Warning: file_put_contents(cache/omni_3eaebd3f3d7d57ef79fe47ec8c0d055c.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Troubleshooting Configuration Manager
Microsoft System Center...
View Book →
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
...
View Book →
Managed Software Evolution
...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →UBC - Interim PIA Guidelines For Third Party Hosted Generative AI Tools 2023
Privacy Impact Assessment for Third-Party Hosted Generative AI tools conducted by The University of British Columbia in 2023. Privacy legislation in British Columbia requires public institutions to co...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →What's New in Windows Security, Productivity and Cloud; Microsoft Ignite 2024 GS06
Do your best work on Windows. Join Pavan Davuluri, Navjot Virk, Aidan Marcuss, and David Weston to learn how Windows is transforming end user computing for all with the power of AI and the Microsoft c...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →136 AI Prompts to Fast-Track Your Job Search to Your Dream Career
First published in 2023...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Data Protection for the Hybrid Cloud
Microsoft System Center...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Asylum Determination in Europe
Ethnographic Perspectives...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
Fundamentals of Azure
Microsoft Azure Essentials...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →Everything You Buy Reports To Tel Aviv
This session proves , in granular detail, that everyday Americans are being spied on by a named, foreign military–intelligence machine, not vague “big tech.” Israel Defense Forces Unit 8200 offi...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Microsoft Office 365
Connect and Collaborate Virtually Anywhere, Anytime...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →
Network Virtualization and Cloud Computing
Microsoft System Center...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →Your Replacement Is An Israeli Bot That Lies To You
🚨 YOUR REPLACEMENT HAS ARRIVED 🚨 American companies are firing their workers by the tens of thousands , handing them pink slips with "AI efficiency" written at the top. They are not simply upgra...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Introducing Vigilant Audiences
...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
The Climate-Smart Agriculture Papers
Investigating the Business of a Productive, Resilient and Low Emission Future...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
NGINX Unit Cookbook
Recipes for Using a Versatile Open Source Server...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →