Warning: file_put_contents(cache/omni_8f22baa8060cbcf93a15f1322701a8da.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Optics in Our Time
...
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Cultivating Teacher Resilience
International Approaches, Applications and Impact...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Developmental State Building
The Politics of Emerging Economies...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →Bangladesh Defense Policy: Foundations, Futures And Frameworks
Comprehensive Summary: "Bangladesh Defense Policy: Foundations, Futures and Frameworks" Overview This 16-part academic textbook (2026) by S M Nazmuz Sakib is a comprehensive examination of Bangladesh'...
View Book →
Building Information Modeling using Revit for Architects and Engineers
...
View Book →
25 Years of Transformations of Higher Education Systems in Post-Soviet Countries
Reform and Continuity...
View Book →Quantum-Safe Cybersecurity
Quantum-Safe Cybersecurity: Defending a Post-Quantum World by Emily Chen is a comprehensive guide to the looming cybersecurity challenges posed by quantum computing and the urgent need for quantum-res...
View Book →Six Foundations for Building Community Resilience
Six Foundations for Building Community Resilience describes how communities can approach the full scope of the 21st century's challenges equitably and sustainably. The report draws on some of the most...
View Book →
Fading Foundations
Probability and the Regress Problem...
View Book →Cryptology For Beginners
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into ...
View Book →
Digital Transformation of the Design, Construction and Management Processes of the Built Environment
...
View Book →Quantum Advantage
Quantum Advantage: Be Ahead. Be Safe. Win. is a strategic guide for executives, board members, and technology leaders facing the realities of the quantum era. Quantum computing is moving from research...
View Book →
Reading Breath in Literature
...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
The Condition of Digitality
A Post-Modern Marxism for the Practice of Digital Life...
View Book →
European Somalis' Post-Migration Movements
Mobility Capital and the Transnationalisation of Resources...
View Book →
The Human Side of Postmortems
Managing Stress and Cognitive Biases...
View Book →
Creative Clinical Teaching in the Health Professions
...
View Book →
Building the Inclusive City
Governance, Access, and the Urban Transformation of Dubai...
View Book →
Reversible Computation: Extending Horizons of Computing
Selected Results of the COST Action IC1405...
View Book →Applications and Techniques in Information Security
This book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024....
View Book →
Re-Inventing Africa's Development
Linking Africa to the Korean Development Model...
View Book →Systematic Security: Building Quantum Security
The emergence of quantum computing introduces a significant shift in the digital and security landscape—prompting organizations to reassess the foundations of how we protect information. Systematic ...
View Book →
Regeneration of the Built Environment from a Circular Economy Perspective
...
View Book →
Education and Development in Colonial and Postcolonial Africa
Policies, Paradigms, and Entanglements, 1890s–1980s...
View Book →
Transforming Trauma
Resilience and Healing Through Our Connections With Animals...
View Book →
How Generations Remember
Conflicting Histories and Shared Memories in Post-War Bosnia and Herzegovina...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Innovative Models for Sustainable Development in Emerging African Countries
...
View Book →Quantum-Resistant Databases
Quantum computing is no longer theoretical-it is an approaching reality that threatens today's encryption standards and the databases that depend on them. Quantum-Resistant Databases: Securing Data in...
View Book →
Buildings for Education
A Multidisciplinary Overview of The Design of School Buildings...
View Book →
Reality Lost
Markets of Attention, Misinformation and Manipulation...
View Book →
Louisiana's Response to Extreme Weather
A Coastal State's Adaptation Challenges and Successes...
View Book →The Zero Epoch Guidebook
Modern digital systems rely on asymmetric cryptography to establish identity, authenticate transactions, and protect communications. For decades, RSA and related algorithms have served as the mathemat...
View Book →
Shipping and Globalization in the Post-War Era
Contexts, Companies, Connections...
View Book →
Climate Risk in Africa
Adaptation and Resilience...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →Foundations of Cognitive Architectures
Cognitive architecture is a blueprint for building intelligent systems that replicate how humans think—integrating memory, perception, learning, reasoning, and decision-making into a unified framewo...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Microfinance, EU Structural Funds and Capacity Building for Managing Authorities
A Comparative Analysis of European Convergence Regions...
View Book →Quantum Security
In an era of rapid technological change, quantum computing stands poised to break the cryptographic foundations upon which our digital world is built. While many organisations see quantum threats as d...
View Book →
Building Cloud Apps with Microsoft Azure
Best practices for DevOps, data storage, high availability, and more...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →Securing AI Using Zero Trust Principles
Securing AI Using Zero Trust Principles Strategic Guidance for Defending AI Systems in a Rapidly Evolving Threat Landscape Artificial intelligence is reshaping industries, driving innovation in critic...
View Book →Advances in Cryptology – EUROCRYPT 2024
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024...
View Book →
Building Energy Modeling with OpenStudio
A Practical Guide for Students and Professionals...
View Book →
Implementing Deeper Learning and 21st Century Education Reforms
Building an Education Renaissance After a Global Pandemic...
View Book →
Perspectives on European Earthquake Engineering and Seismology
Volume 1...
View Book →
Reflections on the Fukushima Daiichi Nuclear Accident
Toward Social-Scientific Literacy and Engineering Resilience...
View Book →Cyber Security for Beginners v2
This comprehensive eBook provides an in-depth exploration of cyber security, covering fundamental principles, historical evolution, and emerging trends in the field. It outlines the roles and responsi...
View Book →
Familial Feeling
Entangled Tonalities in Early Black Atlantic Writing and the Rise of the British Novel...
View Book →Exploring Innovative Solutions to Resilience Building
No description available....
View Book →
Designing One Nation
The Politics of Economic Culture and Trade in Divided Germany...
View Book →
Your Post has been Removed
Tech Giants and Freedom of Speech...
View Book →
Trade Union Cooperation in Europe
Patterns, Conditions, Issues...
View Book →Loki’s Shield, How Quantum Computing, AI, and the Science of Randomness Will Reshape Cybersecurity
Quantum computing is opening a new frontier of technology, bringing extraordinary promise and unprecedented peril. As artificial intelligence, quantum computing, and cybersecurity threats accelerate, ...
View Book →
The Cellular Automaton Interpretation of Quantum Mechanics
...
View Book →
Creating Healthy and Sustainable Buildings
An Assessment of Health Risk Factors...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems
...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →Safeguarding 6G: Security and Privacy for the Next Generation
This book provides a comprehensive overview of security and privacy challenges in 6G networks, addressing the urgent need for advanced security frameworks as the next generation of wireless technology...
View Book →
The Values of Independent Hip-Hop in the Post-Golden Era
Hip-Hop's Rebels...
View Book →
The State of Peacebuilding in Africa
Lessons Learned for Policymakers and Practitioners...
View Book →
Advances in Proof-Theoretic Semantics
...
View Book →
Governance for Drought Resilience
Land and Water Drought Management in Europe...
View Book →
Building Games for Firefox OS
A quick guide about creating casual 2D games with HTML5...
View Book →
History Education and Conflict Transformation
Social Psychological Theories, History Teaching and Reconciliation...
View Book →Algorithms and Architectures for Parallel Processing
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, Chi...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Vote Buying in Indonesia
The Mechanics of Electoral Bribery...
View Book →
Information-Consciousness-Reality
How a New Understanding of the Universe Can Help Answer Age-Old Questions of Existence...
View Book →
Cloud Native DevOps with Kubernetes
Building, Deploying, and Scaling Modern Applications in the Cloud...
View Book →
From War to Peace in the Balkans, the Middle East and Ukraine
...
View Book →
Managing Socio-ecological Production Landscapes and Seascapes for Sustainable Communities in Asia
Mapping and Navigating Stakeholders, Policy and Action...
View Book →Building Cyber Resilience against Hybrid Threats
Today’s security environment is increasingly complex and unpredictable, with cyber attacks and hybrid warfare blurring the lines between conventional and unconventional forms of conflict, threats to...
View Book →
The Future of Service Post-COVID-19 Pandemic, Volume 1
Rapid Adoption of Digital Service Technology...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →Social Cyber Engineering and Advanced Security Algorithms
This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the moder...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Housing Estates in Europe
Poverty, Ethnic Segregation and Policy Challenges...
View Book →
Exploring Resilience
A Scientific Journey from Practice to Theory...
View Book →
Building Democracy for All
Interactive Explorations of Government and Civic Life...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
The Real-Time APIs
Design, Operation, and Observation...
View Book →
Remembering and Disremembering the Dead
Posthumous Punishment, Harm and Redemption over Time...
View Book →
Visualising Facebook
A Comparative Perspective...
View Book →
Socio-Environmental Dynamics along the Historical Silk Road
...
View Book →
Resilience: A New Paradigm of Nuclear Safety
From Accident Mitigation to Resilient Society Facing Extreme Situations...
View Book →
Modern Java EE Design Patterns
Building Scalable Architecture for Sustainable Enterprise Development...
View Book →
Building Real-World Cloud Apps with Windows Azure
Mike Wasson, Rick Anderson, Tom Dykstra...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Placing the Public in Public Health in Post-War Britain, 1948–2012
...
View Book →
Bio-based Building Skin
...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
B C, Before Computers
On Information Technology from Writing to the Age of Digital Data...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →