Warning: file_put_contents(cache/omni_7e7c6a8efb0a31d7eb1e35c652c00064.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Responsible Innovation
Business Opportunities and Strategies for Implementation...
View Book →
Model-Based Engineering of Collaborative Embedded Systems
Extensions of the SPES Methodology...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Advancing Culture of Living with Landslides
Volume 1 ISDR-ICL Sendai Partnerships 2015-2025...
View Book →
Cyber-Physical Systems: A Model-Based Approach
...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
Impact of Information Society Research in the Global South
...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Oslo Manual on Select Topics of the Law of Armed Conflict
Rules and Commentary...
View Book →
Foundations of Trusted Autonomy
...
View Book →
Digital Entrepreneurship
Impact on Business and Society...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →
Perspectives on Elderly Crime and Victimization
...
View Book →
Open and Distance Education in Asia, Africa and the Middle East
National Perspectives in a Digital Age...
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →NATO's preparedness for cyberwar
The advent of cyberspace has created a new, unregulated dimension of warfare, which the North Atlantic Treaty Organization (NATO) has striven to manage. This thesis raises the following question: To w...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
The State of Peacebuilding in Africa
Lessons Learned for Policymakers and Practitioners...
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →
China: Surpassing the "Middle Income Trap"
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
NL ARMS Netherlands Annual Review of Military Studies 2020
Deterrence in the 21st Century—Insights from Theory and Practice...
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →
Uses of Technology in Lower Secondary Mathematics Education
A Concise Topical Survey...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
A Journey of Embedded and Cyber-Physical Systems
Essays Dedicated to Peter Marwedel on the Occasion of His 70th Birthday...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Introduction to Systems Biology
Workbook for Flipped-classroom Teaching...
View Book →Summit For Democracy
Summit for Democracy Summary of Proceedings Calling the defense of democracy “the defining challenge of our time,” on December 9-10, 2021, President Biden convened world leaders in the first-e...
View Book →
Managing the Complexity of Critical Infrastructures
A Modelling and Simulation Approach...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Gaming Rhythms
Play and Counterplay from the Situated to the Global...
View Book →
Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems
...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →We Know Who You Are
Inside a militarized Washington, D.C., where National Guard troops secure the streets of the nation’s capital amidst an enforced state of siege, a high-profile tech summit brought together Silicon V...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2018...
View Book →
Loss and Damage from Climate Change
Concepts, Methods and Policy Options...
View Book →
Plant Physiology, Development and Metabolism
...
View Book →
2050 China
Becoming a Great Modern Socialist Country...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
European Guide to Power System Testing
The ERIGrid Holistic Approach for Evaluating Complex Smart Grid Configurations...
View Book →
Introduction to the American Criminal Justice System
SOU-CCJ230...
View Book →
Open Government
Collaboration, Transparency, and Participation in Practice...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
The DARPA Model for Transformative Technologies
Perspectives on the U.S. Defense Advanced Research Projects Agency...
View Book →
Digital Transformation in Semiconductor Manufacturing
Proceedings of the 1st and 2nd European Advances in Digital Transformation Conference, EADTC 2018, Zittau, Germany and EADTC 2019, Milan, Italy...
View Book →
The Piracy Crusade
How the Music Industry's War on Sharing Destroys Markets and Erodes Civil Liberties...
View Book →
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
Intelligent Methods for the Factory of the Future...
View Book →
The Biopsychosocial Model of Health and Disease
New Philosophical and Scientific Developments...
View Book →
The A-Z of the PhD Trajectory
A Practical Guide for a Successful Journey...
View Book →
Blockchain and Crypt Currency
Building a High Quality Marketplace for Crypt Data...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Adaptive Strategies for Water Heritage
Past, Present and Future...
View Book →