Warning: file_put_contents(cache/omni_bbf7c4bce74d7ca8700455e63efe7ef1.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Programming Windows Store Apps with HTML, CSS, and JavaScript
...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Learning Neo4j
Run blazingly fast queries on complex graph datasets with the power of the Neo4j graph database...
View Book →
Paths to the Emerging State in Asia and Africa
...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Innovation, Economic Development, and Intellectual Property in India and China
Comparing Six Economic Sectors...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Managing the Complexity of Critical Infrastructures
A Modelling and Simulation Approach...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
The Archaeology of Europe’s Drowned Landscapes
...
View Book →
S-BPM Illustrated
A Storybook about Business Process Modeling and Execution...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Building Information Modeling using Revit for Architects and Engineers
...
View Book →
Multilevel Modelling for Public Health and Health Services Research
Health in Context...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Managed Software Evolution
...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Collaborating Against Child Abuse
Exploring the Nordic Barnahus Model...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
Principles and Practice of Case-based Clinical Reasoning Education
A Method for Preclinical Students...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
The Missing Link
An Introduction to Web Development and Programming...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Managing Protected Areas in Central and Eastern Europe Under Climate Change
...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Evolution, Monitoring and Predicting Models of Rockburst
Precursor Information for Rock Failure...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Impact of Information Society Research in the Global South
...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 3)
A Focus on Non-EU Sending States...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →