release 2013/02/21 WASHINGTON POST 22 March 1987 White House Contra Plan May Predate Aid Cutoff Theory Becomes Foundation of Hill Probes the Boland A...
View Book →
Autistic Community and the Neurodiversity Movement
Stories from the Frontline...
View Book →
Opening Science
The Evolving Guide on How the Internet is Changing Research, Collaboration and Scholarly Publishing...
View Book →
Python Machine Learning Projects
...
View Book →CIA Reading Room cia-rdp82-00177r000300540001-6: CODE OF WARTIME PRACTICES FOR AMERICAN BROADCASTERS
Declassified and Approved For Release 2013/12/04: CIA-RDP82-00177R000300540001-6 UNITED STATES GOVERNMENT OFFICE OF CENSORSHIP WASHINGTON 25, D. C. CODE OF WARTIME PRACTICES For American Broadcasters ...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Theories in and of Mathematics Education
Theory Strands in German Speaking Countries...
View Book →
Linux Network Administrator's Guide
Unix-compatible operating system...
View Book →
Beyond the Limits to Growth
New Ideas for Sustainability from Japan...
View Book →
Global History with Chinese Characteristics
Autocratic States along the Silk Road in the Decline of the Spanish and Qing Empires 1680-1796...
View Book →
Introduction to the Modeling and Analysis of Complex Systems
...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Surveying Human Vulnerabilities across the Life Course
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Laboratory Outlines for General Botany
No description available....
View Book →
AI based Robot Safe Learning and Control
...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
The Economy as a Complex Spatial System
Macro, Meso and Micro Perspectives...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Global Health Collaboration
Challenges and Lessons...
View Book →
Connectionist Representations of Tonal Music
Discovering Musical Patterns by Interpreting Artificial Neural Networks...
View Book →The Suite Spot
A fascinating guide to surviving and thriving in the corporate C-Suite The Suite Spot is not a single-idea book but rather a compendium of wisdom that has been sourced from hundreds of leading executi...
View Book →
The Internet Myth
From the Internet Imaginary to Network Ideologies...
View Book →CIA Reading Room cia-rdp99-01448r000301290017-6: CAN HE RECOVER?
Declassified in Part - Sanitized Copy Approved for Release 2013/05/21 : CIA-RDP99-01448R000301290017-6 ON PAGE TIME Mn.rCh. 1987 Can He Recover? After the Tower report's indictment, Reagan calls in an...
View Book →
Micro-, Meso- and Macro-Connectomics of the Brain
...
View Book →
Paths
Why is life filled with so many detours?...
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Global History and New Polycentric Approaches
Europe, Asia and the Americas in a World Network System...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
Proceedings of the International Conference on Social Modeling and Simulation, plus Econophysics Col
...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Software Above the Level of a Single Device
The Implications...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Manifesto of the New Economy
Institutions and Business Models of the Digital Society...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Communicative Figurations
Transforming Communications in Times of Deep Mediatization...
View Book →
The GEO Handbook on Biodiversity Observation Networks
...
View Book →
Information-Consciousness-Reality
How a New Understanding of the Universe Can Help Answer Age-Old Questions of Existence...
View Book →
3D Recording and Interpretation for Maritime Archaeology
...
View Book →
What's the Future of Work?
Exploring the Economic Shift Led by Software and Connectedness...
View Book →
Micro-, Meso- and Macro-Dynamics of the Brain
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →American Journal of Veterinary Medicine
No description available....
View Book →
Beej's Guide to Network Programming
Using Internet Sockets...
View Book →An Introduction to the Study of the Protozoa
No description available....
View Book →
The Condition of Digitality
A Post-Modern Marxism for the Practice of Digital Life...
View Book →
Africa-Europe Research and Innovation Cooperation
Global Challenges, Bi-regional Responses...
View Book →
Planar Maps, Random Walks and Circle Packing
École d'Été de Probabilités de Saint-Flour XLVIII - 2018...
View Book →
Handbook of Life Course Health Development
...
View Book →
Sequence Analysis and Related Approaches
Innovative Methods and Applications...
View Book →
Computational Conflict Research
...
View Book →The Causes and Course of Organic Evolution
No description available....
View Book →CIA Reading Room cia-rdp99-01448r000301290018-5: CAN HE RECOVER?
Declassified in Part - Sanitized Copy Approved for Release 2013/05/21 : CIA-RDP99-01448R000301290018-5 E AP - ON PAGE TIME Q March 1 R 7 IES Can He Recover? After the Tower report's indictment. Reagan...
View Book →
Embedded Firmware Solutions
Development Best Practices for the Internet of Things...
View Book →Frontier Computing
This book gathers the proceedings of the 11th International Conference on Frontier Computing, held in Seoul, on July 13–17, 2021, and provides comprehensive coverage of the latest advances and trend...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
A Dictionary of Dental Science
No description available....
View Book →Analysis of Words Pertaining to Anatomy, Physiology, Diseases and Surgery for Students and Physician
No description available....
View Book →
Managing the Complexity of Critical Infrastructures
A Modelling and Simulation Approach...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →CIA Reading Room cia-rdp99-01448r000301290007-7: WHITE HOUSE CONTRA PLAN MAY PREDATE AID CUTOFF
Declassified in Part - Sanitized Copy Approved for Release 2013/05/21 : CIA-RDP99-01448R000301290007-7 14 WASHINCTON POST 22 March 1987 White House Contra Plan May Predate Aid Cutoff Theory Becomes Fo...
View Book →
Chromoanagenesis
This extensive volume explores the phenomena of chaotic genomic rearrangements, known as chromoanagenesis, their formation mechanisms, and the state-of-the-art techniques used to detect them. The book...
View Book →Archives of Neurology and Psychopathology
No description available....
View Book →A Text-book of Histology
No description available....
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Introduction to Systems Biology
Workbook for Flipped-classroom Teaching...
View Book →
The Hackable City
Digital Media and Collaborative City-Making in the Network Society...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →Genetics in Relation to Agriculture
Fundamentals; Scope, methods, and applications of genetics; Phisical basis; Development; Reproduction; Heredity; Mendelian method; Segregation; Mendelian conceptions; Sex linkage or heterosomal inheri...
View Book →
The Big Book of Machine Learning Use Cases
Your complete how-to guide to putting ML to work - plus code samples and notebooks...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2018...
View Book →
CIA Reading Room 00355733: MAJOR DEVELOPMENTS IN THE SOVBLOC CYBERNETICS PROGRAMS IN 1965
Scientific and Technical Intelligence Report Approved for Release: 2018/01/31 C00355733 N9 6 Major Developments in the SovBloc Cybernetics Programs in 1965 IPS FIU copy DO N01 REMOVE 25 OCT 1966 OSI...
View Book →
Sensor Technologies
Healthcare, Wellness, and Environmental Applications...
View Book →
New Frontiers in Social Innovation Research
...
View Book →