Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Securing

Warning: file_put_contents(cache/omni_134d3cc9399051a24c0b07bb1f50c510.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Advanced Computing and Systems for Security
Open Library

Advanced Computing and Systems for Security

By Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Cha

First published in 2015...

View Book →
Cover of Security analysis and portfolio management
Open Library

Security analysis and portfolio management

By Donald E. Fischer

First published in 1975...

View Book →
Cover of A low-cost method for measuring air infiltration rates in a large sample of dwellings
Internet Archive

A low-cost method for measuring air infiltration rates in a large sample of dwellings

By Grot, Richard A.

Available on Internet Archive....

View Book →
Cover of India's National Security
Open Library

India's National Security

By Satish Kumar

First published in 2010...

View Book →
Cover of Information Security
Open Library

Information Security

By Mark Stamp

First published in 2005...

View Book →
Cover of Maximum Security (CHERUB)
Open Library

Maximum Security (CHERUB)

By Robert Muchamore

First published in 2005...

View Book →
Cover of Regulating Content on Social Media
dBooks

Regulating Content on Social Media

By Corinne Tan

Copyright, Terms of Service and Technological Features...

View Book →
Cover of Intelligence Unleashed
dBooks

Intelligence Unleashed

By Rose Luckin, Wayne Holmes, Mark Griffiths, Laurie B. Corcier

An argument for AI in Education...

View Book →
Cover of Securing democracy : why we have an electoral college
Internet Archive

Securing democracy : why we have an electoral college

By Gregg, Gary L., 1967-

Includes bibliographical references (p. [145]-155) and index...

View Book →
Cover of An Oral History of the Special Olympics in China Volume 3
dBooks

An Oral History of the Special Olympics in China Volume 3

By William P. Alford, Mei Liao, Fengming Cui

Finding and Keeping a Job...

View Book →
Cover of Security as Code
dBooks

Security as Code

By BK Sarthak Das, Virginia Chu

DevSecOps Patterns with AWS...

View Book →
Cover of High tech and high touch : headhunting, technology, and economic transformation
Internet Archive

High tech and high touch : headhunting, technology, and economic transformation

By Coverdill, James E., author

x, 191 pages ; 23 cm...

View Book →
Cover of Letter Circular 401: railway track scale testing service of the National Bureau of Standards fiscal
Internet Archive

Letter Circular 401: railway track scale testing service of the National Bureau of Standards fiscal

By National Bureau of Standards

Available on Internet Archive....

View Book →
Cover of Node.js Notes for Professionals
dBooks

Node.js Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of A secure marriage
Open Library

A secure marriage

By Diana Hamilton

First published in 1989...

View Book →
Cover of Security Analysis
Open Library

Security Analysis

By Benjamin Graham, David Dodd, David Dodd, Seth Klarman

First published in 1934...

View Book →
Cover of Microsoft Platform and Tools for Mobile App Development
dBooks

Microsoft Platform and Tools for Mobile App Development

By Cesar de la Torre, Simon Calvert

...

View Book →
Cover of Security Engineering
Open Library

Security Engineering

By Ross J. Anderson

First published in 2001...

View Book →
Cover of Energy Demand Challenges in Europe
dBooks

Energy Demand Challenges in Europe

By Frances Fahy, Gary Goggins, Charlotte Jensen

Implications for policy, planning and practice...

View Book →
Cover of Notice
Internet Archive

Notice

By Unknown Author

Journal of Research of the National Bureau of Standards...

View Book →
Cover of The web application hacker's handbook
Open Library

The web application hacker's handbook

By Dafydd Stuttard, Dafydd Stuttard

First published in 2007...

View Book →
Cover of A Ring to Secure His Heir
Open Library

A Ring to Secure His Heir

By Lynne Graham

First published in 2012...

View Book →
Cover of Security in computing
Open Library

Security in computing

By Charles P. Pfleeger, Charles P. Pfleeger, Shari Lawrence Pfl

First published in 1989...

View Book →
Cover of Demon Seed
Open Library

Demon Seed

By Dean Koontz

First published in 1973...

View Book →
Cover of European information technology law.
Open Library

European information technology law.

By Unknown Author

First published in 1994...

View Book →
Cover of The NICE Cyber Security Framework
Open Library

The NICE Cyber Security Framework

By Izzat Alsmadi

First published in 2019...

View Book →
Cover of Evaluation of endotracheal intubating conditions without the use of muscle relaxants following induc
Internet Archive

Evaluation of endotracheal intubating conditions without the use of muscle relaxants following induc

By Rajan, Sunil, Gotluru, Priyanka, Andews, Susamma, Paul, Jerr

This article is from Journal of Anaesthesiology, Clinical Pharmacology , volume 30 . Abstract Background and Aims:: Children with facial clefts are usually difficult to intubate and it is considered s...

View Book →
Cover of Securing your business using pix device manager
Internet Archive

Securing your business using pix device manager

By Abelar, Greg

1 online resource...

View Book →
Cover of America's national parks and their keepers
Internet Archive

America's national parks and their keepers

By Foresta, Ronald A., 1944-

xiv, 382 pages : 24 cm...

View Book →
Cover of Learning Node.js
dBooks

Learning Node.js

By Stack Overflow Community

...

View Book →
Cover of Miss Beecher's Housekeeper and Healthkeeper: Containing Five Hundred Receipes for Economical and Hea
Project Gutenberg

Miss Beecher's Housekeeper and Healthkeeper: Containing Five Hundred Receipes for Economical and Hea

By Beecher, Catharine Esther

Public domain book available via Project Gutenberg....

View Book →
Cover of Federal Information Processing Standards Publication: recorded magnetic tape for information interch
Internet Archive

Federal Information Processing Standards Publication: recorded magnetic tape for information interch

By National Bureau of Standards

Available on Internet Archive....

View Book →
Cover of Letter Circular 380: acoustical publications by members of the staff of the Bureau of Standards
Internet Archive

Letter Circular 380: acoustical publications by members of the staff of the Bureau of Standards

By National Bureau of Standards

Available on Internet Archive....

View Book →
Cover of The Art of Deception
Open Library

The Art of Deception

By Kevin D. Mitnick, William L. Simon

First published in 2001...

View Book →
Cover of Permanent Record
Open Library

Permanent Record

By Edward Snowden

First published in 2019...

View Book →
Cover of Guide to personal financial planning for the Armed Forces
Internet Archive

Guide to personal financial planning for the Armed Forces

By Gayton, S. Jamie

vi, 330 p. ; 23 cm...

View Book →
Cover of Jenkins: The Definitive Guide
dBooks

Jenkins: The Definitive Guide

By John Ferguson Smart

Continuous Integration for the Masses...

View Book →
Cover of Migrating SQL Server Databases to Azure
dBooks

Migrating SQL Server Databases to Azure

By Carl Rabeler

Microsoft Azure Essentials...

View Book →
Cover of Survival: Security logbook
Open Library

Survival: Security logbook

By Scott Cawthon

First published in 2017...

View Book →
Cover of Canada and the Third World : overlapping histories
Internet Archive

Canada and the Third World : overlapping histories

By Unknown Author

xii, 281 pages ; 23 cm...

View Book →
Cover of Letter Circular 971: performance of wrist watches
Internet Archive

Letter Circular 971: performance of wrist watches

By National Bureau of Standards

Available on Internet Archive....

View Book →
Cover of Delight and power in speech : $b A universal dramatic reader; a new, complete and practical method o
Project Gutenberg

Delight and power in speech : $b A universal dramatic reader; a new, complete and practical method o

By James, George Wharton, Nattkemper, Leonard G.

Public domain book available via Project Gutenberg....

View Book →
Cover of Network Security
Open Library

Network Security

By Ankit Fadia

First published in 2002...

View Book →
Cover of A Plan for Securing Observations of the Variable Stars
Project Gutenberg

A Plan for Securing Observations of the Variable Stars

By Pickering, Edward C. (Edward Charles)

Public domain book available via Project Gutenberg....

View Book →
Cover of Fire hazard tests of substitute duct materials
Internet Archive

Fire hazard tests of substitute duct materials

By Hutton, A C., Gross, D.

Available on Internet Archive....

View Book →
Cover of PCI DSS Certification In UAE 2025 Compliance & Assessment
Internet Archive

PCI DSS Certification In UAE 2025 Compliance & Assessment

By Unknown Author

PCI DSS Certification in the UAE is crucial for securing cardholder data. It ensures compliance, protects against cyber threats, and builds trust. Businesses must undergo assessments and meet standard...

View Book →
Cover of Through the school: The experiences of a mill boy in securing an education
Project Gutenberg

Through the school: The experiences of a mill boy in securing an education

By Brown, Frederic Kenyon

Public domain book available via Project Gutenberg....

View Book →
Cover of API Traffic Management 101
dBooks

API Traffic Management 101

By Mike Amundsen

From Monitoring to Managing and Beyond...

View Book →
Cover of Letter Circular 381: suggested information on reconditioning home interiors - furniture and built-in
Internet Archive

Letter Circular 381: suggested information on reconditioning home interiors - furniture and built-in

By Advisory Committee on Reconditioning, Remodeling, and Modern

Available on Internet Archive....

View Book →
Cover of Job search in academe : how to get the position you deserve
Internet Archive

Job search in academe : how to get the position you deserve

By Formo, Dawn M. (Dawn Marie), 1968-

x, 268 p. ; 24 cm...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of CIA Reading Room cia-rdp67-00059a000400290070-9: ORR DIARY, 21 MARCH 1952
Internet Archive

CIA Reading Room cia-rdp67-00059a000400290070-9: ORR DIARY, 21 MARCH 1952

By CIA Reading Room

~x ,j-Approved For Release ?O 1/07/26 : CIA-RDP67-00059AO004002QW70-9 S E-C -R-E- T s 1- ORR DIARY, 21 "daroh 1952 NOTICE ? S/TF Service Section urgently requests the documents listed below, all of wh...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Wordpress In A Week
dBooks

Wordpress In A Week

By Zak Cagaros

...Or Less...

View Book →
Cover of Kafka: The Definitive Guide
dBooks

Kafka: The Definitive Guide

By Gwen Shapira, Todd Palino, Rajini Sivaram, Krit Petty

Real-Time Data and Stream Processing at Scale...

View Book →
Cover of Linux Appliance Design
dBooks

Linux Appliance Design

By Bob Smith, John Hardin, Graham Phillips, Bill Pierce

A Hands-on Guide to Building Linux Appliances...

View Book →
Cover of Cyber Security
Open Library

Cyber Security

By Martti Lehto, Pekka Neittaanmäki

First published in 2015...

View Book →