Warning: file_put_contents(cache/omni_5dcc3d83e14e8d4db537af57f9177fd1.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Representations of Transnational Human Trafficking
Present-day News Media, True Crime, and Fiction...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
Modern Web Development on the JAMstack
Modern Techniques for Ultra Fast Sites and Web Applications...
View Book →
Introducing Vigilant Audiences
...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Research, Ethics and Risk in the Authoritarian Field
...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Children's Exploration and Cultural Formation
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Food Anxiety in Globalising Vietnam
...
View Book →
Early Childhood Policies and Systems in Eight Countries
Findings from IEA's Early Childhood Education Study...
View Book →
Environmental Governance in Latin America
...
View Book →“The” Illustrated London News
No description available....
View Book →
The State of Peacebuilding in Africa
Lessons Learned for Policymakers and Practitioners...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Geographies of Asylum in Europe and the Role of European Localities
...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →
Primary Angioplasty
A Practical Guide...
View Book →
The Interconnected Arctic - UArctic Congress 2016
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Agricultural and Forestry Reconstruction After the Great East Japan Earthquake
Tsunami, Radioactive, and Reputational Damages...
View Book →
Invasive Species in Forests and Rangelands of the United States
A Comprehensive Science Synthesis for the United States Forest Sector...
View Book →
Old and New Perspectives on Mortality Forecasting
...
View Book →The World Almanac & Book of Facts
No description available....
View Book →
The Entrepreneurial Society
A Reform Strategy for the European Union...
View Book →
Cold Micro Metal Forming
Research Report of the Collaborative Research Center "Micro Cold Forming" (SFB 747), Bremen, Germany...
View Book →
Talent Development in European Higher Education
Honors programs in the Benelux, Nordic and German-speaking countries...
View Book →Annual Report - Small Business Administration
No description available....
View Book →
97 Things Every SRE Should Know
Collective Wisdom from the Experts...
View Book →
Status and Dynamics of Forests in Germany
Results of the National Forest Monitoring...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Technological and Institutional Innovations for Marginalized Smallholders in Agricultural Developmen
...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Bordieuan Field Theory as an Instrument for Military Operational Analysis
...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Evaluating Climate Change Action for Sustainable Development
...
View Book →
Lloyd's List Ports of the World
No description available....
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Pentecostalism and Witchcraft
Spiritual Warfare in Africa and Melanesia...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
Making Medicines in Africa
The Political Economy of Industrializing for Local Health...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →
API Traffic Management 101
From Monitoring to Managing and Beyond...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Next Generation Supply Chains
A Roadmap for Research and Innovation...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III...
View Book →
Designing Sustainable Energy for All
Sustainable Product-Service System Design Applied to Distributed Renewable Energy...
View Book →
Microservices Best Practices for Java
...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →Facts & Reports
Press cuttings on Angola, Mozambique, Guinea-Bissau, Portugal, & Southern Africa....
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
River Basin Development and Human Rights in Eastern Africa — A Policy Crossroads
...
View Book →
Managed Software Evolution
...
View Book →Minneapolis Star and Tribune Index
No description available....
View Book →
Quick Guide For Firefox OS App Development
Creating HTML5 based apps for Firefox OS...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Load Balancing in the Cloud
Practical Solutions with NGINX and AWS...
View Book →
Ecosystem Services for Well-Being in Deltas
Integrated Assessment for Policy Analysis...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →