Warning: file_put_contents(cache/omni_96bf9df69fbf74c1ff504b260bd87545.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Mastering Windows Security and Hardening
A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threats Key Features Learn to protect your Windows environment using zero-tru...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Managing Sustainable Business
An Executive Education Case and Textbook...
View Book →
Financial Management for Small Businesses
Financial Statements & Present Value Models...
View Book →
Disrupting Finance
FinTech and Strategy in the 21st Century...
View Book →
The Piracy Crusade
How the Music Industry's War on Sharing Destroys Markets and Erodes Civil Liberties...
View Book →
97 Things Every SRE Should Know
Collective Wisdom from the Experts...
View Book →
Bioinformatics for Evolutionary Biologists
A Problems Approach...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Global Business Strategy
Multinational Corporations Venturing into Emerging Markets...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →IoT and OT Security Handbook
Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devices Purchase of the print or Kindle book includes a free PDF eBook Key FeaturesIdentify and resol...
View Book →
Analyzing Qualitative Data with MAXQDA
Text, Audio, and Video...
View Book →
Business Ethics - A Philosophical and Behavioral Approach
...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Entertainment Science
Data Analytics and Practical Theory for Movies, Games, Books, and Music...
View Book →
The Brownian Motion
A Rigorous but Gentle Introduction for Economists...
View Book →Microsoft Azure Security Center
The definitive practical guide to Azure Security Center, 50%+ rewritten for new features, capabilities, and threats Extensively revised for updates through spring 2021 this guide will help you safegua...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Drones and the Creative Industry
Innovative Strategies for European SMEs...
View Book →
Principles of Computer Security, Fourth Edition
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Se...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Factories of the Future
The Italian Flagship Initiative...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →Who's who in the South and Southwest
Includes names from the States of Alabama, Arkansas, the District of Columbia, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas and Virgin...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →Architecting IoT Solutions on Azure
How can you make sense of the complex IoT landscape? With dozens of components ranging from devices to metadata about the devices, it's easy to get lost among the possibilities. But it's not impossibl...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
The Future of Service Post-COVID-19 Pandemic, Volume 1
Rapid Adoption of Digital Service Technology...
View Book →Windows Ransomware Detection and Protection
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threats Purchase of the print or Kindle book includes a free PDF eBook Key Features...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Introductory Business Statistics
...
View Book →
Industry 4.0 for SMEs
Challenges, Opportunities and Requirements...
View Book →
Market Segmentation Analysis
Understanding It, Doing It, and Making It Useful...
View Book →
Dynamics of Long-Life Assets
From Technology Adaptation to Upgrading the Business Model...
View Book →
Essentials of Business Analytics
An Introduction to the Methodology and its Applications...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Diversity and Inclusion in Global Higher Education
Lessons from Across Asia...
View Book →
Understanding Risks and Uncertainties in Energy and Climate Policy
Multidisciplinary Methods and Tools for a Low Carbon Society...
View Book →
Innovations in Derivatives Markets
Fixed Income Modeling, Valuation Adjustments, Risk Management, and Regulation...
View Book →
A Concise Guide to Market Research
The Process, Data, and Methods Using IBM SPSS Statistics...
View Book →
Modern Web Development on the JAMstack
Modern Techniques for Ultra Fast Sites and Web Applications...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Responsible Innovation
Business Opportunities and Strategies for Implementation...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →Genesee County, Michigan City Directory
No description available....
View Book →
Can Music Make You Sick?
Measuring the Price of Musical Ambition...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Measuring the Business Value of Cloud Computing
...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
RESTART Sustainable Business Model Innovation
...
View Book →
Digital Business Models
Concepts, Models, and the Alphabet Case Study...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Business Process Management Cases
Digital Innovation and Business Transformation in Practice...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →Mastering Microsoft Defender for Office 365
Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategies Key Features Integrate Microsof...
View Book →
Applied Quantitative Finance
...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Architecture and the Novel under the Italian Fascist Regime
...
View Book →
Designing Digital Work
Concepts and Methods for Human-centered Digitization...
View Book →F&S Index United States Annual
No description available....
View Book →