Warning: file_put_contents(cache/omni_6c6ac948df5eb0add02e93796b6b1a42.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →Information Systems Today
For the undergraduate/graduate introductory information systems course required of all business students. Information Systems Today, 3e, speaks directly to WHY IS MATTERS today by focusing on what eve...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Windows 11 Made Simple for Seniors
Attention Feeling lost every time you turn on your computer? You’re not alone. For many seniors, today’s technology can seem overwhelming, endless icons, confusing settings, and constant updates t...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →The World Almanac and Book of Facts, 2006
Offers comprehensive facts, figures, and explanations of the events, people, and places in the news, with original articles on recent issues and topics....
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →Routledge Handbook of Sport Security
This book provides an in-depth analysis of security issues and concerns in contemporary sport. Featuring the work of leading researchers and practitioners from around the world, it offers practical, e...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →PC Mag
PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make bette...
View Book →Harley Hahn's Internet & Web Yellow Pages
With more than one million "Internet Yellow Pages" in print, this edition will be a ". . . must-have book for anyone who wants to explore the vast reaches of the Internet" ("Wall Street Journal"). Thi...
View Book →Computer Security Handbook
No description available....
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →Four Battlegrounds
An NPR 2023 "Books We Love" Pick One of the Next Big Idea Club's Must-Read Books "An invaluable primer to arguably the most important driver of change for our future." —P. W. Singer, author of Burn-...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Target Suitability and the Crime Drop
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
The Condition of Digitality
A Post-Modern Marxism for the Practice of Digital Life...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Digital Transformation in Semiconductor Manufacturing
Proceedings of the 1st and 2nd European Advances in Digital Transformation Conference, EADTC 2018, Zittau, Germany and EADTC 2019, Milan, Italy...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
NGINX Unit Cookbook
Recipes for Using a Versatile Open Source Server...
View Book →
Research Methods for the Digital Humanities
...
View Book →
What Every Engineer Should Know About Cyber Security and Digital Forensics
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or de...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
A Treatise on Systems (volume 1)
Analytical Descriptions of Human-Information Networks...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →Willing's Press Guide
Coverage of publications outside the UK and in non-English languages expands steadily until, in 1991, it occupies enough of the Guide to require publication in parts....
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →Availability, Reliability and Security
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025...
View Book →Microsoft Intune Cookbook
Updated edition of Packt's trusted, top-selling Intune title, this cookbook helps you solve daily admin challenges faster using proven workflows, PowerShell and Microsoft Graph automation, reporting, ...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →Willing's Press Guide and Advertisers' Directory and Handbook
No description available....
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →Routledge Handbook of Media, Conflict and Security
This Handbook links the growing body of media and conflict research with the field of security studies. The academic sub-field of media and conflict has developed and expanded greatly over the past tw...
View Book →
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape
...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Introducing Vigilant Audiences
...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Microservices Best Practices for Java
...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →