Warning: file_put_contents(cache/omni_9200db15321c917e80e718c66a7d35c8.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Migration, Gender and Social Justice
Perspectives on Human Insecurity...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Target Suitability and the Crime Drop
...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Cloud Design Patterns
Prescriptive Architecture Guidance for Cloud Applications...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Affect and Mathematics Education
Fresh Perspectives on Motivation, Engagement, and Identity...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →
The Indigenous Identity of the South Saami
Historical and Political Perspectives on a Minority within a Minority...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Ethnic Identity, Social Mobility and the Role of Soulmates
...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Implementation of EU Readmission Agreements
Identity Determination Dilemmas and the Blurring of Rights...
View Book →
The Emigrant Communities of Latvia
National Identity, Transnational Belonging, and Diaspora Politics...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Mobilities, Boundaries, and Travelling Ideas
Rethinking Translocality Beyond Central Asia and the Caucasus...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Attitudes, Beliefs, Motivation and Identity in Mathematics Education
An Overview of the Field and Future Directions...
View Book →
Multiculturalism and Conflict Reconciliation in the Asia-Pacific
Migration, Language and Politics...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
The Internet Myth
From the Internet Imaginary to Network Ideologies...
View Book →
Social Statistics and Ethnic Diversity
Cross-National Perspectives in Classifications and Identity Politics...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →