Warning: file_put_contents(cache/omni_93ca66f45a30d25f71bc111322a382c4.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Windows Server 2012 Security from End to Edge and Beyond
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book cove...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Microsoft 365 Administration Foundations
Security in Microsoft 365 can feel like a nonstop stream of alerts, dashboards, and "urgent" recommendations. This book helps you turn that noise into a clear, repeatable security workflow using Micro...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →Microsoft Defender for Endpoint
DESCRIPTION Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on w...
View Book →
Mastering Microsoft 365 Defender
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →Exam Ref SC-200 Microsoft Security Operations Analyst
Prepare for Microsoft Exam SC-200—and help demonstrate your real-world mastery of skills and knowledge required to work with stakeholders to secure IT systems, and to rapidly remediate active attack...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Use of artificial intelligence during times of conflict : International law, Australia, Brazil, Cana
"LL File No. 2025-024424." "October 2025." Includes bibliographical references. Description based on online resource, PDF version; title from cover (Law Library of Congress, viewed Nov. 25, 2025)....
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Unified SecOps Playbook
A practical guide to modern cybersecurity using Microsoft tools, covering step-by-step setup, Zero Trust AI integration, and security framework alignment Free with your book: DRM-free PDF version + ac...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →Microsoft Unified XDR and SIEM Solution Handbook
A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solution Key Features Learn how to leverage Microsoft's XDR and SIEM for long-term resilience Explore...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure, Microsoft 365, and related cloud-based Microsoft services Key Features Grasp Azure AD services and i...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →Ultimate Microsoft XDR for Full Spectrum Cyber Defence
TAGLINE Unify Your Cyber Defense, Hunt Smarter and Respond Faster with Microsoft XDR! KEY FEATURES ● Learn every component of the Defender suite, Entra ID, and Microsoft Sentinel, from fundamentals ...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →Ultimate Microsoft XDR for Full Spectrum Cyber Defence: Design, Deploy, and Operate Microsoft XDR fo
Unify Your Cyber Defense, Hunt Smarter and Respond Faster with Microsoft XDR! Key Features● Learn every component of the Defender suite, Entra ID, and Microsoft Sentinel, from fundamentals to advanc...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Mastering Microsoft Defender for Office 365
Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategies Key Features Integrate Microsof...
View Book →
Mastering Microsoft 365 Security Technologies
DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It off...
View Book →Azure Security
Azure Security is a practical guide to the native security services of Microsoft Azure written for software and security engineers building and securing Azure applications. Readers will learn how to u...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Beginning Security with Microsoft Technologies
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection i...
View Book →
How to Cheat at Configuring Open Source Security Tools
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Microsoft Defender for Endpoint in Depth
Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation strategies with this expert-led practitioner's guide. Key Features Understand the hi...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501)
This fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ exam Thoroughly revised to cover every objective on the latest vers...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →Pro Azure Governance and Security
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Mic...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), Third Edition
Written by leaders in the field of IT security higher education, the new edition of this full-color text is revised to cover the 2011 CompTIA Security+ exam. Principles of Computer Security, Third Edi...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Microsoft Security Copilot
Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscape of cyber defense Key Features Explore the Security Copilot ecosystem and learn to design effective ...
View Book →