Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Endpoint

Warning: file_put_contents(cache/omni_5df5d359e1a93d37ef7697ddba7883c3.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of ASP.NET Core 6 Succinctly
dBooks

ASP.NET Core 6 Succinctly

By Dirk Strauss

...

View Book →
Cover of Learning Microsoft Endpoint Manager
Open Library

Learning Microsoft Endpoint Manager

By Scott Duffey

First published in 2021...

View Book →
Cover of Endpoint : Book 2
Open Library

Endpoint : Book 2

By J.W. Griffin

First published in 2019...

View Book →
Cover of Endpoint Security
Open Library

Endpoint Security

By Mark Kadrich

First published in 2007...

View Book →
Cover of Computer networking
Open Library

Computer networking

By James F. Kurose, Keith W. Ross

First published in 1900...

View Book →
Cover of Endpoint Security Paradox
Open Library

Endpoint Security Paradox

By Andrew Avanessian

First published in 2016...

View Book →
Cover of DTIC ADA132543: A Study of Thick-Target X-Ray Spectra Using Photonuclear Reactions
Internet Archive

DTIC ADA132543: A Study of Thick-Target X-Ray Spectra Using Photonuclear Reactions

By Defense Technical Information Center

Megavoltage bremsstrahlung spectra which are produced in thick targets were investigated using photonuclear reactions. Ratios of photonuclear yields in teflon and in K2SiF6 were obtained that serve as...

View Book →
Cover of Binary Neutron Stars in Quasi-equilibrium
Internet Archive

Binary Neutron Stars in Quasi-equilibrium

By Keisuke Taniguchi, Masaru Shibata

Quasi-equilibrium sequences of binary neutron stars are constructed for a variety of equations of state in general relativity. Einstein's constraint equations in the Isenberg-Wilson-Mathews approximat...

View Book →
Cover of Maternal and Perinatal Outcome of Triplet Pregnancies in a Tertiary Care Hospital in North India: A
Internet Archive

Maternal and Perinatal Outcome of Triplet Pregnancies in a Tertiary Care Hospital in North India: A

By The Journal of Medicine, Law & Public Health (JMLPH)

Background:   The purpose of this study was to identify the present trends in maternal, foetal, and perinatal outcomes and complications associated with triplet pregnancy at a tertiary referral hospi...

View Book →
Cover of Mathematical Methods in the Physical Sciences
Open Library

Mathematical Methods in the Physical Sciences

By Mary L. Boas, Mary Layne Boas

First published in 1966...

View Book →
Cover of Endpoint and Other Poems
Open Library

Endpoint and Other Poems

By John Updike

First published in 2009...

View Book →
Cover of The Evaluation Of Surrogate Endpoints
Open Library

The Evaluation Of Surrogate Endpoints

By Tomasz Burzykowski

First published in 2009...

View Book →
Cover of A Centre-Stable Manifold for the Focussing Cubic NLS in $R^{1+3}$
Internet Archive

A Centre-Stable Manifold for the Focussing Cubic NLS in $R^{1+3}$

By Marius Beceanu

Consider the focussing cubic nonlinear Schr\"odinger equation in $R^3$: $$ i\psi_t+\Delta\psi = -|\psi|^2 \psi. $$ It admits special solutions of the form $e^{it\alpha}\phi$, where $\phi$ is a Schwart...

View Book →
Cover of God : an itinerary
Internet Archive

God : an itinerary

By Debray, Régis

307 p. : 25 cm...

View Book →
Cover of NASA Technical Reports Server (NTRS) 19910012216: Experiments in cooperative-arm object manipulation
Internet Archive

NASA Technical Reports Server (NTRS) 19910012216: Experiments in cooperative-arm object manipulation

By NASA Technical Reports Server (NTRS)

Developing computed-torque controllers for complex manipulator systems using current techniques and tools is difficult because they address the issues pertinent to simulation, as opposed to control. A...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of DTIC ADA449444: Calculation of Absolute Protein-Ligand Binding Affinity Using Path and Endpoint Appr
Internet Archive

DTIC ADA449444: Calculation of Absolute Protein-Ligand Binding Affinity Using Path and Endpoint Appr

By Defense Technical Information Center

A comparative analysis is provided of rigorous and approximate methods for calculating absolute binding affinities of two protein-ligand complexes: the FKBP protein bound with small molecules BUQ and ...

View Book →
Cover of Learning Zeromq
dBooks

Learning Zeromq

By Pieter Hintjens

Professional Edition for C/C++...

View Book →
Cover of DTIC AD0468310: A Study of early Greyout Threshhold as an indicator of Human Tolerance to Positive R
Internet Archive

DTIC AD0468310: A Study of early Greyout Threshhold as an indicator of Human Tolerance to Positive R

By Defense Technical Information Center

The purpose of this study was to investigate the relationship under increased positive radial acceleratory force between peripheral light loss and blackout or unconsciousness when the light stimulus i...

View Book →
Cover of Endpoint of Sentience
Open Library

Endpoint of Sentience

By Jason Dias

First published in 2018...

View Book →
Cover of Designing+ Secure+and+ Scalable+ Microservices+for+ Threat+ Detection+ Engineering+ Patterns+f
Internet Archive

Designing+ Secure+and+ Scalable+ Microservices+for+ Threat+ Detection+ Engineering+ Patterns+f

By Sindhu Gopakumar Nair

In this paper, Endpoint Detection and Response (EDR) systems are analyzed to enhance the detecting and responding of a threat using secure and scalable microservices. The study employed quantitative t...

View Book →
Cover of Non-Vitamin K Antagonist Oral Anticoagulants
dBooks

Non-Vitamin K Antagonist Oral Anticoagulants

By Eduard Shantsila, Gregory YH Lip

A Concise Guide...

View Book →
Cover of Institutional animal care and use committee guidebook
Internet Archive

Institutional animal care and use committee guidebook

By National Institutes of Health (U.S.). Office for Protection

"OPPR, NIH; ARENA, Applied Research Ethics National Association."...

View Book →
Cover of avremover_ees_nt64_enu_sib
Internet Archive

avremover_ees_nt64_enu_sib

By Unknown Author

ESET Endpoint REmovval AV...

View Book →
Cover of Endpoint of Time
Open Library

Endpoint of Time

By Dylan Clearfield

First published in 2024...

View Book →
Cover of USPTO Patents Application 08401229
Internet Archive

USPTO Patents Application 08401229

By United States Patent and Trademark Office

In-situ Real-time Monitoring Technique And Apparatus For Endpoint Detection Of Thin Films During Chemical/mechanical Polishing Planarization...

View Book →
Cover of Case 11109239 Opened Root? Key Claim – 104281421 – Tokenized Equity Release Ref
Internet Archive

Case 11109239 Opened Root? Key Claim – 104281421 – Tokenized Equity Release Ref

By Unknown Author

Final Execution Scripts – Rootkey 104281421 Since the architecture is now synchronized and the rootkey is recognized, these are the exact messages and a test script to turn the remaining predictions...

View Book →
Cover of Advances in marine biology. Vol. 52
Internet Archive

Advances in marine biology. Vol. 52

By Unknown Author

1 online resource (xiii, 377 pages) :...

View Book →
Cover of Boundary Value Problems, Weyl Functions, and Differential Operators
dBooks

Boundary Value Problems, Weyl Functions, and Differential Operators

By Jussi Behrndt, Seppo Hassi, Henk de Snoo

...

View Book →
Cover of Skin endpoint titration
Open Library

Skin endpoint titration

By Richard L. Mabry

First published in 1994...

View Book →
Cover of Endpoint : Book 1
Open Library

Endpoint : Book 1

By Unknown Author

First published in Unknown...

View Book →
Cover of Endpoint
Open Library

Endpoint

By Ronald Fitch

First published in 2023...

View Book →
Cover of Hexatetraglyph Guidebook Basic
Internet Archive

Hexatetraglyph Guidebook Basic

By Collin T

The Hexatetraglyph is both a divination tool and a sacred map for your inner world. This set of instructions can help you navigate the board’s interconnected pathways while passing through a deliber...

View Book →
Cover of Cloud Design Patterns
dBooks

Cloud Design Patterns

By Alex Homer, John Sharp, Larry Brader, Masashi Narumoto, Tren

Prescriptive Architecture Guidance for Cloud Applications...

View Book →
Cover of Data Protection for the Hybrid Cloud
dBooks

Data Protection for the Hybrid Cloud

By Shreesh Dubey, Vijay Tandra Sistla, Shivam Garg, Aashish Ram

Microsoft System Center...

View Book →
Cover of generalmanual 000000672
Internet Archive

generalmanual 000000672

By Unknown Author

generalmanual 000000672...

View Book →
Cover of Istio Succinctly
dBooks

Istio Succinctly

By Rahul Rai, Tarun Pabbi

...

View Book →
Cover of Endpoint security and compliance management design guide
Open Library

Endpoint security and compliance management design guide

By Axel Bücker

First published in 2012...

View Book →
Cover of Trespassing across America : one man's epic, never -done-before (and sort of illegal) hike across th
Internet Archive

Trespassing across America : one man's epic, never -done-before (and sort of illegal) hike across th

By Ilgunas, Ken, author

267 pages, 16 unnumbered pages of plate : 21 cm...

View Book →
Cover of 2006 51 F 0016 Record
Internet Archive

2006 51 F 0016 Record

By Unknown Author

2006 51 F 0016 Record...

View Book →
Cover of Endpoint Protector
Internet Archive

Endpoint Protector

By Unknown Author

Available on Internet Archive....

View Book →
Cover of Forecasting and Assessing Risk of Individual Electricity Peaks
dBooks

Forecasting and Assessing Risk of Individual Electricity Peaks

By Maria Jacob, Cláudia Neves, Danica Vukadinović Greetham

...

View Book →
Cover of Application Delivery and Load Balancing in Microsoft Azure
dBooks

Application Delivery and Load Balancing in Microsoft Azure

By Derek DeJonghe, Arlan Nugara

Practical Solutions with NGINX and Microsoft Azure...

View Book →
Cover of Microsoft Defender for Endpoint in Depth
Open Library

Microsoft Defender for Endpoint in Depth

By Paul Huijbregts, Joe Anich, Justen Graves

First published in 2023...

View Book →
Cover of Endpoint (Korean edition)
Open Library

Endpoint (Korean edition)

By Unknown Author

First published in 2010...

View Book →
Cover of Info über Trend Micro Endpoint Encryption
Internet Archive

Info über Trend Micro Endpoint Encryption

By Unknown Author

Available on Internet Archive....

View Book →
Cover of Skin endpoint titration manual
Open Library

Skin endpoint titration manual

By Richard L. Mabry

First published in 1992...

View Book →