Warning: file_put_contents(cache/omni_378facd8345170a9941fdb6ae90fc245.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Advanced Persistent Security
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such re...
View Book →
Asylum Determination in Europe
Ethnographic Perspectives...
View Book →CIA Reading Room 06052389: AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT
i mar erif lg. tviic 2. AMENOM 005 # Approved for Release: 2019/04/02 C06052389 tirictAssfrIED AMeNOMENT OF SOLICITATION/MODIFICATION OF CONTRACT NTibloOIFIGAVON Cdod Wet Ifiptort, DC 20 EFFEetive trA...
View Book →
Food Anxiety in Globalising Vietnam
...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
Innovation, Economic Development, and Intellectual Property in India and China
Comparing Six Economic Sectors...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →Boundary and Security Bulletin
No description available....
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →
Reintroducing React
Modern React with Every React Update Since v16 Demystified (includes advanced hooks)...
View Book →China’s Influence and the Center-periphery Tug of War in Hong Kong, Taiwan and Indo-Pacific
Bringing together a team of cutting-edge researchers based in Hong Kong, Taiwan and Indo-Pacific countries, this book focuses on the tug of war between China’s influence and forces of resistance in ...
View Book →
Kafka: The Definitive Guide
Real-Time Data and Stream Processing at Scale...
View Book →Cna certified nursing assistant exam prep 2025–2026
CNA Certified Nursing Assistant Exam Prep 2025–2026 by Elliot Spencer is your clear, confident path to CNA certification success. This all-in-one, expertly crafted study guide was written with one g...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
The Future of Election Administration
Cases and Conversations...
View Book →Chinese National Security
This volume represents the fruits of a conference held at the U.S. Army War College in September 2005 on the theme of "Chinese Crisis Management." One of the major debates that emerged among participa...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
The Enterprise Path to Service Mesh Architectures
Decoupling at Layer 5...
View Book →
A Treatise on Systems (volume 1)
Analytical Descriptions of Human-Information Networks...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
The Climate-Smart Agriculture Papers
Investigating the Business of a Productive, Resilient and Low Emission Future...
View Book →
The Working Press of the Nation
No description available....
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Societal Implications of Community-Oriented Policing and Technology
...
View Book →
WSES Handbook of Mass Casualties Incidents Management
...
View Book →ECCWS 2019 18th European Conference on Cyber Warfare and Security
No description available....
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →
NGINX Unit Cookbook
Recipes for Using a Versatile Open Source Server...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →South Africa Foundation News
No description available....
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Africa-Europe Research and Innovation Cooperation
Global Challenges, Bi-regional Responses...
View Book →
Agile Processes in Software Engineering and Extreme Programming – Workshops
XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...
View Book →
Cloud Native DevOps with Kubernetes
Building, Deploying, and Scaling Modern Applications in the Cloud...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Transforming Food Systems for a Rising India
...
View Book →
Regulatory Pathways For Smart Grid Development in China
...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Managed Software Evolution
...
View Book →
The Potato Crop
Its Agricultural, Nutritional and Social Contribution to Humankind...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Handbook of Vascular Biometrics
...
View Book →
Foundations of Trusted Autonomy
...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
97 Things Every SRE Should Know
Collective Wisdom from the Experts...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Introducing Vigilant Audiences
...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →Current and Future Trends of Agrifood
This volume presents the proceedings of ICoWEFS 2025, featuring a curated selection of Agrifood‐focused research papers that highlight current developments and emerging trends across Agriculture, Fo...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →
Migration, Gender and Social Justice
Perspectives on Human Insecurity...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →