Warning: file_put_contents(cache/omni_019a1545b5e299d49101810948e3e236.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Access controlled : the shaping of power, rights, and rule in cyberspace
Report from the OpenNet Initiative. Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Interpersonal Communication
...
View Book →Microsoft 365 Administrator MS-102 Exam Guide
A comprehensive MS-102 exam guide offering practical insights, from provisioning Microsoft 365 to mastering Defender components, ensuring not just exam success but true expertise Purchase of the book ...
View Book →
Advanced Professional Communication
A Principled Approach to Workplace Writing...
View Book →Microsoft Security Development Lifecycle
What other areas of the organization might benefit from the Microsoft Security Development Lifecycle team's improvements, knowledge, and learning? Is there a Microsoft Security Development Lifecycle C...
View Book →International Who's Who of Professional Management
No description available....
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →BNA's Electronic Information Policy & Law Report
No description available....
View Book →
Risk Communication for the Future
Towards Smart Risk Governance and Safety Management...
View Book →
Law, privacy, and surveillance in Canada in the post-Snowden era
Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →Beginning Security with Microsoft Technologies
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection i...
View Book →Microsoft Defender for Cloud
The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tr...
View Book →
mHealth Innovation in Asia
Grassroots Challenges and Practical Interventions...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Use of artificial intelligence during times of conflict : International law, Australia, Brazil, Cana
"LL File No. 2025-024424." "October 2025." Includes bibliographical references. Description based on online resource, PDF version; title from cover (Law Library of Congress, viewed Nov. 25, 2025)....
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Results of the Lake Michigan Mass Balance Project : atrazine modeling report
"EPA-600/R-08/111." "September 2008." Includes bibliographical references. Also available in digital form....
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Simplified Signs, Volume 1
A Manual Sign-Communication System for Special Populations...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Science, information, and policy interface for effective coastal and ocean management
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →Microsoft Purview 2025
This book is part of the Microsoft Purview 2025 series, covering the Microsoft Purview "Security Solutions ". Who is this book for This book assumes a foundational understanding of information securit...
View Book →
Observing the Volcano World
Volcano Crisis Communication...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
The clinical legal education handbook
The Clinical Legal Education Handbook is intended to act as a good practice guide and practical resource for those engaged in the design and delivery of clinical legal education programmes at universi...
View Book →
Microsoft AB-730: AI Business Professional Certification
About the AB-730: AI Business Professional Exam Study Guide This comprehensive study guide is designed to equip you with the knowledge and resources necessary to excel in the AB-730: AI Business Profe...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Impact of Information Society Research in the Global South
...
View Book →
Communication and Bioethics at the End of Life
Real Cases, Real Dilemmas...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →http://www.digitalpreservation.gov/multimedia/documents/ndiipp-states-report032612_final.pdf
States of Sustainability: A Review of State Projects funded by the National Digital Information Infrastructure and Preservation Program (NDIIPP) May 2012 Christopher A. Lee University of North Carolin...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
The copyright pentalogy : how the Supreme Court of Canada shook the foundations of Canadian copyrigh
In the summer of 2012, the Supreme Court of Canada issued rulings on five copyright cases in a single day. The decisions, which were quickly dubbed "the copyright pentalogy," represent a seismic shift...
View Book →
Gender equality and work-life balance : glass handcuffs and working men in the U.S.
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Introducing Microsoft Purview
Microsoft Purview is an integrated Information governance platform that provides organizations with the tools needed to manage, discover, and protect their information assets across on-premises, multi...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →
Interdisciplinary Insights for Digital Touch Communication
...
View Book →
Microservices Best Practices for Java
...
View Book →
Human rights in the age of platforms
"What are the human rights implications and effects of a commercialized public sphere? Private companies mediate most of our time online. Internet companies manage the web-based public infrastructure,...
View Book →
Environmental Financial Advisory Board
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Microsoft SC-401 Exam Practice Questions: 290+ Exam-Style Q&A with Explanations | Information Securi
Structured to Help You Pass the SC-401 Exam with this 290+ Practice Questions & Answers Question Bank! Prepare for Microsoft’s SC‑401: Administering Information Security in Microsoft 365 with 290+...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Communicative Figurations
Transforming Communications in Times of Deep Mediatization...
View Book →
SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide
The SC-900: Microsoft Security, Compliance, and Identity Fundamentals book serves as a comprehensive guide to understanding the core principles of security, compliance, and identity (SCI) in Microsoft...
View Book →
Negotiating Internet governance
This book provides an incisive analysis of the emergence and evolution of global Internet governance, revealing its mechanisms, key actors and dominant community practices. Based on extensive empirica...
View Book →
Transmedial Narration
Narratives and Stories in Different Media...
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Council of Councils
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →Microsoft Azure Sentinel
Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streaml...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Introducing Vigilant Audiences
...
View Book →Microsoft Cloud Security for the C-level
This book will give you the essential information you need to understand the new security suite from Microsoft. This full cover book is designed to be quick to read and act as a workbook with lots of ...
View Book →CIA Reading Room 06208008: STATEMENT OF WORK FOR SUPPORT TO INFORMATION REVIEW AND RELEASE (SIRR)
Approved for Release: 2017/03/15 C06208008 UNCLASSIFIED Statement of Work For Support to Information Review and Release (SIRR) Prepared by Information Management Services May 2, 2008 UNCLASSIFIED Appr...
View Book →
Government responses to disinformation on social media platforms
"September 2019." "Report for Congress, LL file no. 2019-017919." "Argentina, Australia, Canada, China, Denmark, Egypt, European Union, France, Germany, India, Israel, Mexico, Russian Federation, Swed...
View Book →
Government information in Canada : access and stewardship
"Public access to government information forms the foundation of a healthy liberal democracy, but because this information can be precarious, it needs stewardship. Government Information in Canada pro...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Homeland Security Advisory Council
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
EPA Science Advisory Board
Federal Advisory Committee depository collection. For joint meetings conducted with the Federal Insecticide, Fungicide and Rodenticide Act Scientific Advisory Panel, see record for that panel. Committ...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →Computerworld
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-mon...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →Microsoft Purview 101
Microsoft Purview 101: The Microsoft Purview Companion Series Data security is no longer optional-it's essential. With cyber threats, data leaks, and regulatory compliance demands on the rise, organiz...
View Book →
The ILO @ 100 : addressing the past and future of work and social protection
Includes bibliographical references and index. Description based on print version record and CIP data provided by publisher; resource not viewed....
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Bitcoin and beyond : cryptocurrencies, blockchains and global governance
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Microsoft Word - Disaster Workbook Complete Text with Revisions 2 Sept 2006 revised 2 June 2009.doc
Department of Defense Legacy Resource Management Program Project Number 03178 Disaster Preparedness Workbook for Cultural Institutions Within the Military Beth Patkus and Robert E. Schnare Di...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
...
View Book →
Microsoft Purview
Microsoft Purview: Compliance Readiness Aligning Microsoft Purview with GDPR, HIPAA, and NIST In today's complex regulatory landscape, compliance is no longer optional-it's essential. Whether you're d...
View Book →