Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Security

Warning: file_put_contents(cache/omni_cc30633a751821c1fbb154149f525d35.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Security, Risk and the Biometric State
Google Books

Security, Risk and the Biometric State

By Benjamin Muller

This book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on inc...

View Book →
Cover of Laws, etc
Open Library

Laws, etc

By Great Britain.

First published in 1691...

View Book →
Cover of Threats and challenges to maritime security 2020
Library of Congress

Threats and challenges to maritime security 2020

By u.s. coast guard intelligence coordination center, united st

"March 1, 1999." Also available in digital form....

View Book →
Cover of Human Security
Google Books

Human Security

By David Andersen-Rodgers, Kerry F. Crawford

Human security refers in its broadest sense to the protection of individuals from harm. Human Security: Theory and Action explores the theory and application of concepts central to this notion of secu...

View Book →
Cover of The Climate-Smart Agriculture Papers
dBooks

The Climate-Smart Agriculture Papers

By Todd S. Rosenstock, Andreea Nowak, Evan Girvetz

Investigating the Business of a Productive, Resilient and Low Emission Future...

View Book →
Cover of Security Council - 51st Year Plenary Meetings
Internet Archive

Security Council - 51st Year Plenary Meetings

By Unknown Author

Available on Internet Archive....

View Book →
Cover of Evolve the Monolith to Microservices with Java and Node
dBooks

Evolve the Monolith to Microservices with Java and Node

By Sandro De Santis, Luis Florez, Duy V Nguyen, Eduardo Rosa

...

View Book →
Cover of Security Risk
Project Gutenberg

Security Risk

By Clinton, Ed M.

Public domain book available via Project Gutenberg....

View Book →
Cover of Imitation of Christ
Open Library

Imitation of Christ

By Thomas à Kempis, Jérôme de Gonnelieu, Richard Challoner,

First published in 1568...

View Book →
Cover of bitdefender_tsecurity
Internet Archive

bitdefender_tsecurity

By Admin of booklethouse

Bitdefender total security...

View Book →
Cover of Managing Risk and Information Security
dBooks

Managing Risk and Information Security

By Malcolm Harkins

Protect to Enable...

View Book →
Cover of Legal Dynamics of EU External Relations
dBooks

Legal Dynamics of EU External Relations

By Henri de Waele

Dissecting a Layered Global Player...

View Book →
Cover of Food Anxiety in Globalising Vietnam
dBooks

Food Anxiety in Globalising Vietnam

By Judith Ehlert, Nora Katharina Faltmann

...

View Book →
Cover of Why Should I Care? Mobile Security for The Rest of Us
dBooks

Why Should I Care? Mobile Security for The Rest of Us

By Veracode

10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...

View Book →
Cover of The Role of Smallholder Farms in Food and Nutrition Security
dBooks

The Role of Smallholder Farms in Food and Nutrition Security

By Sergio Gomez y Paloma, Laura Riesgo, Kamel Louhichi

...

View Book →
Cover of Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
dBooks

Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa

By Abebe Shimeles, Audrey Verdier-Chouchane, Amadou Boly

...

View Book →
Cover of Bidding with securities auctions and security design
Library of Congress

Bidding with securities auctions and security design

By demarzo, peter m., national bureau of economic research, kre

"We study security-bid auctions in which bidders compete by bidding with securities whose payments are contingent on the realized value of the asset being sold. Such auctions are commonly used, both ...

View Book →
Cover of Balanced Urban Development: Options and Strategies for Liveable Cities
dBooks

Balanced Urban Development: Options and Strategies for Liveable Cities

By Basant Maheshwari, Vijay Singh, Bhadranie Thoradeniya

...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of The ABCs of Social Security: Basic Questions and Answers About the Retirement Program
Internet Archive

The ABCs of Social Security: Basic Questions and Answers About the Retirement Program

By Aldona Robbins

Available on Internet Archive....

View Book →
Cover of National Strategy for Combating Terrorism: September 2006
Project Gutenberg

National Strategy for Combating Terrorism: September 2006

By National Security Council (U.S.)

Public domain book available via Project Gutenberg....

View Book →
Cover of Ojito v. Secretary, Department of Homeland Security
Internet Archive

Ojito v. Secretary, Department of Homeland Security

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...

View Book →
Cover of Économie internationale
Open Library

Économie internationale

By Paul R. Krugman, Maurice Obstfeld, Marc J. Melitz, Krugman,

First published in 1987...

View Book →
Cover of The proliferation security initiative as a new paradigm for peace and security
Library of Congress

The proliferation security initiative as a new paradigm for peace and security

By shulman, mark r., army war college (u.s.). strategic studies

The author examines the Proliferation Security Initiative--a multinational activity launched in 2003 to enable the United States and like-minded countries to interdict the flow of weapons of mass dest...

View Book →
Cover of Ethics and Civil Drones
dBooks

Ethics and Civil Drones

By María de Miguel Molina, Virginia Santamarina Campos

European Policies and Proposals for the Industry...

View Book →
Cover of Oklahoma Employment Security Review
Google Books

Oklahoma Employment Security Review

By Unknown Author

No description available....

View Book →
Cover of Security Design Consulting
Google Books

Security Design Consulting

By Brian Gouin

A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start ...

View Book →
Cover of Canada's northern security : the eastern dimension
Internet Archive

Canada's northern security : the eastern dimension

By Ørvik, Nils

v, 94 p. : 28 cm...

View Book →
Cover of Agile Processes in Software Engineering and Extreme Programming – Workshops
dBooks

Agile Processes in Software Engineering and Extreme Programming – Workshops

By Rashina Hoda

XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...

View Book →
Cover of Protecting SQL Server Data
dBooks

Protecting SQL Server Data

By John Magnabosco

...

View Book →
Cover of Management information systems
Open Library

Management information systems

By Kenneth C. Laudon, Jane P. Laudon, Jane Price Laudon, Jane L

First published in 1945...

View Book →
Cover of Operating Systems and Middleware
dBooks

Operating Systems and Middleware

By Max Hailperin

Supporting Controlled Interaction...

View Book →
Cover of The Enduring Vision
Open Library

The Enduring Vision

By Paul S. Boyer

First published in 1987...

View Book →
Cover of National Security Law and the Power of the Purse
Google Books

National Security Law and the Power of the Purse

By William C. Banks, Peter Raven-Hansen

This power, by necessity and preference, has become the central congressional tool for participating in national security policy. Inevitably attacks on policy are transformed into attacks on the makin...

View Book →
Cover of The Ethics of Cybersecurity
dBooks

The Ethics of Cybersecurity

By Markus Christen, Bert Gordijn, Michele Loi

...

View Book →
Cover of The carpenter : a novel
Internet Archive

The carpenter : a novel

By Lennox, Matt

322 p. ; 24 cm...

View Book →
Cover of How money is made in security investments,
Library of Congress

How money is made in security investments,

By hall, henry

Also available in digital form....

View Book →
Cover of Providing security and justice for the people : security sector reform in Zimbabwe
Library of Congress

Providing security and justice for the people : security sector reform in Zimbabwe

By hutton, lauren, institute for security studies (south africa

Over the past ten years, the Zimbabwean security sector has increasingly come into the spotlight for being unduly politicised and non-partisan, and for infringing on the human rights of citizens. The ...

View Book →
Cover of Introducing Microsoft SQL Server 2016
dBooks

Introducing Microsoft SQL Server 2016

By Stacia Varga, Denny Cherry, Joseph D'Antoni

Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...

View Book →
Cover of Platform Embedded Security Technology Revealed
dBooks

Platform Embedded Security Technology Revealed

By Xiaoyu Ruan

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...

View Book →
Cover of The Future of Election Administration
dBooks

The Future of Election Administration

By Mitchell Brown, Kathleen Hale, Bridgett A. King

Cases and Conversations...

View Book →
Cover of Africa-Europe Research and Innovation Cooperation
dBooks

Africa-Europe Research and Innovation Cooperation

By Andrew Cherry, James Haselip, Gerard Ralphs, Isabella E. Wag

Global Challenges, Bi-regional Responses...

View Book →
Cover of Moody's Analyses of Investments and Security Rating Service
Google Books

Moody's Analyses of Investments and Security Rating Service

By Unknown Author

No description available....

View Book →
Cover of Climate Smart Agriculture
dBooks

Climate Smart Agriculture

By Leslie Lipper, Nancy McCarthy, David Zilberman, Solomon Asfa

Building Resilience to Climate Change...

View Book →
Cover of Innovation, Economic Development, and Intellectual Property in India and China
dBooks

Innovation, Economic Development, and Intellectual Property in India and China

By Kung-Chung Liu, Uday S. Racherla

Comparing Six Economic Sectors...

View Book →
Cover of On Liberty
Open Library

On Liberty

By John Stuart Mill

First published in 1859...

View Book →
Cover of Roughing It
Open Library

Roughing It

By Mark Twain

First published in 1872...

View Book →
Cover of Dorame v. Commissioner of Social Security Administration
Internet Archive

Dorame v. Commissioner of Social Security Administration

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...

View Book →
Cover of Building Secure and Reliable Systems
dBooks

Building Secure and Reliable Systems

By Betsy Beyer, Piotr Lewandowski, Ana Oprea, Paul Blankinship,

Best Practices for Designing, Implementing, and Maintaining Systems...

View Book →
Cover of Canadian annual review of politics and public affairs. 1982
Internet Archive

Canadian annual review of politics and public affairs. 1982

By Unknown Author

1 online resource (368 pages)...

View Book →
Cover of PHP: The Right Way
dBooks

PHP: The Right Way

By Phil Sturgeon, Josh Lockhart

Your guide to PHP best practices, coding standards, and authoritative tutorials...

View Book →
Cover of Affairs of state : the interagency and national security
Library of Congress

Affairs of state : the interagency and national security

By army war college (u.s.). strategic studies institute, marcel

"December 2008." "The United States has a large and complex interagency process to deal with national security on a global basis. It is imperative that civilian and military professionals understand t...

View Book →
Cover of Security Infrastructure Technology for Integrated Utilization of Big Data
dBooks

Security Infrastructure Technology for Integrated Utilization of Big Data

By Atsuko Miyaji, Tomoaki Mimoto

Applied to the Living Safety and Medical Fields...

View Book →
Cover of Migration and Social Protection in Europe and Beyond (Volume 2)
dBooks

Migration and Social Protection in Europe and Beyond (Volume 2)

By Jean-Michel Lafleur, Daniela Vintila

Comparing Consular Services and Diaspora Policies...

View Book →
Cover of The Yellow Wallpaper
Open Library

The Yellow Wallpaper

By Charlotte Perkins Gilman, Aric Cushing, Logan Thomas, SparkN

First published in 1892...

View Book →
Cover of Cartel publications presents Pitbulls in a skirt 2. The finale
Internet Archive

Cartel publications presents Pitbulls in a skirt 2. The finale

By Malone, Mikal

215 p. ; 22 cm...

View Book →
Cover of Internet of Things
dBooks

Internet of Things

By Leon Strous, Vinton Cerf

Information Processing in an Increasingly Connected World...

View Book →
Cover of Rich Dad, Poor Dad
Open Library

Rich Dad, Poor Dad

By Robert T. Kiyosaki, Sharon L. Lechter

First published in 1990...

View Book →
Cover of Food Aid, Agro-fuels & Food Security in Southern Africa
Google Books

Food Aid, Agro-fuels & Food Security in Southern Africa

By Unknown Author

No description available....

View Book →
Cover of International Symposium on Mathematics, Quantum Theory, and Cryptography
dBooks

International Symposium on Mathematics, Quantum Theory, and Cryptography

By Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kun

Proceedings of MQC 2019...

View Book →
Cover of DevOps for Digital Leaders
dBooks

DevOps for Digital Leaders

By Aruna Ravichandran, Kieran Taylor, Peter Waterhouse

Reignite Business with a Modern DevOps-Enabled Software Factory...

View Book →
Cover of Sago Palm
dBooks

Sago Palm

By Hiroshi Ehara, Yukio Toyoda, Dennis V. Johnson

Multiple Contributions to Food Security and Sustainable Livelihoods...

View Book →
Cover of Aging and ethnicity : knowledge and services
Internet Archive

Aging and ethnicity : knowledge and services

By Gelfand, Donald E

xii, 228 pages : 24 cm...

View Book →
Cover of Computer Aided Verification
dBooks

Computer Aided Verification

By Isil Dillig, Serdar Tasiran

31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...

View Book →
Cover of Security Plan
Project Gutenberg

Security Plan

By Farrell, Joseph

Public domain book available via Project Gutenberg....

View Book →
Cover of The Huawei and Snowden Questions
dBooks

The Huawei and Snowden Questions

By Olav Lysne

Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...

View Book →
Cover of Modern Web Development on the JAMstack
dBooks

Modern Web Development on the JAMstack

By Mathias Biilmann, Phil Hawksworth

Modern Techniques for Ultra Fast Sites and Web Applications...

View Book →
Cover of Praeger security international terrorism, homeland security, strategy.
Library of Congress

Praeger security international terrorism, homeland security, strategy.

By praeger (westport, conn.)

"Interdisciplinary and diverse in political perspective, Praeger Security International (PSI) publishes insightful and timely material on international security, including defense and foreign policy, ...

View Book →
Cover of Regulatory Pathways For Smart Grid Development in China
dBooks

Regulatory Pathways For Smart Grid Development in China

By Gert Brunekreeft, Till Luhmann, Tobias Menz, Sven-Uwe Mülle

...

View Book →
Cover of The service of security and information,
Library of Congress

The service of security and information,

By wagner, arthur l. (arthur lockwood)

Also available in digital form....

View Book →
Cover of Financial audit
Open Library

Financial audit

By United States. General Accounting Office

First published in 1943...

View Book →
Cover of The Privacy Engineer's Manifesto
dBooks

The Privacy Engineer's Manifesto

By Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Getting from Policy to Code to QA to Value...

View Book →
Cover of Don't Panic: Mobile Developer's Guide to The Galaxy
dBooks

Don't Panic: Mobile Developer's Guide to The Galaxy

By Marco Tabor, Mladenka Vrdoljak

A Community Publication about All Things Mobile...

View Book →
Cover of 802.11ac: A Survival Guide
dBooks

802.11ac: A Survival Guide

By Matthew Gast

Wi-Fi at Gigabit and Beyond...

View Book →
Cover of A Treatise on the Police of the Metropolis: Containing a Detail of the Various Crimes and Misdemeano
Project Gutenberg

A Treatise on the Police of the Metropolis: Containing a Detail of the Various Crimes and Misdemeano

By Colquhoun, Patrick

Public domain book available via Project Gutenberg....

View Book →
Cover of Theory of Social Constructivism. The United Nations Security Council in Libya
Google Books

Theory of Social Constructivism. The United Nations Security Council in Libya

By Christian Graf

Seminar paper from the year 2014 in the subject Politics - Topic: Peace and Conflict, Security, grade: 1,3, University of Bamberg, language: English, abstract: The United Nations (UN) in international...

View Book →
Cover of UN Security Council
Library of Congress

UN Security Council

By united nations. security council

Information provided includes: daily/monthly programme schedules, various reports, Resolutions, press releases, Web casts, and photos. Links are provided in the other official languages of the UN....

View Book →
Cover of An Estimate of the True Value of Vaccination as a Security Against Small Pox
Project Gutenberg

An Estimate of the True Value of Vaccination as a Security Against Small Pox

By Greenhow, T. M. (Thomas Michael)

Public domain book available via Project Gutenberg....

View Book →
Cover of Surface transportation security. Volume 14, Security 101 : a physical security primer for transporta
Library of Congress

Surface transportation security. Volume 14, Security 101 : a physical security primer for transporta

By national research council (u.s.). transportation research bo

At head of title: National Cooperative Highway Research Program. Research sponsored by the American Association of State Highway and Transportation Officials in cooperation with the Federal Highway Ad...

View Book →
Cover of Fusion of security system data to improve airport security
Library of Congress

Fusion of security system data to improve airport security

By national research council (u.s.). committee on assessment of

"The Committee on Assessment of Security Technologies for Transportation was appointed by the National Research Council (NRC) in response to a request from the Transportation Security Administration (...

View Book →
Cover of JKLM Women’s PG In Coimbatore
Internet Archive

JKLM Women’s PG In Coimbatore

By Unknown Author

Discover the perfect blend of comfort and security at JKLM Women’s PG Hostel in Sungam , Coimbatore. Our well-furnished rooms and modern amenities offer a hassle-free living experience. At the same ...

View Book →
Cover of Container Security
Google Books

Container Security

By Liz Rice

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This...

View Book →
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of The Constitution of the United States and related documents
Open Library

The Constitution of the United States and related documents

By United States

First published in 1787...

View Book →
Cover of Atomic Assurance
dBooks

Atomic Assurance

By Alexander Lanoszka

The Alliance Politics of Nuclear Proliferation...

View Book →
Cover of Russia's Turn to the East
dBooks

Russia's Turn to the East

By Helge Blakkisrud, Elana Wilson Rowe

Domestic Policymaking and Regional Cooperation...

View Book →
Cover of Asylum Determination in Europe
dBooks

Asylum Determination in Europe

By Nick Gill, Anthony Good

Ethnographic Perspectives...

View Book →
Cover of The Potato Crop
dBooks

The Potato Crop

By Hugo Campos, Oscar Ortiz

Its Agricultural, Nutritional and Social Contribution to Humankind...

View Book →
Cover of Web Security Testing Cookbook
Google Books

Web Security Testing Cookbook

By Paco Hope, Ben Walther

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how dev...

View Book →
Cover of Symphony Of Death Part 1 Robert Diablo By William Pattison Manuscript V. 2
Internet Archive

Symphony Of Death Part 1 Robert Diablo By William Pattison Manuscript V. 2

By WCP Enterprises Publishing

Symphony of Death Thirty years ago Maestro Philip Grissini wrote a rock symphony titled The Symphony of Death. It was symphony dedicated to the spirit of death. It was said that as he was composing th...

View Book →
Cover of Homeland Security Act of 2002: Updated Through October 14, 2008
Project Gutenberg

Homeland Security Act of 2002: Updated Through October 14, 2008

By United States. Congress. House. Committee on Homeland Securi

Public domain book available via Project Gutenberg....

View Book →
Cover of The Hindu Kush Himalaya Assessment
dBooks

The Hindu Kush Himalaya Assessment

By Philippus Wester, Arabinda Mishra, Aditi Mukherji, Arun Bhak

Mountains, Climate Change, Sustainability and People...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of The indivisibility of security : Russia and Euro-Atlantic security
Library of Congress

The indivisibility of security : Russia and Euro-Atlantic security

By monaghan, andrew, nato defence college. research division

At head of title: NATO Defense College, College de defense de L'OTAN, Research Division, Division recherche. "Rome, January 2010". Includes bibliographical references. Also available via the Internet....

View Book →
Cover of Strange v. Social Security Administration, Commissioner
Internet Archive

Strange v. Social Security Administration, Commissioner

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...

View Book →
Cover of Poor's
Google Books

Poor's

By Unknown Author

No description available....

View Book →
Cover of Istio Succinctly
dBooks

Istio Succinctly

By Rahul Rai, Tarun Pabbi

...

View Book →
Cover of Statutory Rules and Orders Other Than Those of a Local, Personal Or Temporary Character (varies Slig
Google Books

Statutory Rules and Orders Other Than Those of a Local, Personal Or Temporary Character (varies Slig

By Great Britain. Laws, statutes, etc

No description available....

View Book →
Cover of Managed Software Evolution
dBooks

Managed Software Evolution

By Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit

...

View Book →
Cover of Handbook of Vascular Biometrics
dBooks

Handbook of Vascular Biometrics

By Andreas Uhl, Christoph Busch, Sébastien Marcel, Raymond Vel

...

View Book →
Cover of Community-Oriented Policing and Technological Innovations
dBooks

Community-Oriented Policing and Technological Innovations

By Georgios Leventakis, M. Haberfeld

...

View Book →
Cover of Industrial Internet
dBooks

Industrial Internet

By Jon Bruner

The machines are talking...

View Book →
Cover of Maritime terrorism : risk and liability
Internet Archive

Maritime terrorism : risk and liability

By Unknown Author

xxix, 167 p. : 23 cm...

View Book →
Cover of Computer Networks
dBooks

Computer Networks

By Larry Peterson, Bruce Davie

A Systems Approach...

View Book →
Cover of Security
Project Gutenberg

Security

By Kenyon, Ernest M.

Public domain book available via Project Gutenberg....

View Book →
Cover of Brown v. Yousif, 445 MICH 222 (1994)
Google Books

Brown v. Yousif, 445 MICH 222 (1994)

By Unknown Author

96311...

View Book →
Cover of Foundations of Trusted Autonomy
dBooks

Foundations of Trusted Autonomy

By Hussein A. Abbass, Jason Scholz, Darryn J. Reid

...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of
dBooks

By Luciano Maiani, Said Abousahl, Wolfango Plastino

Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...

View Book →
Cover of SQL Server Metadata Succinctly
dBooks

SQL Server Metadata Succinctly

By Joseph D. Booth

...

View Book →
Cover of Food Price Volatility and Its Implications for Food Security and Policy
dBooks

Food Price Volatility and Its Implications for Food Security and Policy

By Matthias Kalkuhl, Joachim von Braun, Maximo Torero

...

View Book →
Cover of 2003 Symposium on Security and Privacy : proceedings : 11-14 May, 2003, Berkeley, California
Library of Congress

2003 Symposium on Security and Privacy : proceedings : 11-14 May, 2003, Berkeley, California

By ieee symposium on security and privacy, ieee computer societ

"IEEE Computer Society Order Number PR01940"--T.p. verso. Includes bibliographical references and author index. Also available via the World Wide Web with additional title: Security and Privacy, 2003,...

View Book →
Cover of Security in Your Old Age: To Employees of Industrial and Business Establishments, Factories, Shops,
Project Gutenberg

Security in Your Old Age: To Employees of Industrial and Business Establishments, Factories, Shops,

By United States. Social Security Board

Public domain book available via Project Gutenberg....

View Book →
Cover of Cordes v. Social Security Administration, Commissioner
Internet Archive

Cordes v. Social Security Administration, Commissioner

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...

View Book →
Cover of Managing Kubernetes Traffic with F5 NGINX
dBooks

Managing Kubernetes Traffic with F5 NGINX

By Amir Rawdat

A Practical Guide...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Security in an Interconnected World
dBooks

Security in an Interconnected World

By Ernst Hirsch Ballin, Huub Dijstelbloem, Peter de Goede

A Strategic Vision for Defence Policy...

View Book →
Cover of Japan's Arduous Rejuvenation as a Global Power
dBooks

Japan's Arduous Rejuvenation as a Global Power

By Victor Teo

Democratic Resilience and the US-China Challenge...

View Book →
Cover of Hacking the Xbox
dBooks

Hacking the Xbox

By Andrew Huang

An Introduction to Reverse Engineering...

View Book →
Cover of NGINX Unit Cookbook
dBooks

NGINX Unit Cookbook

By Derek DeJonghe

Recipes for Using a Versatile Open Source Server...

View Book →
Cover of The Secret Adversary
Open Library

The Secret Adversary

By Agatha Christie

First published in 1922...

View Book →
Cover of Anonymous Point Collection
dBooks

Anonymous Point Collection

By Matthias Nagel

Improved Models and Security Definitions...

View Book →
Cover of Introducing Vigilant Audiences
dBooks

Introducing Vigilant Audiences

By Daniel Trottier, Rashid Gabdulhakov, Qian Huang

...

View Book →
Cover of Limits to the European Union's Normative Power in a Post-conflict Society
dBooks

Limits to the European Union's Normative Power in a Post-conflict Society

By Rok Zupančič, Nina Pejič

EULEX and Peacebuilding in Kosovo...

View Book →
Cover of Shakai hoshōhō = Social security law
Library of Congress

Shakai hoshōhō = Social security law

By kikuchi, yoshimi

In Japanese. Includes bibliographical references and indexes....

View Book →
Cover of Nettowāku sekyuriti = Network security
Library of Congress

Nettowāku sekyuriti = Network security

By seki, yoshiaki, takahashi, osamu

Includes bibliographical references and indexes....

View Book →
Cover of Security Union Title Ins. Co. V. Liberty National Title Insurance Company
Google Books

Security Union Title Ins. Co. V. Liberty National Title Insurance Company

By Unknown Author

No description available....

View Book →
Cover of Security Analysis
Open Library

Security Analysis

By Benjamin Graham, David Dodd, David Dodd, Seth Klarman

First published in 1934...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of The Code of Civil Procedure of the State of New York
Google Books

The Code of Civil Procedure of the State of New York

By New York (State), Rowland M. Stover

No description available....

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Apple Recent Evidence of Ongoing Violations of Federal Law
Internet Archive

Apple Recent Evidence of Ongoing Violations of Federal Law

By John R. Fouts

Hard evidence of Apple, Inc.'s involvement in a RICO style crime effort to suppress and obstruct the actual truth of a corrupt judicial system and Constitutional collapse....

View Book →
Cover of Raspberry Pi Camera Guide
dBooks

Raspberry Pi Camera Guide

By Dan Aldred, Wesley Archer, Jody Carter, PJ Evans, Richard Ha

For Camera Module & High Quality Camera...

View Book →
Cover of Enterprise Cloud Strategy
dBooks

Enterprise Cloud Strategy

By Barry Briggs, Eduardo Kassner

...

View Book →
Cover of Careers in Focus
Open Library

Careers in Focus

By Ferguson Publishing Company

First published in 2006...

View Book →
Cover of A Graduate Course in Applied Cryptography
dBooks

A Graduate Course in Applied Cryptography

By Dan Boneh, Victor Shoup

The indispensable tool used to protect information in computing systems...

View Book →
Cover of Aviation security : federal action needed to strengthen domestic air cargo security : report to Cong
Library of Congress

Aviation security : federal action needed to strengthen domestic air cargo security : report to Cong

By united states. congress. house. committee on government refo

To evaluate the status of Transportation Security Administration's (TSA) efforts to secure domestic air cargo, GAO examined the extent to which TSA used a risk management approach to guide decisions o...

View Book →
Cover of Northwest Laborers-Employers Health & Security Trust v. Leajak Concrete Construction Inc
Internet Archive

Northwest Laborers-Employers Health & Security Trust v. Leajak Concrete Construction Inc

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...

View Book →
Cover of Access Denied
dBooks

Access Denied

By Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zit

The Practice and Policy of Global Internet Filtering...

View Book →
Cover of Target Suitability and the Crime Drop
dBooks

Target Suitability and the Crime Drop

By Nick Tilley, Graham Farrell, Ronald V. Clarke

...

View Book →
Cover of Migration, Gender and Social Justice
dBooks

Migration, Gender and Social Justice

By Thanh-Dam Truong, Des Gasper, Jeff Handmaker, Sylvia I. Berg

Perspectives on Human Insecurity...

View Book →
Cover of Security as Code
dBooks

Security as Code

By BK Sarthak Das, Virginia Chu

DevSecOps Patterns with AWS...

View Book →
Cover of Transformation and Development
dBooks

Transformation and Development

By Anja Mihr

Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...

View Book →
Cover of Financial Management
Open Library

Financial Management

By United States. General Accounting Office

First published in 1987...

View Book →
Cover of Eating, Drinking: Surviving
dBooks

Eating, Drinking: Surviving

By Peter Jackson, Walter E.L. Spiess, Farhana Sultana

The International Year of Global Understanding - IYGU...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of Application Delivery and Load Balancing in Microsoft Azure
dBooks

Application Delivery and Load Balancing in Microsoft Azure

By Derek DeJonghe, Arlan Nugara

Practical Solutions with NGINX and Microsoft Azure...

View Book →
Cover of Microservices Best Practices for Java
dBooks

Microservices Best Practices for Java

By Michael Hofmann, Erin Schnabel, Katherine Stanley

...

View Book →
Cover of White-Collar Crime in the Shadow Economy
dBooks

White-Collar Crime in the Shadow Economy

By Petter Gottschalk, Lars Gunnesdal

Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...

View Book →
Cover of The Corporation Trust Company Journal
Google Books

The Corporation Trust Company Journal

By Unknown Author

No description available....

View Book →
Cover of Security of tenure under the Rent Act
Internet Archive

Security of tenure under the Rent Act

By Martin, Jill E

xxi, 163 p. ; 23 cm...

View Book →
Cover of The Current Index
Google Books

The Current Index

By Unknown Author

No description available....

View Book →
Cover of The Whole Secret Laid Open, Or the Complete Art of Making the Chemical Fulminating Objects,: Such as
Project Gutenberg

The Whole Secret Laid Open, Or the Complete Art of Making the Chemical Fulminating Objects,: Such as

By Anonymous

Public domain book available via Project Gutenberg....

View Book →
Cover of Obsolete securities,
Library of Congress

Obsolete securities,

By klinger, oliver c.

From the Library of Congress....

View Book →
Cover of ISC Security Design Criteria for New Federal Office Buildings and Major Modernization Projects
Google Books

ISC Security Design Criteria for New Federal Office Buildings and Major Modernization Projects

By National Research Council, Division on Engineering and Physi

In November 1999, GSA and the U.S. Department of State convened a symposium to discuss the apparently conflicting objectives of security from terrorist attack and the design of public buildings in an ...

View Book →
Cover of Industrial security : managing security in the 21st century
Library of Congress

Industrial security : managing security in the 21st century

By arlow, pieter, russell, david l.

"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"-- Provided by publisher....

View Book →
Cover of Advances in Computers, Volume 49 (Advances in Computers)
Open Library

Advances in Computers, Volume 49 (Advances in Computers)

By Marvin V. Zelkowitz, Marshall C. Yovits

First published in 1995...

View Book →
Cover of Welcome to the Beatles
dBooks

Welcome to the Beatles

By Andrew Pregnall, Jason Arquette, Allyson Manhart

...

View Book →
Cover of The Security Development Lifecycle
dBooks

The Security Development Lifecycle

By Michael Howard, Steve Lipner

SDL: A Process for Developing Demonstrably More Secure Software...

View Book →
Cover of Blazor for ASP NET Web Forms Developers
dBooks

Blazor for ASP NET Web Forms Developers

By Daniel Roth, Jeff Fritz, Taylor Southwick

...

View Book →
Cover of Bill
Open Library

Bill

By Canada. Legislature. Legislative Assembly.

First published in 2002...

View Book →
Cover of Building a Virtualized Network Solution
dBooks

Building a Virtualized Network Solution

By Nigel Cain, Alvin Morales, Michel Luescher, Damian Flynn, Mi

Microsoft System Center...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Multimedia Big Data Computing for IoT Applications
dBooks

Multimedia Big Data Computing for IoT Applications

By Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar

Concepts, Paradigms and Solutions...

View Book →
Cover of Computer and Information Sciences
dBooks

Computer and Information Sciences

By Tadeusz Czachórski, Erol Gelenbe, Krzysztof Grochla, Ricard

31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of Information security governance
Library of Congress

Information security governance

By von solms, sebastiaan h., von solms, r. (rossouw)

"IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that thr...

View Book →
Cover of A Vindication of Rights of Woman
Open Library

A Vindication of Rights of Woman

By Mary Wollstonecraft

First published in 1792...

View Book →
Cover of Transforming Food Systems for a Rising India
dBooks

Transforming Food Systems for a Rising India

By Prabhu Pingali, Anaka Aiyar, Mathew Abraham, Andaleeb Rahman

...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of Digital Fortress
Open Library

Digital Fortress

By Dan Brown

First published in 1998...

View Book →
Cover of Economic confidence-building and regional security
Library of Congress

Economic confidence-building and regional security

By krepon, michael, henry l. stimson center, gagne, chris

"Three commissioned essays investigate the linkages between cross-border economic interactions and regional security, focusing on India-Pakistan, Japan-China, and Argentina-Chile. The purpose of this ...

View Book →