Moozonian
Web Images Developer News Books Maps Shopping Moo-AI Generate Art
Showing results for Identity and Access Management System | Microsoft Security Background

Warning: file_put_contents(cache/omni_12547283672f02badc43fde899443042.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of Managing Kubernetes Traffic with F5 NGINX
dBooks

Managing Kubernetes Traffic with F5 NGINX

By Amir Rawdat

A Practical Guide...

View Book →
Cover of Don't Panic: Mobile Developer's Guide to The Galaxy
dBooks

Don't Panic: Mobile Developer's Guide to The Galaxy

By Marco Tabor, Mladenka Vrdoljak

A Community Publication about All Things Mobile...

View Book →
Cover of CISM Certified Information Security Manager Bundle, Second Edition
Google Books

CISM Certified Information Security Manager Bundle, Second Edition

By Peter H. Gregory

This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam Take the 2022 version of ISACA’s challenging Certified Information Security M...

View Book →
Cover of Agile Processes in Software Engineering and Extreme Programming
dBooks

Agile Processes in Software Engineering and Extreme Programming

By Hubert Baumeister, Horst Lichter, Matthias Riebisch

18th International Conference, XP 2017, Cologne, Germany, May 22-26, 2017, Proceedings...

View Book →
Cover of CompTIA Security+ Study Guide
Google Books

CompTIA Security+ Study Guide

By Emmett Dulaney, Chuck Easttom

Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with yo...

View Book →
Cover of ShmooCon 2009 Slides
Internet Archive

ShmooCon 2009 Slides

By ShmooCon

ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the resear...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of New Metropolitan Perspectives
dBooks

New Metropolitan Perspectives

By Carmelina Bevilacqua, Francesco Calabrò, Lucia Della Spina

Knowledge Dynamics, Innovation-driven Policies Towards the Territories’ Attractiveness Volume 1...

View Book →
Cover of Prevention and Control of Infections in Hospitals
dBooks

Prevention and Control of Infections in Hospitals

By Bjørg Marit Andersen

Practice and Theory...

View Book →
Cover of CyberParks – The Interface Between People, Places and Technology
dBooks

CyberParks – The Interface Between People, Places and Technology

By Carlos Smaniotto Costa, Ina Šuklje Erjavec, Therese Kenna,

New Approaches and Perspectives...

View Book →
Cover of CISM Certified Information Security Manager Bundle
Google Books

CISM Certified Information Security Manager Bundle

By Peter H. Gregory

This cost-effective study bundle contains two books and bonus online content to use in preparation for the CISM exam Take ISACA’s challenging Certified Information Security Manager exam with confide...

View Book →
Cover of Ruby Best Practices
dBooks

Ruby Best Practices

By Gregory T. Brown

Increase Your Productivity - Write Better Code...

View Book →
Cover of Public Administration in Germany
dBooks

Public Administration in Germany

By Sabine Kuhlmann, Isabella Proeller, Dieter Schimanke, Jan Zi

...

View Book →
Cover of Water Resource Systems Planning and Management
dBooks

Water Resource Systems Planning and Management

By Daniel P. Loucks, Eelco van Beek

An Introduction to Methods, Models, and Applications...

View Book →
Cover of Introduction to Embedded Systems
dBooks

Introduction to Embedded Systems

By Edward Ashford Lee, Sanjit Arunkumar Seshia

A Cyber-Physical Systems Approach...

View Book →
Cover of Computer and Information Sciences
dBooks

Computer and Information Sciences

By Tadeusz Czachórski, Erol Gelenbe, Krzysztof Grochla, Ricard

31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...

View Book →
Cover of CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
Google Books

CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition

By Peter H. Gregory

Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by ...

View Book →
Cover of Tools and Algorithms for the Construction and Analysis of Systems
dBooks

Tools and Algorithms for the Construction and Analysis of Systems

By Tomáš Vojnar, Lijun Zhang

25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...

View Book →
Cover of Security
Google Books

Security

By Unknown Author

No description available....

View Book →
Cover of New Perspectives Computer Concepts 2016 Enhanced, Comprehensive
Open Library

New Perspectives Computer Concepts 2016 Enhanced, Comprehensive

By June Jamrich Parsons

First published in 2016...

View Book →
Cover of Advances in Pharma Business Management and Research
dBooks

Advances in Pharma Business Management and Research

By Lars Schweizer, Theodor Dingermann, Otto Quintus Russe, Chri

Volume 1...

View Book →
Cover of Taming the Big Green Elephant
dBooks

Taming the Big Green Elephant

By Ariel Macaspac Hernández

Setting in Motion the Transformation Towards Sustainability...

View Book →
Cover of CISM Certified Information Security Manager All-in-One Exam Guide
Google Books

CISM Certified Information Security Manager All-in-One Exam Guide

By Peter H. Gregory

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effect...

View Book →
Cover of Mediation in Collective Labor Conflicts
dBooks

Mediation in Collective Labor Conflicts

By Martin Euwema, Francisco Medina, Ana Belén García, Erica R

...

View Book →
Cover of Docker Succinctly
dBooks

Docker Succinctly

By Elton Stoneman

...

View Book →
Cover of Office 365
dBooks

Office 365

By Matthew Katzer, Don Crawford

Migrating and Managing Your Business in the Cloud...

View Book →
Cover of Enabling Things to Talk
dBooks

Enabling Things to Talk

By Alessandro Bassi, Martin Bauer, Martin Fiedler, Thorsten Kra

Designing IoT solutions with the IoT Architectural Reference Model...

View Book →
Cover of Education and Skills for Inclusive Growth, Green Jobs and the Greening of Economies in Asia
dBooks

Education and Skills for Inclusive Growth, Green Jobs and the Greening of Economies in Asia

By Rupert Maclean, Shanti Jagannathan, Brajesh Panth

Case Study Summaries of India, Indonesia, Sri Lanka and Viet Nam...

View Book →
Cover of The Security Development Lifecycle
dBooks

The Security Development Lifecycle

By Michael Howard, Steve Lipner

SDL: A Process for Developing Demonstrably More Secure Software...

View Book →
Cover of Internet of Things
dBooks

Internet of Things

By Leon Strous, Vinton Cerf

Information Processing in an Increasingly Connected World...

View Book →
Cover of Managed Software Evolution
dBooks

Managed Software Evolution

By Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit

...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of Access to Online Resources
dBooks

Access to Online Resources

By Kristina Botyriute

A Guide for the Modern Librarian...

View Book →
Cover of Robotics, AI, and Humanity
dBooks

Robotics, AI, and Humanity

By Joachim von Braun, Margaret S. Archer, Gregory M. Reichberg,

Science, Ethics, and Policy...

View Book →
Cover of S-BPM in the Wild
dBooks

S-BPM in the Wild

By Albert Fleischmann, Werner Schmidt, Christian Stary

Practical Value Creation...

View Book →
Cover of Operating Systems and Middleware
dBooks

Operating Systems and Middleware

By Max Hailperin

Supporting Controlled Interaction...

View Book →
Cover of Agroecology Now!
dBooks

Agroecology Now!

By Colin Ray Anderson, Janneke Bruil, M. Jahi Chappell, Csilla

Transformations Towards More Just and Sustainable Food Systems...

View Book →
Cover of Social Statistics and Ethnic Diversity
dBooks

Social Statistics and Ethnic Diversity

By Patrick Simon, Victor Piché, Amélie Gagnon

Cross-National Perspectives in Classifications and Identity Politics...

View Book →
Cover of Ecosystem Services for Well-Being in Deltas
dBooks

Ecosystem Services for Well-Being in Deltas

By Robert J. Nicholls, Craig W. Hutton, W. Neil Adger, Susan E.

Integrated Assessment for Policy Analysis...

View Book →
Cover of AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
Google Books

AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)

By Tracy Pierce, Aravind Kodandaramaiah, Rafael Koike, Alex Ros

This self-study resource offers complete coverage of every topic on the AWS Certified Security Specialty exam Take the AWS Certified Security – Specialty exam with confidence using the detailed info...

View Book →
Cover of Encyclopedia of Cryptography and Security
Google Books

Encyclopedia of Cryptography and Security

By Henk C.A. van Tilborg, Sushil Jajodia

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. The work is intended for students, researchers and practitioners who need a quick and a...

View Book →
Cover of Energy Efficient Servers
dBooks

Energy Efficient Servers

By Corey Gough, Ian Steiner, Winston Saunders

Blueprints for Data Center Optimization...

View Book →
Cover of Deploying Windows 10
dBooks

Deploying Windows 10

By Andre Della Monica, Russ Rimmerman, Alessandro Cesarini, Vic

Automating deployment by using System Center Configuration Manager...

View Book →
Cover of White-Collar Crime in the Shadow Economy
dBooks

White-Collar Crime in the Shadow Economy

By Petter Gottschalk, Lars Gunnesdal

Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...

View Book →
Cover of CISSP: Certified Information Systems Security Professional Study Guide
Google Books

CISSP: Certified Information Systems Security Professional Study Guide

By James Michael Stewart, Mike Chapple, Darril Gibson

Fully updated Sybex Study Guide for the industry-leading security certification: CISSP Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most de...

View Book →
Cover of Open Source Systems: Towards Robust Practices
dBooks

Open Source Systems: Towards Robust Practices

By Federico Balaguer, Roberto Di Cosmo, Alejandra Garrido, Fabi

13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22-23, 2017, Proceedings...

View Book →
Cover of Migrating SQL Server Databases to Azure
dBooks

Migrating SQL Server Databases to Azure

By Carl Rabeler

Microsoft Azure Essentials...

View Book →
Cover of Decolonising Blue Spaces in the Anthropocene
dBooks

Decolonising Blue Spaces in the Anthropocene

By Meg Parsons, Karen Fisher, Roa Petra Crease

Freshwater management in Aotearoa New Zealand...

View Book →
Cover of Autonomous Control for a Reliable Internet of Services
dBooks

Autonomous Control for a Reliable Internet of Services

By Ivan Ganchev, R. van der Mei, Hans van den Berg

Methods, Models, Approaches, Techniques, Algorithms, and Tools...

View Book →
Cover of Handbook of Research on Information Security and Assurance
Google Books

Handbook of Research on Information Security and Assurance

By Gupta, Jatinder N. D., Sharma, Sushil

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher....

View Book →
Cover of Aquaponics Food Production Systems
dBooks

Aquaponics Food Production Systems

By Simon Goddek, Alyssa Joyce, Benz Kotzen, Gavin M. Burnell

Combined Aquaculture and Hydroponic Production Technologies for the Future...

View Book →
Cover of Opening Science
dBooks

Opening Science

By Sönke Bartling, Sascha Friesike

The Evolving Guide on How the Internet is Changing Research, Collaboration and Scholarly Publishing...

View Book →
Cover of Enterprise Security
Google Books

Enterprise Security

By Walter Fumy, Jörg Sauerbrey

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati...

View Book →
Cover of CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Google Books

CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide

By Graham Thompson

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effect...

View Book →
Cover of Managing Distributed Cloud Applications and Infrastructure
dBooks

Managing Distributed Cloud Applications and Infrastructure

By Theo Lynn, John G. Mooney, Jörg Domaschka, Keith A. Ellis

A Self-Optimising Approach...

View Book →
Cover of Entrepreneurial Cognition
dBooks

Entrepreneurial Cognition

By Dean A. Shepherd, Holger Patzelt

Exploring the Mindset of Entrepreneurs...

View Book →
Cover of A Treatise on Systems (volume 1)
dBooks

A Treatise on Systems (volume 1)

By Mark Burgess

Analytical Descriptions of Human-Information Networks...

View Book →
Cover of The Role of Smallholder Farms in Food and Nutrition Security
dBooks

The Role of Smallholder Farms in Food and Nutrition Security

By Sergio Gomez y Paloma, Laura Riesgo, Kamel Louhichi

...

View Book →
Cover of The Ecological Scarcity Method for the European Union
dBooks

The Ecological Scarcity Method for the European Union

By Stephan Ahbe, Simon Weihofen, Steffen Wellge

A Volkswagen Research Initiative: Environmental Assessments...

View Book →
Cover of SQL Server Internals: In-Memory OLTP
dBooks

SQL Server Internals: In-Memory OLTP

By Kalen Delaney

Inside the SQL Server 2016 Hekaton Engine...

View Book →
Cover of Configuration Manager Field Experience
dBooks

Configuration Manager Field Experience

By Rushi Faldu, Manish Raval, Brandon Linton, Kaushal Pandey, M

Microsoft System Center...

View Book →
Cover of Techlash
dBooks

Techlash

By Ian I. Mitroff, Rune Storesund

The Future of the Socially Responsible Tech Organization...

View Book →
Cover of Privacy Act Issuances ... Compilation
Google Books

Privacy Act Issuances ... Compilation

By United States. Office of the Federal Register

No description available....

View Book →
Cover of The Privacy Engineer's Manifesto
dBooks

The Privacy Engineer's Manifesto

By Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Getting from Policy to Code to QA to Value...

View Book →
Cover of Data Science with Microsoft SQL Server 2016
dBooks

Data Science with Microsoft SQL Server 2016

By Buck Woody, Danielle Dean, Debraj GuhaThakurta, Gagan Bansal

...

View Book →
Cover of The Climate-Smart Agriculture Papers
dBooks

The Climate-Smart Agriculture Papers

By Todd S. Rosenstock, Andreea Nowak, Evan Girvetz

Investigating the Business of a Productive, Resilient and Low Emission Future...

View Book →
Cover of A Journey of Embedded and Cyber-Physical Systems
dBooks

A Journey of Embedded and Cyber-Physical Systems

By Jian-Jia Chen

Essays Dedicated to Peter Marwedel on the Occasion of His 70th Birthday...

View Book →
Cover of The Hindu Kush Himalaya Assessment
dBooks

The Hindu Kush Himalaya Assessment

By Philippus Wester, Arabinda Mishra, Aditi Mukherji, Arun Bhak

Mountains, Climate Change, Sustainability and People...

View Book →
Cover of Application Delivery and Load Balancing in Microsoft Azure
dBooks

Application Delivery and Load Balancing in Microsoft Azure

By Derek DeJonghe, Arlan Nugara

Practical Solutions with NGINX and Microsoft Azure...

View Book →
Cover of Risk Communication for the Future
dBooks

Risk Communication for the Future

By Mathilde Bourrier, Corinne Bieder

Towards Smart Risk Governance and Safety Management...

View Book →
Cover of Access Denied
dBooks

Access Denied

By Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zit

The Practice and Policy of Global Internet Filtering...

View Book →
Cover of Reforms, Organizational Change and Performance in Higher Education
dBooks

Reforms, Organizational Change and Performance in Higher Education

By Rómulo Pinheiro, Lars Geschwind, Hanne Foss Hansen, Kirsi P

A Comparative Account from the Nordic Countries...

View Book →
Cover of Multiple-Aspect Analysis of Semantic Trajectories
dBooks

Multiple-Aspect Analysis of Semantic Trajectories

By Konstantinos Tserpes, Chiara Renso, Stan Matwin

First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...

View Book →
Cover of Enterprise Cloud Strategy
dBooks

Enterprise Cloud Strategy

By Barry Briggs, Eduardo Kassner

...

View Book →
Cover of Security and Privacy in Communication Networks
Google Books

Security and Privacy in Communication Networks

By Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore...

View Book →
Cover of Building Secure and Reliable Systems
dBooks

Building Secure and Reliable Systems

By Betsy Beyer, Piotr Lewandowski, Ana Oprea, Paul Blankinship,

Best Practices for Designing, Implementing, and Maintaining Systems...

View Book →
Cover of The Entrepreneurial Society
dBooks

The Entrepreneurial Society

By Niklas Elert, Magnus Henrekson, Mark Sanders

A Reform Strategy for the European Union...

View Book →
Cover of Financial Crisis Management and Democracy
dBooks

Financial Crisis Management and Democracy

By Bettina De Souza Guilherme, Christian Ghymers, Stephany Grif

Lessons from Europe and Latin America...

View Book →
Cover of Constructing Roma Migrants
dBooks

Constructing Roma Migrants

By Tina Magazzini, Stefano Piemontese

European Narratives and Local Governance...

View Book →
Cover of Information Security
Google Books

Information Security

By Marie A. Wright, John S. Kakalik

Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security ar...

View Book →
Cover of Intel Xeon Phi Coprocessor Architecture and Tools
dBooks

Intel Xeon Phi Coprocessor Architecture and Tools

By Rezaur Rahman

The Guide for Application Developers...

View Book →
Cover of Towards a Systemic Theory of Irregular Migration
dBooks

Towards a Systemic Theory of Irregular Migration

By Gabriel Echeverría

Explaining Ecuadorian Irregular Migration in Amsterdam and Madrid...

View Book →
Cover of ICT Systems Security and Privacy Protection
Google Books

ICT Systems Security and Privacy Protection

By Audun Jøsang, Lynn Futcher, Janne Hagen

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 ful...

View Book →
Cover of 3D Recording and Interpretation for Maritime Archaeology
dBooks

3D Recording and Interpretation for Maritime Archaeology

By John McCarthy, Jonathan Benjamin, Trevor Winton, Wendy van D

...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of Integrated Groundwater Management
dBooks

Integrated Groundwater Management

By Anthony J. Jakeman, Olivier Barreteau, Randall J. Hunt, Jean

Concepts, Approaches and Challenges...

View Book →
Cover of Models, Methods and Tools for Product Service Design
dBooks

Models, Methods and Tools for Product Service Design

By Laura Cattaneo, Sergio Terzi

The Manutelligence Project...

View Book →
Cover of Textbook of Patient Safety and Clinical Risk Management
dBooks

Textbook of Patient Safety and Clinical Risk Management

By Liam Donaldson, Walter Ricciardi, Susan Sheridan, Riccardo T

...

View Book →
Cover of Security in an Interconnected World
dBooks

Security in an Interconnected World

By Ernst Hirsch Ballin, Huub Dijstelbloem, Peter de Goede

A Strategic Vision for Defence Policy...

View Book →
Cover of Learning Microsoft SQL Server
dBooks

Learning Microsoft SQL Server

By Stack Overflow Community

...

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Database Design
dBooks

Database Design

By Adrienne Watt

...

View Book →
Cover of Computer and Information Security Handbook (2-Volume Set)
Google Books

Computer and Information Security Handbook (2-Volume Set)

By John R. Vacca

Computer and Information Security Handbook, Fourth Edition offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, along with applications and best practices, o...

View Book →
Cover of Semantic Systems. The Power of AI and Knowledge Graphs
dBooks

Semantic Systems. The Power of AI and Knowledge Graphs

By Maribel Acosta, Philippe Cudré-Mauroux, Maria Maleshkova, T

15th International Conference, SEMANTiCS 2019, Karlsruhe, Germany, September 9–12, 2019, Proceedings...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of The Future of Financial Systems in the Digital Age
dBooks

The Future of Financial Systems in the Digital Age

By Markus Heckel, Franz Waldenberger

Perspectives from Europe and Japan...

View Book →
Cover of CIA Reading Room 06215980: MODIFICATION THIRTY TWO DATED 19 JULY 2010
Internet Archive

CIA Reading Room 06215980: MODIFICATION THIRTY TWO DATED 19 JULY 2010

By CIA Reading Room

Approved for Release: 2016/01/27 C06215980 , 01.53AprwavAt.2R0.0012 AMENDMENT OF SOUCITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE � PAGE OF 1 PAGES I 3 2. AMENDMENT/MODIFICATION NO. MODIFICA...

View Book →
Cover of Fundamentals of Business Process Management
dBooks

Fundamentals of Business Process Management

By Marlon Dumas, Marcello La Rosa, Jan Mendling, Hajo A. Reijer

...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-Worl
Google Books

Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-Worl

By Mahammad Shaik, Giridhar Reddy Bojja

This comprehensive monograph delves into the integration of Identity Access Management (IAM) and Blockchain technologies, offering advanced techniques and methodologies to enhance security, privacy, a...

View Book →
Cover of Real-time Linked Dataspaces
dBooks

Real-time Linked Dataspaces

By Edward Curry

Enabling Data Ecosystems for Intelligent Systems...

View Book →
Cover of Platform Embedded Security Technology Revealed
dBooks

Platform Embedded Security Technology Revealed

By Xiaoyu Ruan

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of Proceedings
Google Books

Proceedings

By Unknown Author

No description available....

View Book →
Cover of Evolve the Monolith to Microservices with Java and Node
dBooks

Evolve the Monolith to Microservices with Java and Node

By Sandro De Santis, Luis Florez, Duy V Nguyen, Eduardo Rosa

...

View Book →