Warning: file_put_contents(cache/omni_134d3cc9399051a24c0b07bb1f50c510.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Advanced Computing and Systems for Security
First published in 2015...
View Book →
Security analysis and portfolio management
First published in 1975...
View Book →A low-cost method for measuring air infiltration rates in a large sample of dwellings
Available on Internet Archive....
View Book →
Regulating Content on Social Media
Copyright, Terms of Service and Technological Features...
View Book →
Intelligence Unleashed
An argument for AI in Education...
View Book →Securing democracy : why we have an electoral college
Includes bibliographical references (p. [145]-155) and index...
View Book →
An Oral History of the Special Olympics in China Volume 3
Finding and Keeping a Job...
View Book →
High tech and high touch : headhunting, technology, and economic transformation
x, 191 pages ; 23 cm...
View Book →Letter Circular 401: railway track scale testing service of the National Bureau of Standards fiscal
Available on Internet Archive....
View Book →
Security Analysis
First published in 1934...
View Book →Circular of the Bureau of Standards no. 178: United States government master specification for the c
Available on Internet Archive....
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Energy Demand Challenges in Europe
Implications for policy, planning and practice...
View Book →Notice
Journal of Research of the National Bureau of Standards...
View Book →
The web application hacker's handbook
First published in 2007...
View Book →
Security in computing
First published in 1989...
View Book →
European information technology law.
First published in 1994...
View Book →
Economics of Land Degradation and Improvement – A Global Assessment for Sustainable Development
...
View Book →
The NICE Cyber Security Framework
First published in 2019...
View Book →
Evaluation of endotracheal intubating conditions without the use of muscle relaxants following induc
This article is from Journal of Anaesthesiology, Clinical Pharmacology , volume 30 . Abstract Background and Aims:: Children with facial clefts are usually difficult to intubate and it is considered s...
View Book →Securing your business using pix device manager
1 online resource...
View Book →America's national parks and their keepers
xiv, 382 pages : 24 cm...
View Book →
Miss Beecher's Housekeeper and Healthkeeper: Containing Five Hundred Receipes for Economical and Hea
Public domain book available via Project Gutenberg....
View Book →Federal Information Processing Standards Publication: recorded magnetic tape for information interch
Available on Internet Archive....
View Book →Letter Circular 380: acoustical publications by members of the staff of the Bureau of Standards
Available on Internet Archive....
View Book →
The Art of Deception
First published in 2001...
View Book →
Guide to personal financial planning for the Armed Forces
vi, 330 p. ; 23 cm...
View Book →
Jenkins: The Definitive Guide
Continuous Integration for the Masses...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Canada and the Third World : overlapping histories
xii, 281 pages ; 23 cm...
View Book →Letter Circular 971: performance of wrist watches
Available on Internet Archive....
View Book →
Delight and power in speech : $b A universal dramatic reader; a new, complete and practical method o
Public domain book available via Project Gutenberg....
View Book →
A Plan for Securing Observations of the Variable Stars
Public domain book available via Project Gutenberg....
View Book →Fire hazard tests of substitute duct materials
Available on Internet Archive....
View Book →PCI DSS Certification In UAE 2025 Compliance & Assessment
PCI DSS Certification in the UAE is crucial for securing cardholder data. It ensures compliance, protects against cyber threats, and builds trust. Businesses must undergo assessments and meet standard...
View Book →
Through the school: The experiences of a mill boy in securing an education
Public domain book available via Project Gutenberg....
View Book →
API Traffic Management 101
From Monitoring to Managing and Beyond...
View Book →
Letter Circular 381: suggested information on reconditioning home interiors - furniture and built-in
Available on Internet Archive....
View Book →Job search in academe : how to get the position you deserve
x, 268 p. ; 24 cm...
View Book →
Freedom and information : assessing publicly available data regarding U.S. transportation infrastruc
1 online resource (xviii, 92 pages) :...
View Book →
White Gold: The Commercialisation of Rice Farming in the Lower Mekong Basin
...
View Book →CIA Reading Room cia-rdp67-00059a000400290070-9: ORR DIARY, 21 MARCH 1952
~x ,j-Approved For Release ?O 1/07/26 : CIA-RDP67-00059AO004002QW70-9 S E-C -R-E- T s 1- ORR DIARY, 21 "daroh 1952 NOTICE ? S/TF Service Section urgently requests the documents listed below, all of wh...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Kafka: The Definitive Guide
Real-Time Data and Stream Processing at Scale...
View Book →
Linux Appliance Design
A Hands-on Guide to Building Linux Appliances...
View Book →
Cyber Security
First published in 2015...
View Book →