Warning: file_put_contents(cache/omni_44eddea30196e67b9d4726e5b4a9367c.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Load Balancing in the Cloud
Practical Solutions with NGINX and AWS...
View Book →
Mathematics Teacher Education in the Andean Region and Paraguay
A Comparative Analysis of Issues and Challenges...
View Book →Rutgers Computer & Technology Law Journal
No description available....
View Book →
Online privacy law : Australia, Canada, France, Germany, Israel, Italy, Japan, Netherlands, Portugal
"June 2012." Includes bibliographical references. Also available in digital form on the Library of Congress Web site....
View Book →
IT laws in the era of cloud computing : a comparative analysis between EU and US law on the case stu
"This book documents the findings and recommendations of research into the question of how IT laws should develop on the understanding that today's information and communication technology is shaped b...
View Book →
Googling Security
What Does Google Know about You? And Who Are They Telling? When you use Google's "free" services, you pay, big time-with personal information about yourself. Google is making a fortune on what it know...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →A survey of client geolocation using Wi-Fi positioning services
Wi-Fi positioning systems (WPS) utilize a location's set of Wi-Fi access point (AP) media access control (MAC) addresses and received signal strength pairs as input to an algorithm that resolves locat...
View Book →
Transforming Document Recordation at
u n i t e d stat e s co p y r i g h t o f f i c e Transforming Document Recordation at the United States Copyright Office a report of the abraham l. kaminstein scholar in residence december 2014 u n i...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
The Official Raspberry Pi Handbook 2023
...
View Book →
Beej's Guide to Network Programming
Using Internet Sockets...
View Book →Cloud Computing and Security
This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, Chi...
View Book →CE-T03 – Telemetry Capture Report: Target Access Event – Flat C, 94 Holland Road, London W14 8BN
Telemetry Capture Report – Technical Intelligence Overview This document forms part of a structured series of technical intelligence reports produced by the Collier Exposed Investigative Project. Ea...
View Book →
Fulfilling the Promise of Technology Transfer
Fostering Innovation for the Benefit of Society...
View Book →Similarities and differences in patterns and geolocation of SSH attack data
Cyber attacks are becoming more prevalent across all sectors of government, business, and academia. Academic networks can be more vulnerable to attack because of a lack of resources and funding. This ...
View Book →BruCON 2010 Slides
Creating a CERT at WARP Speed: How To Fast Track the Implementation of Your CERT by Brian Honan Abstract: A major challenge facing those trying to set up a Computer Emergency Response Team is developi...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Blazor, A Beginners Guide
A quick-start guide to productivity with Blazor...
View Book →
Multi-dimensional Approaches Towards New Technology
Insights on Innovation, Patents and Competition...
View Book →Reconnecting Indigenous Data to Country
Available on Internet Archive....
View Book →
Digital Forensics and Cyber Crime
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovn...
View Book →
Online privacy law : the European Union
"June 2012, updated May 2014." Includes bibliographical references. Also available in digital form on the Library of Congress Web site....
View Book →DTIC ADA549426: Forensic Carving of Network Packets and Associated Data Structures
Using validated carving techniques, we show that popular operating systems (e.g. Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present i...
View Book →
https://www.copyright.gov/orphan/comments/noi_11302012/Tulane-University-Law-School.pdf
Orphan Works Reply Comment to the U.S. Copyright Office Notice of Inquiry (dated October 22, 2012) Submitted by Professor Elizabeth Townsend Gard, Professor Glynn Lunney, Gregory Scott Stein, and The ...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →Spying Browser Extensions: Analysis and Detection
Several studies have been conducted on understanding third-party user tracking on the web. However, web trackers can only track users on sites where they are embedded by the publisher, thus obtaining ...
View Book →
Etiology and Morphogenesis of Congenital Heart Disease
From Gene Function and Cellular Interaction to Morphology...
View Book →
Mobilities, Boundaries, and Travelling Ideas
Rethinking Translocality Beyond Central Asia and the Caucasus...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Programming Persistent Memory
A Comprehensive Guide for Developers...
View Book →
Like Nobody's Business
An Insider's Guide to How US University Finances Really Work...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →Passive and Active Measurement
This book constitutes the proceedings of the 23rd International Conference on Passive and Active Measurement, PAM 2022, held in March 2022. Due to COVID-19 pandemic, the conference was held virtually....
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
CI/CD with Docker and Kubernetes
How to Deliver Cloud Native Applications at High Velocity...
View Book →
Cohabitation and Marriage in the Americas: Geo-historical Legacies and New Trends
...
View Book →
Foreign intelligence gathering laws
"June 2016." "Comparative Summary, Belgium, France, Germany, Portugal, Romania, Netherlands, Sweden, United Kingdom, European Union." "LL File No. 2016-013762." Includes bibliographical references and...
View Book →
CE-T05 – Telemetry Capture Report: Target Access Event – 2 Broadlands Close, London SW16 1NE
Telemetry Capture Report – Technical Intelligence Overview This document forms part of a structured series of technical intelligence reports produced by the Collier Exposed Investigative Project...
View Book →
Design Science and Its Importance in the German Mathematics Educational Discussion
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Law, privacy, and surveillance in Canada in the post-Snowden era
Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →
Molecular Mechanism of Congenital Heart Disease and Pulmonary Hypertension
...
View Book →
Access to Online Resources
A Guide for the Modern Librarian...
View Book →
Anti-Microbial Resistance in Global Perspective
...
View Book →Evidence of spatial embedding in the IPv4 router-level Internet network
Much interest has been taken in understanding the global routing structure of the Internet, both to model and protect the current structures and to modify the structure to improve resilience. These st...
View Book →
Paris Climate Agreement: Beacon of Hope
...
View Book →
CE-T09 – Telemetry Capture Report: Target Access Event – 11 Beverley Court, Breakspears Road, Lo
Telemetry Capture Report – Technical Intelligence Overview This document forms part of a structured series of technical intelligence reports produced by the Collier Exposed Investigative Project...
View Book →
Digital legal deposit in selected jurisdictions
"July 2018." "Australia, Canada, China, Estonia, France, Germany, Israel, Italy, Japan, Netherlands, New Zealand, Norway, South Korea, Spain, United Kingdom." "LL File No. 2018-016101." Includes bibli...
View Book →
Die grenzüberschreitende Lizenzierung von Online-Musikrechten in Europa : eine urheber- und wahrneh
Originally presented as the author's thesis (doctoral) -- Ludwig-Maximilians-Universität München, 2010/2011. Includes bibliographical references (pages 405-438). Description based on print version r...
View Book →The Mesh of Civilizations and International Email Flows
In The Clash of Civilizations, Samuel Huntington argued that the primary axis of global conflict was no longer ideological or economic but cultural and religious, and that this division would characte...
View Book →
Assessment of Climate Change over the Indian Region
A Report of the Ministry of Earth Sciences (MoES), Government of India...
View Book →GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certif...
View Book →
Defense against the black arts : how hackers do what they do and how to protect against it
Includes index. Description based on print version record; resource not viewed....
View Book →
Innovation, Economic Development, and Intellectual Property in India and China
Comparing Six Economic Sectors...
View Book →
TOWARD UNDERSTANDING THE LONGITUDINAL STABILITY OF AN IP GEOLOCATION DATABASE
While many IP Geolocation Database (IPGD) studies exist gauging \"accuracy\" by comparing to ground truth (and other IPGDs), there is a dearth of studies looking at the stability of IPGD locations in ...
View Book →
Ship and Offshore Structure Design in Climate Change Perspective
...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Ten Steps to Linux Survival
Essentials for Navigating the Bash Jungle...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
Advancing Culture of Living with Landslides
Volume 1 ISDR-ICL Sendai Partnerships 2015-2025...
View Book →Microsoft Word - Recordation_Report_Final_Registers_Office_12-19-14_RFB_Final.docx
u n i t e d stat e s co p y r i g h t o f f i c e Transforming Document Recordation at the United States Copyright Office a report of the abraham l. kaminstein scholar in residence december 2014 u n i...
View Book →
Public International Computer Network Law Issues
No description available....
View Book →
Pay for Play
How the Music Industry Works, Where the Money Goes, and Why...
View Book →
The Unicode Cookbook for Linguists
Managing writing systems using orthography profiles...
View Book →
The Internet Myth
From the Internet Imaginary to Network Ideologies...
View Book →
Linux Network Administrator's Guide
Unix-compatible operating system...
View Book →
Ehrverletzungen in der elektronischen Presse : Eine kollisionsrechtliche Untersuchung de lege lata u
Originally presented as the author's thesis (doctoral)--Universität Marburg, 2020. Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
HTML5 for iOS and Android: A Beginner's Guide
Essential Skills--Made Easy! Create advanced websites, web apps, and standalone apps for Apple iOS and Google Android devices. HTML5 for iOS and Android: A Beginner's Guide explains, step by step, how...
View Book →
Methods for Measuring Greenhouse Gas Balances and Evaluating Mitigation Options in Smallholder Agric
...
View Book →Applications of Mathematics in Science and Technology
The Conference dealt with one of the most important problems faced in International development in Pure Mathematics and Applied mathematics development in engineering such as Cryptography, Cyber Secur...
View Book →
From Bilateral Arbitral Tribunals and Investment Courts to a Multilateral Investment Court
Options Regarding the Institutionalization of Investor-State Dispute Settlement...
View Book →Security with Intelligent Computing and Big-data Services
This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent c...
View Book →Section 1201 Rulemaking: Ninth Triennial Proceeding Recommendation of the Register of Copyrights
united states copyright office Section 1201 Rulemaking: Ninth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention recommendation of the register of copyrights october 2024...
View Book →
National Security Commission on Artificial Intelligence
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
U.C. Davis Law Review
No description available....
View Book →
Government access to encrypted communications
"May 2016." "Comparative Summary, Australia, Belgium, Brazil, Canada, European Union, France, Germany, Israel, Japan, South Africa, Sweden, Taiwan, United Kingdom." "LL File No. 2016-013477." Includes...
View Book →
Loss and Damage from Climate Change
Concepts, Methods and Policy Options...
View Book →
Introduction to Logic Circuits & Logic Design with Verilog
...
View Book →
Introduction to Logic Circuits & Logic Design with VHDL
...
View Book →
Synchronized Factories
Latin America and the Caribbean in the Era of Global Value Chains...
View Book →The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to ...
View Book →
Protecting children online? : cyberbullying policies of social media companies
Includes bibliographical references (pages 221-268) and index. Description based on print version record; resource not viewed....
View Book →
Complications and Quandaries in the ICT Sector
Standard Essential Patents and Competition Issues...
View Book →Boston University International Law Journal
No description available....
View Book →CE-T07 – Telemetry Capture Report: Target Access Event – 34 Queen Street, Lochmaben, Lockerbie D
Telemetry Capture Report – Technical Intelligence Overview This document forms part of a structured series of technical intelligence reports produced by the Collier Exposed Investigative Project...
View Book →
Regulating electronic means to fight the spread of COVID-19 : Argentina, Australia, Brazil, China, E
Argentina, Australia, Brazil, China, England, European Union, France, Iceland, India, Iran, Israel, Italy, Japan, Mexico, Norway, Portugal, Russian Federation, South Africa, South Korea, Spain, Taiwan...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →
Anti-Hacker Tool Kit, Fourth Edition
Featuring complete details on an unparalleled number of hacking exploits, this bestselling computer security book is fully updated to cover the latest attack types—and how to proactively defend agai...
View Book →On Measuring the Geographic Diversity of Internet Routes
Route diversity in networks is elemental for establishing reliable, high-capacity connections with appropriate security between endpoints. As for the Internet, route diversity has already been studied...
View Book →LCSH Section I
I(f) inhibitors USE If inhibitors I & M Canal National Heritage Corridor (Ill.) USE Illinois and Michigan Canal National Heritage Corridor (Ill.) I & M Canal State Trail (Ill.) USE Illinois and Mic...
View Book →
Guardians of Public Value
How Public Organisations Become and Remain Institutions...
View Book →DTIC ADA606734: Enhancing the Classification Accuracy of IP Geolocation
The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accura...
View Book →
IP Geolocation in Metropolitan Areas
No description available....
View Book →CompTIA A+ complete deluxe study guide
1 online resource (1 volume) :...
View Book →
The Impact of Food Bioactives on Health
in vitro and ex vivo models...
View Book →
From Assessing to Conserving Biodiversity
Conceptual and Practical Challenges...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Deltas in the Anthropocene
...
View Book →
Just Enough Linux
Learning about Linux one command at a time...
View Book →
Colorado - White Pages and Yellow Pages - Denver - Summer 1934 thru Summer 1935
...
View Book →
Bulk collection : systematic government access to private-sector data
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Building iPhone Apps with HTML, CSS, and JavaScript
Making App Store Apps Without Objective-C or Cocoa...
View Book →Proceedings of the ... ACM SIGCOMM Internet Measurement Conference
No description available....
View Book →
Enhancing Smallholder Farmers' Access to Seed of Improved Legume Varieties Through Multi-stakeh
Learning from the TLIII project Experiences in sub-Saharan Africa and South Asia...
View Book →
Asterisk: The Future of Telephony
Join the Open Source PBX Revolution...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Mobile and wireless communications networks : IFIP- TC6/European Commission Networking 2000 Internat
Mobile and Wireless Communications Networks: IFIP-TC6/European Commission NETWORKING 2000 International Workshop, MWCN 2000 Paris, France, May 16–17, 2000 Proceedings Author: Cambyse Guy Omidyar Pub...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Insurance Distribution Directive
A Legal Analysis...
View Book →
Drones and the Creative Industry
Innovative Strategies for European SMEs...
View Book →Malware Analyst's Cookbook and DVD
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find...
View Book →DNS Network Troubleshooting Cheat Sheet
A comprehensive quick-reference guide covering DNS record types, common DNS errors and fixes, SSL/TLS checklist, email authentication (SPF, DMARC, DKIM, BIMI), network diagnostic commands, HTTP status...
View Book →
Making Servers Work
A Practical Guide to Linux System Administration...
View Book →