Warning: file_put_contents(cache/omni_12547283672f02badc43fde899443042.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →CISM Certified Information Security Manager Bundle, Second Edition
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam Take the 2022 version of ISACA’s challenging Certified Information Security M...
View Book →
Agile Processes in Software Engineering and Extreme Programming
18th International Conference, XP 2017, Cologne, Germany, May 22-26, 2017, Proceedings...
View Book →CompTIA Security+ Study Guide
Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with yo...
View Book →ShmooCon 2009 Slides
ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the resear...
View Book →
Weather & Climate Services for the Energy Industry
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
New Metropolitan Perspectives
Knowledge Dynamics, Innovation-driven Policies Towards the Territories’ Attractiveness Volume 1...
View Book →
Prevention and Control of Infections in Hospitals
Practice and Theory...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Guideline for Salinity Assessment, Mitigation and Adaptation Using Nuclear and Related Techniques
...
View Book →CISM Certified Information Security Manager Bundle
This cost-effective study bundle contains two books and bonus online content to use in preparation for the CISM exam Take ISACA’s challenging Certified Information Security Manager exam with confide...
View Book →
Ruby Best Practices
Increase Your Productivity - Write Better Code...
View Book →
Public Administration in Germany
...
View Book →
Water Resource Systems Planning and Management
An Introduction to Methods, Models, and Applications...
View Book →
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by ...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →
Heterogeneity, High Performance Computing, Self-Organization and the Cloud
...
View Book →
New Perspectives Computer Concepts 2016 Enhanced, Comprehensive
First published in 2016...
View Book →
Advances in Pharma Business Management and Research
Volume 1...
View Book →
Taming the Big Green Elephant
Setting in Motion the Transformation Towards Sustainability...
View Book →
CISM Certified Information Security Manager All-in-One Exam Guide
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effect...
View Book →
Mediation in Collective Labor Conflicts
...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Education and Skills for Inclusive Growth, Green Jobs and the Greening of Economies in Asia
Case Study Summaries of India, Indonesia, Sri Lanka and Viet Nam...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Managed Software Evolution
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Access to Online Resources
A Guide for the Modern Librarian...
View Book →
Robotics, AI, and Humanity
Science, Ethics, and Policy...
View Book →
S-BPM in the Wild
Practical Value Creation...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
Agroecology Now!
Transformations Towards More Just and Sustainable Food Systems...
View Book →
Social Statistics and Ethnic Diversity
Cross-National Perspectives in Classifications and Identity Politics...
View Book →
Ecosystem Services for Well-Being in Deltas
Integrated Assessment for Policy Analysis...
View Book →AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
This self-study resource offers complete coverage of every topic on the AWS Certified Security Specialty exam Take the AWS Certified Security – Specialty exam with confidence using the detailed info...
View Book →Encyclopedia of Cryptography and Security
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. The work is intended for students, researchers and practitioners who need a quick and a...
View Book →
Energy Efficient Servers
Blueprints for Data Center Optimization...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →CISSP: Certified Information Systems Security Professional Study Guide
Fully updated Sybex Study Guide for the industry-leading security certification: CISSP Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most de...
View Book →
Open Source Systems: Towards Robust Practices
13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22-23, 2017, Proceedings...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Decolonising Blue Spaces in the Anthropocene
Freshwater management in Aotearoa New Zealand...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →Handbook of Research on Information Security and Assurance
"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher....
View Book →
Aquaponics Food Production Systems
Combined Aquaculture and Hydroponic Production Technologies for the Future...
View Book →
Opening Science
The Evolving Guide on How the Internet is Changing Research, Collaboration and Scholarly Publishing...
View Book →Enterprise Security
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati...
View Book →CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effect...
View Book →
Managing Distributed Cloud Applications and Infrastructure
A Self-Optimising Approach...
View Book →
Entrepreneurial Cognition
Exploring the Mindset of Entrepreneurs...
View Book →
A Treatise on Systems (volume 1)
Analytical Descriptions of Human-Information Networks...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
The Ecological Scarcity Method for the European Union
A Volkswagen Research Initiative: Environmental Assessments...
View Book →
SQL Server Internals: In-Memory OLTP
Inside the SQL Server 2016 Hekaton Engine...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Techlash
The Future of the Socially Responsible Tech Organization...
View Book →Privacy Act Issuances ... Compilation
No description available....
View Book →
Societal Implications of Community-Oriented Policing and Technology
...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
The Climate-Smart Agriculture Papers
Investigating the Business of a Productive, Resilient and Low Emission Future...
View Book →
A Journey of Embedded and Cyber-Physical Systems
Essays Dedicated to Peter Marwedel on the Occasion of His 70th Birthday...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Risk Communication for the Future
Towards Smart Risk Governance and Safety Management...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
Reforms, Organizational Change and Performance in Higher Education
A Comparative Account from the Nordic Countries...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →
Security and Privacy in Communication Networks
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
The Entrepreneurial Society
A Reform Strategy for the European Union...
View Book →
Financial Crisis Management and Democracy
Lessons from Europe and Latin America...
View Book →
Constructing Roma Migrants
European Narratives and Local Governance...
View Book →Information Security
Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security ar...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Towards a Systemic Theory of Irregular Migration
Explaining Ecuadorian Irregular Migration in Amsterdam and Madrid...
View Book →ICT Systems Security and Privacy Protection
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 ful...
View Book →
3D Recording and Interpretation for Maritime Archaeology
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Integrated Groundwater Management
Concepts, Approaches and Challenges...
View Book →
Models, Methods and Tools for Product Service Design
The Manutelligence Project...
View Book →
Textbook of Patient Safety and Clinical Risk Management
...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Computer and Information Security Handbook (2-Volume Set)
Computer and Information Security Handbook, Fourth Edition offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, along with applications and best practices, o...
View Book →
Semantic Systems. The Power of AI and Knowledge Graphs
15th International Conference, SEMANTiCS 2019, Karlsruhe, Germany, September 9–12, 2019, Proceedings...
View Book →
The Future of Financial Systems in the Digital Age
Perspectives from Europe and Japan...
View Book →CIA Reading Room 06215980: MODIFICATION THIRTY TWO DATED 19 JULY 2010
Approved for Release: 2016/01/27 C06215980 , 01.53AprwavAt.2R0.0012 AMENDMENT OF SOUCITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE � PAGE OF 1 PAGES I 3 2. AMENDMENT/MODIFICATION NO. MODIFICA...
View Book →
Fundamentals of Business Process Management
...
View Book →
Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-Worl
This comprehensive monograph delves into the integration of Identity Access Management (IAM) and Blockchain technologies, offering advanced techniques and methodologies to enhance security, privacy, a...
View Book →
Real-time Linked Dataspaces
Enabling Data Ecosystems for Intelligent Systems...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Evolve the Monolith to Microservices with Java and Node
...
View Book →