Warning: file_put_contents(cache/omni_a25f2ecc4011422fdf74db6e8ec14c5a.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Economic Evaluation of Sustainable Development
...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security D...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide
The SC-900: Microsoft Security, Compliance, and Identity Fundamentals book serves as a comprehensive guide to understanding the core principles of security, compliance, and identity (SCI) in Microsoft...
View Book →
The Big Data Agenda
Data Ethics and Critical Data Studies...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Microsoft Purview 101
Microsoft Purview 101: The Microsoft Purview Companion Series Data security is no longer optional-it's essential. With cyber threats, data leaks, and regulatory compliance demands on the rise, organiz...
View Book →Mastering Microsoft 365 Security Technologies
DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It off...
View Book →Microsoft Purview 2025
This book is part of the Microsoft Purview 2025 series, covering the Microsoft Purview "Security Solutions ". Who is this book for This book assumes a foundational understanding of information securit...
View Book →
Computational Conflict Research
...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Cloud Design Patterns
Prescriptive Architecture Guidance for Cloud Applications...
View Book →
The EU and China in African Authoritarian Regimes
Domestic Politics and Governance Reforms...
View Book →
Disrupting Finance
FinTech and Strategy in the 21st Century...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
SQL Server Source Control Basics
...
View Book →Azure Fundamentals (AZ-900) Study Guide
Cloud computing is no longer just a buzzword but a crucial skill set for today's professionals. The ability to navigate the complexities of cloud technologies and understand the Azure environment is a...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →Microsoft Purview Crash Course
Microsoft Purview has quickly become a critical tool for protecting sensitive data, managing compliance, and preventing data leaks across Microsoft 365. Yet for many administrators and security teams,...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →Fundamentals of Cloud Security
Fundamentals of Cloud Security offers a structured, framework-based approach to understanding, implementing, and securing cloud environments. Built around the NIST Cybersecurity Framework, it connects...
View Book →
The Enterprise Path to Service Mesh Architectures
Decoupling at Layer 5...
View Book →
Estimating Illicit Financial Flows
A Critical Guide to the Data, Methodologies, and Findings...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
The Data Journalism Handbook
How Journalists Can Use Data to Improve the News...
View Book →
Big Data in Context
Legal, Social and Technological Insights...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2018...
View Book →
Multimedia Big Data Computing for IoT Applications
Concepts, Paradigms and Solutions...
View Book →
Agroecology Now!
Transformations Towards More Just and Sustainable Food Systems...
View Book →Introducing Microsoft Purview
Microsoft Purview is an integrated Information governance platform that provides organizations with the tools needed to manage, discover, and protect their information assets across on-premises, multi...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Principles of Finance
...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →Implementing and Administering Security in a Microsoft Windows 2000 Network Infrastructure
Learn how to implement security services for a Windows� 2000 network-and prepare for the Microsoft� Certified Professional (MCP) Exam-with this official Microsoft study guide. Work at your own pac...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →Microsoft Purview - A Beginner's Guide (2025)
In today's world, data is both your greatest asset and your greatest challenge. Every organization must know where its data lives, who has access, how it's used, and whether it's secure. This isn't ju...
View Book →
Evolve the Monolith to Microservices with Java and Node
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Blockchain and Crypt Currency
Building a High Quality Marketplace for Crypt Data...
View Book →
The European Higher Education Area
Between Critical Reflections and Future Policies...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Generative AI in Cybersecurity
This book explores the most common generative AI (GenAI) tools and techniques used by malicious actors for hacking and cyber-deception, along with the security risks of large language models (LLMs). I...
View Book →
Critical Data Literacy
Strategies to Effectively Interpret and Evaluate Data Visualizations...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Entertainment Science
Data Analytics and Practical Theory for Movies, Games, Books, and Music...
View Book →
Papua New Guinea
Government, Economy and Society...
View Book →
Data Structures and Algorithms
Annotated Reference with Examples...
View Book →
SQL Server Execution Plans, 3rd Edition
For SQL Server 2008 through to 2017 and Azure SQL Database...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →Microsoft Information Protection Administrator SC-400 Certification Guide
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365 Key Features Design, implement, and administer Microsoft Information Protection ...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →Cloud Forensics Demystified
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approaches Key Features Uncover the steps involved in clo...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Handbook of Vascular Biometrics
...
View Book →