Warning: file_put_contents(cache/omni_fcab1e0509d38c2b9c0b5e044e8c91ae.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
MD-102 Practice Questions for Microsoft Endpoint Administrator Associate Certification
NotJustExam - MD-102 Practice Questions for Microsoft Endpoint Administrator Associate Certification Struggling to find quality study materials for the Microsoft Certified Endpoint Administrator Assoc...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
SC-100 Practice Questions for Microsoft Cybersecurity Architect Expert Certification
NotJustExam - SC-100 Practice Questions for Microsoft Cybersecurity Architect Expert Certification Struggling to find quality study materials for the Microsoft Certified Cybersecurity Architect Expert...
View Book →Reimagine Remote Working with Microsoft Teams
Get a 360-degree view of Teams as a secure collaboration tool with best practices and recommendations for using Teams efficiently Key Features Master and manage virtual meetings easily using Teams Und...
View Book →Learning Microsoft Endpoint Manager
The first-ever book on Microsoft Endpoint Manager (MEM), written by Microsoft Program Manager Scott Duffey! Did you just land an IT job only to learn your new employer is using Microsoft Endpoint Mana...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →MDM: Fundamentals, Security, and the Modern Desktop
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations acro...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Mastering Endpoint Management using Microsoft Intune Suite
Unlock the full potential of Microsoft Intune Suite with hands-on deployment, policy control, architecture insights, and real-world troubleshooting guidance Key Features Explore the most comprehensive...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Remote Capture
Digitising Documentary Heritage in Challenging Locations...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →19th International Conference on Cyber Warfare and Security
These proceedings represent the work of contributors to the 19th International Conference on Cyber Warfare and Security (ICCWS 2024), hosted University of Johannesburg, South Africa on 26-27 March 202...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Remote Sensing of Plant Biodiversity
...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →Microsoft 365 Mobility and Security ‚Äö√Ñ√ ̈ Exam Guide MS-101
Get up to speed with planning, deploying, and managing Microsoft Office 365 services and gain the skills you need to pass the MS-101 exam Key Features Explore everything from mobile device management ...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
97 Things Every SRE Should Know
Collective Wisdom from the Experts...
View Book →
Manual of Digital Earth
...
View Book →Mastering Microsoft Intune
Get ready to master Microsoft Intune and revolutionize your endpoint management strategy with this comprehensive guide and provide next-level security with the Intune Suite. Includes forewords from Sc...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Mastering Windows 365
Unlock advanced IT Pro skills for Windows 365, Intune, Intune Suite, Microsoft Copilot, AI PCs, and more—build expertise from the ground up! Key Features Practical guide to deploying and managing Wi...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Ex
Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehen...
View Book →The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security D...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →MS-900 Practice Questions for Microsoft Fundamentals Certification
NotJustExam - MS-900 Practice Questions for Microsoft Fundamentals Certification Struggling to find quality study materials for the Microsoft Certified Fundamentals (MS-900) exam? Our question bank of...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Ultimate Microsoft Intune for Administrators
TAGLINE Practical Tips and Real-World Solutions for Administering Microsoft Intune KEY FEATURES ● Acquire hands-on expertise in device enrollment and management. ● Develop robust security and comp...
View Book →
MICROSOFT INTUNE BREAKDOWN
Microsoft Intune stands at the forefront of this transformation as a cloud-based unified endpoint management (UEM) platform. It provides comprehensive tools for managing devices, applications, and sec...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →IT Auditing Using Controls to Protect Information Assets, Third Edition
Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explai...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Microsoft Intune Cookbook
Updated edition of Packt's trusted, top-selling Intune title, this cookbook helps you solve daily admin challenges faster using proven workflows, PowerShell and Microsoft Graph automation, reporting, ...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Cloud Design Patterns
Prescriptive Architecture Guidance for Cloud Applications...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →