Warning: file_put_contents(cache/omni_554d046e146698470e3a56af7da34bd3.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Community-Oriented Policing and Technological Innovations
...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Investigations Into the Phenomenology and the Ontology of the Work of Art
What are Artworks and How Do We Experience Them?...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →