Warning: file_put_contents(cache/omni_8d516f426dd17bd76780249cdedb1189.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The Condition of Digitality
A Post-Modern Marxism for the Practice of Digital Life...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Digital Transformation in Semiconductor Manufacturing
Proceedings of the 1st and 2nd European Advances in Digital Transformation Conference, EADTC 2018, Zittau, Germany and EADTC 2019, Milan, Italy...
View Book →
Research Methods for the Digital Humanities
...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
NGINX Unit Cookbook
Recipes for Using a Versatile Open Source Server...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Microservices Best Practices for Java
...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape
...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Introducing Vigilant Audiences
...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →