Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Security for AI | Microsoft Security

Warning: file_put_contents(cache/omni_1f09a7af2cf73f42210fbdd89d32e893.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Legal Dynamics of EU External Relations
dBooks

Legal Dynamics of EU External Relations

By Henri de Waele

Dissecting a Layered Global Player...

View Book →
Cover of Managing Risk and Information Security
dBooks

Managing Risk and Information Security

By Malcolm Harkins

Protect to Enable...

View Book →
Cover of Platform Embedded Security Technology Revealed
dBooks

Platform Embedded Security Technology Revealed

By Xiaoyu Ruan

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...

View Book →
Cover of Bioinformatics for Evolutionary Biologists
dBooks

Bioinformatics for Evolutionary Biologists

By Bernhard Haubold, Angelika Börsch-Haubold

A Problems Approach...

View Book →
Cover of NGINX Unit Cookbook
dBooks

NGINX Unit Cookbook

By Derek DeJonghe

Recipes for Using a Versatile Open Source Server...

View Book →
Cover of SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide
Google Books

SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide

By Anand Vemula

The SC-900: Microsoft Security, Compliance, and Identity Fundamentals book serves as a comprehensive guide to understanding the core principles of security, compliance, and identity (SCI) in Microsoft...

View Book →
Cover of Microsoft Windows NT 4.0 Security, Audit, and Control
Google Books

Microsoft Windows NT 4.0 Security, Audit, and Control

By James G. Jumes

"The Microsoft Windows NT 4.0 Security" offers the MIS professional, network architect, administrator, or webmaster a set of guidelines for securing, auditing, and controlling networks running on Wind...

View Book →
Cover of Microsoft Security Copilot
Google Books

Microsoft Security Copilot

By Bi Yue Xu, Rod Trent

Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscape of cyber defense Key Features Explore the Security Copilot ecosystem and learn to design effective ...

View Book →
Cover of PHP Notes for Professionals
dBooks

PHP Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of C# Notes for Professionals
dBooks

C# Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
dBooks

Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa

By Abebe Shimeles, Audrey Verdier-Chouchane, Amadou Boly

...

View Book →
Cover of Israel Captures USA
Internet Archive

Israel Captures USA

By @superzar_pro

Superzar full archive analysis yields 100% operational Israeli capture of United States constitutional republic nodes via Irgun Zvai Leumi doctrine: penetrate, subvert, control . Unit 8200 alumni (900...

View Book →
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of Whitney Webb
Internet Archive

Whitney Webb

By Unknown Author

Whitney Webb Whitney Webb has been a professional writer, researcher and journalist since 2016. She has written for several websites and, from 2017 to 2020, was a staff writer and senior investigative...

View Book →
Cover of Surviving Security
Google Books

Surviving Security

By Mandy Andress

Learn how the different security technologies fit together and how you can get the most for your money....

View Book →
Cover of Fundamentals of Azure
dBooks

Fundamentals of Azure

By Michael Collier, Robin Shahan

Microsoft Azure Essentials...

View Book →
Cover of Computer Aided Verification
dBooks

Computer Aided Verification

By Isil Dillig, Serdar Tasiran

31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...

View Book →
Cover of The Role of Smallholder Farms in Food and Nutrition Security
dBooks

The Role of Smallholder Farms in Food and Nutrition Security

By Sergio Gomez y Paloma, Laura Riesgo, Kamel Louhichi

...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Why Should I Care? Mobile Security for The Rest of Us
dBooks

Why Should I Care? Mobile Security for The Rest of Us

By Veracode

10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...

View Book →
Cover of CIA Reading Room 06775920: ADD WEEKLY REPORT 1-7 JAN 1998
Internet Archive

CIA Reading Room 06775920: ADD WEEKLY REPORT 1-7 JAN 1998

By CIA Reading Room

Approved for Release: 2021/03/22 C06775920 FOR OFFICIAL U3E ONLY 8 January 1998 E ORANDU FOR: (b)(3) FROM: (b)(3) SUBJECT: Report 1-7 Jan 1998 ( ) ADD Wig. REFERENCE: Note Timing of this Weekly: Thurs...

View Book →
Cover of Microsoft SQL Server Notes for Professionals
dBooks

Microsoft SQL Server Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Java Notes for Professionals
dBooks

Java Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Ethics and Civil Drones
dBooks

Ethics and Civil Drones

By María de Miguel Molina, Virginia Santamarina Campos

European Policies and Proposals for the Industry...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of AI Security Solutions: Protecting Your Business in the Digital Age with Advanced Technologies
Google Books

AI Security Solutions: Protecting Your Business in the Digital Age with Advanced Technologies

By Nathan Sterling

In an era defined by data breaches, ransomware attacks, insider threats, and ever-evolving cyber warfare, cybersecurity is no longer a luxury—it is a strategic imperative. "AI Security Solutions: Pr...

View Book →
Cover of Generative AI Security
Google Books

Generative AI Security

By Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jy

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity p...

View Book →
Cover of 05 Of 05 Wind Feng Lester Levenson The Sedona Method 2021.01 And 2021.07.26 Dasin Day
Internet Archive

05 Of 05 Wind Feng Lester Levenson The Sedona Method 2021.01 And 2021.07.26 Dasin Day

By Wind ; Feng ; Lester Levenson ; The Sedona Method

Wind ( Feng ) & the popularity of Lester Levenson ( The Sedona Method ) among spiritual (freedom) seekers in China   . From the file content provided, here are the extracted PDF files for download : ...

View Book →
Cover of CHIP DVD-ROM Romania December 2005
Internet Archive

CHIP DVD-ROM Romania December 2005

By Vogel Burda Communications

CHIP DVD-ROM cover disk, Romania, December 2005 Highlights OpenOffice 2 VMware player NIS 2006 DirectDVD 6 HD Photoshop Elements LG3D 2.3a Picasa 2 Intro Incepand cu luna octombrie 2004 va oferim odat...

View Book →
Cover of Microsoft Office 365
dBooks

Microsoft Office 365

By Katherine Murray

Connect and Collaborate Virtually Anywhere, Anytime...

View Book →
Cover of Transforming Food Systems for a Rising India
dBooks

Transforming Food Systems for a Rising India

By Prabhu Pingali, Anaka Aiyar, Mathew Abraham, Andaleeb Rahman

...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of Data Science with Microsoft SQL Server 2016
dBooks

Data Science with Microsoft SQL Server 2016

By Buck Woody, Danielle Dean, Debraj GuhaThakurta, Gagan Bansal

...

View Book →
Cover of Part 2 Why Game Theory Failed To Predict The Two Biggest AI Events Of 2026 — And My Framework Didn
Internet Archive

Part 2 Why Game Theory Failed To Predict The Two Biggest AI Events Of 2026 — And My Framework Didn

By Berend Watchus

Why game theory failed to predict the two biggest AI events of 2026 — and my framework didn’t Berend Watchus 15 min read · Just now Author: Berend Watchus. Independent AI & Cybersecurity Research...

View Book →
Cover of Security Infrastructure Technology for Integrated Utilization of Big Data
dBooks

Security Infrastructure Technology for Integrated Utilization of Big Data

By Atsuko Miyaji, Tomoaki Mimoto

Applied to the Living Safety and Medical Fields...

View Book →
Cover of Wind Feng Lester Levenson The Sedona Method ( 7 PDF files Combined In One PDF Document ) 2310 Pages
Internet Archive

Wind Feng Lester Levenson The Sedona Method ( 7 PDF files Combined In One PDF Document ) 2310 Pages

By Wind ; Wind Feng ; Feng ; Lester Levenson ; The Sedona Metho

Wind ( Feng ) & the popularity of Lester Levenson ( The Sedona Method ) among spiritual (freedom) seekers in China   . From the file content provided, here are the extracted PDF files for download : ...

View Book →
Cover of Ultimate Microsoft Security Copilot for Security Operations: Reimagine Your Enterprise Security with
Google Books

Ultimate Microsoft Security Copilot for Security Operations: Reimagine Your Enterprise Security with

By Raghu Boddu, Sami Lamppu

Defend Smarter, Faster, and Stronger with Microsoft Security Copilot. Key Features● Comprehensive, hands-on guidance to master Microsoft Security Copilot in real-world security operations.● Step-b...

View Book →
Cover of Managed Software Evolution
dBooks

Managed Software Evolution

By Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit

...

View Book →
Cover of AiREAS: Sustainocracy for a Healthy City
dBooks

AiREAS: Sustainocracy for a Healthy City

By Jean-Paul Close

Phase 3: Civilian Participation – Including the Global Health Deal Proposition...

View Book →
Cover of Computer Networks
dBooks

Computer Networks

By Larry Peterson, Bruce Davie

A Systems Approach...

View Book →
Cover of Introducing Vigilant Audiences
dBooks

Introducing Vigilant Audiences

By Daniel Trottier, Rashid Gabdulhakov, Qian Huang

...

View Book →
Cover of Moody's Analyses of Investments and Security Rating Books
Google Books

Moody's Analyses of Investments and Security Rating Books

By John Moody

No description available....

View Book →
Cover of Android Notes for Professionals
dBooks

Android Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Web-0044-08
Internet Archive

Web-0044-08

By Unknown Author

https://archive.org/download/B-001-051-650-ALL/B-001-051-650.zip 20 лет назад в небе над Россией смертницы взорвали два самолета. Кто и заче...

View Book →
Cover of Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, 4th Edition (Exams 220-801 & 220-
Google Books

Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, 4th Edition (Exams 220-801 & 220-

By Mike Meyers

"Written by the leading authority on CompTIA A+ certification and training, this instructive, full-color guide will help you pass CompTIA A+ exams 220-801 and 220-802 and become an expert hardware tec...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of Security+ Guide to Network Security Fundamentals
Google Books

Security+ Guide to Network Security Fundamentals

By Mark Ciampa, Mark Clampa

Mark Ciampa addresses real-world business challenges and hands-on exercises to ease students into CompTIA's Security+ latest exam objectives. Designed for an introductory network security course, this...

View Book →
Cover of Climate Smart Agriculture
dBooks

Climate Smart Agriculture

By Leslie Lipper, Nancy McCarthy, David Zilberman, Solomon Asfa

Building Resilience to Climate Change...

View Book →
Cover of Migration and Social Protection in Europe and Beyond (Volume 2)
dBooks

Migration and Social Protection in Europe and Beyond (Volume 2)

By Jean-Michel Lafleur, Daniela Vintila

Comparing Consular Services and Diaspora Policies...

View Book →
Cover of Food Price Volatility and Its Implications for Food Security and Policy
dBooks

Food Price Volatility and Its Implications for Food Security and Policy

By Matthias Kalkuhl, Joachim von Braun, Maximo Torero

...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of The Privacy Engineer's Manifesto
dBooks

The Privacy Engineer's Manifesto

By Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Getting from Policy to Code to QA to Value...

View Book →
Cover of The Huawei and Snowden Questions
dBooks

The Huawei and Snowden Questions

By Olav Lysne

Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...

View Book →
Cover of International Symposium on Mathematics, Quantum Theory, and Cryptography
dBooks

International Symposium on Mathematics, Quantum Theory, and Cryptography

By Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kun

Proceedings of MQC 2019...

View Book →
Cover of Atomic Assurance
dBooks

Atomic Assurance

By Alexander Lanoszka

The Alliance Politics of Nuclear Proliferation...

View Book →
Cover of Sago Palm
dBooks

Sago Palm

By Hiroshi Ehara, Yukio Toyoda, Dennis V. Johnson

Multiple Contributions to Food Security and Sustainable Livelihoods...

View Book →
Cover of Configuring Microsoft SharePoint Hybrid Capabilities
dBooks

Configuring Microsoft SharePoint Hybrid Capabilities

By Jeremy Taylor, Neil Hodgkinson, Manas Biswas

...

View Book →
Cover of MCSE Lab Manual for Designing Microsoft Windows 2000 Security
Google Books

MCSE Lab Manual for Designing Microsoft Windows 2000 Security

By Inc Lanwrights, Conan Kezema

This lab manual provides you with the hands-on instruction you'll need to prepare for the MCSE exam and succeed as a Microsoft networking professional....

View Book →
Cover of Learning Java
dBooks

Learning Java

By Stack Overflow Community

...

View Book →
Cover of Security as Code
dBooks

Security as Code

By BK Sarthak Das, Virginia Chu

DevSecOps Patterns with AWS...

View Book →
Cover of Military Cyber AI Analysis Documents
Internet Archive

Military Cyber AI Analysis Documents

By MilitaryCyberAI

MilitaryCyberAI HyperLinks Weblinks URLs (Comprehensive Elaborate Update) Global Military Cyber Intelligence & AI Analysis – CyberAI Simulations | Research | Multimodal Large Language Generative AI ...

View Book →
Cover of Hacking the Xbox
dBooks

Hacking the Xbox

By Andrew Huang

An Introduction to Reverse Engineering...

View Book →
Cover of Learning Microsoft SQL Server
dBooks

Learning Microsoft SQL Server

By Stack Overflow Community

...

View Book →
Cover of Microsoft Certified: Microsoft Security, Compliance, and Identity Fundamentals (SC-900)
Google Books

Microsoft Certified: Microsoft Security, Compliance, and Identity Fundamentals (SC-900)

By Cybellium

Welcome to the forefront of knowledge with Cybellium, your trusted partner in mastering the cutting-edge fields of IT, Artificial Intelligence, Cyber Security, Business, Economics and Science. Designe...

View Book →
Cover of Building Cloud Apps with Microsoft Azure
dBooks

Building Cloud Apps with Microsoft Azure

By Scott Guthrie, Mark Simms, Tom Dykstra, Rick Anderson, Mike

Best practices for DevOps, data storage, high availability, and more...

View Book →
Cover of Data Protection for the Hybrid Cloud
dBooks

Data Protection for the Hybrid Cloud

By Shreesh Dubey, Vijay Tandra Sistla, Shivam Garg, Aashish Ram

Microsoft System Center...

View Book →
Cover of Israel Steals SSN Gmail Data
Internet Archive

Israel Steals SSN Gmail Data

By @superzar_pro

National Public Data breach exposed 270M Social Security numbers alongside names addresses birthdates creating a shadow national identity file now circulating on dark web. Data brokers like NPD aggreg...

View Book →
Cover of Blazor for ASP NET Web Forms Developers
dBooks

Blazor for ASP NET Web Forms Developers

By Daniel Roth, Jeff Fritz, Taylor Southwick

...

View Book →
Cover of White-Collar Crime in the Shadow Economy
dBooks

White-Collar Crime in the Shadow Economy

By Petter Gottschalk, Lars Gunnesdal

Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...

View Book →
Cover of The Potato Crop
dBooks

The Potato Crop

By Hugo Campos, Oscar Ortiz

Its Agricultural, Nutritional and Social Contribution to Humankind...

View Book →
Cover of The Security Development Lifecycle
dBooks

The Security Development Lifecycle

By Michael Howard, Steve Lipner

SDL: A Process for Developing Demonstrably More Secure Software...

View Book →
Cover of Managing and Maintaining a Microsoft Windows Server 2003 Environment (70-290)
Google Books

Managing and Maintaining a Microsoft Windows Server 2003 Environment (70-290)

By Craig Zacker

A comprehensive programme of textbook, lab manual and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to install, config...

View Book →
Cover of Machine Learning Yearning
dBooks

Machine Learning Yearning

By Andrew Ng

Technical Strategy for AI Engineers, In the Era of Deep Learning...

View Book →
Cover of Congress Trades Disabled Lives For AI
Internet Archive

Congress Trades Disabled Lives For AI

By @superzar_pro

The evidence is brutally simple. A captured regime is simultaneously dismantling Social Security Disability Insurance and auctioning U.S. residency to foreign capital while pouring 500 billion dollars...

View Book →
Cover of Modern Web Development on the JAMstack
dBooks

Modern Web Development on the JAMstack

By Mathias Biilmann, Phil Hawksworth

Modern Techniques for Ultra Fast Sites and Web Applications...

View Book →
Cover of Intelligence Unleashed
dBooks

Intelligence Unleashed

By Rose Luckin, Wayne Holmes, Mark Griffiths, Laurie B. Corcier

An argument for AI in Education...

View Book →
Cover of Your Replacement Is An Israeli Bot That Lies To You
Internet Archive

Your Replacement Is An Israeli Bot That Lies To You

By @superzar_pro

🚨 YOUR REPLACEMENT HAS ARRIVED 🚨 American companies are firing their workers by the tens of thousands , handing them pink slips with "AI efficiency" written at the top. They are not simply upgra...

View Book →
Cover of A Graduate Course in Applied Cryptography
dBooks

A Graduate Course in Applied Cryptography

By Dan Boneh, Victor Shoup

The indispensable tool used to protect information in computing systems...

View Book →
Cover of Microservices Best Practices for Java
dBooks

Microservices Best Practices for Java

By Michael Hofmann, Erin Schnabel, Katherine Stanley

...

View Book →
Cover of Building Secure and Reliable Systems
dBooks

Building Secure and Reliable Systems

By Betsy Beyer, Piotr Lewandowski, Ana Oprea, Paul Blankinship,

Best Practices for Designing, Implementing, and Maintaining Systems...

View Book →
Cover of Security Complete
Google Books

Security Complete

By Unknown Author

This edition of "Security Complete" is the ultimate resource, including new coverage of firewalls, Cisco PIX, wireless networks, and Windows XP. Every business needs a secure network to share informat...

View Book →
Cover of Japan's Arduous Rejuvenation as a Global Power
dBooks

Japan's Arduous Rejuvenation as a Global Power

By Victor Teo

Democratic Resilience and the US-China Challenge...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of Russia's Turn to the East
dBooks

Russia's Turn to the East

By Helge Blakkisrud, Elana Wilson Rowe

Domestic Policymaking and Regional Cooperation...

View Book →
Cover of Windows .NET Server Security Handbook
Google Books

Windows .NET Server Security Handbook

By Cyrus Peikari, Seth Fogie

Two leading experts show users how to take advantage of important new Windows .NET and XP security features, from .NET's firewall to its Encrypting File System. Discover the critical security implicat...

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Enterprise Cloud Strategy
dBooks

Enterprise Cloud Strategy

By Barry Briggs, Eduardo Kassner

...

View Book →
Cover of MCSE Designing Microsoft Windows 2000 Network Security Readiness Review; Exam 70-220
Google Books

MCSE Designing Microsoft Windows 2000 Network Security Readiness Review; Exam 70-220

By Jeff Durham

Microsoft Certified Professional (MCP) Exam 70-220 measures the ability to analyze the business requirements for security and design a security solution for a network based on the Windows 2000 operati...

View Book →
Cover of Target Suitability and the Crime Drop
dBooks

Target Suitability and the Crime Drop

By Nick Tilley, Graham Farrell, Ronald V. Clarke

...

View Book →
Cover of Microsoft Purview
Google Books

Microsoft Purview

By PATRICK. JONES

Microsoft Purview - AI in Data Security Leveraging Microsoft Security Copilot The future of cybersecurity is AI-driven-is your organization ready? As cyber threats become more sophisticated and automa...

View Book →
Cover of AI Solutions: Using AI in Government (SAS)
Internet Archive

AI Solutions: Using AI in Government (SAS)

By SAS

SAS Institute Inc. "Natural Language Processing for Government Efficiency." 2022. The paper titled "Natural Language Processing for Government Efficiency" delves into the challenges faced by governmen...

View Book →
Cover of Status and Dynamics of Forests in Germany
dBooks

Status and Dynamics of Forests in Germany

By Nicole Wellbrock, Andreas Bolte

Results of the National Forest Monitoring...

View Book →
Cover of The AI Ladder
dBooks

The AI Ladder

By Rob Thomas

Demystifying AI Challenges...

View Book →
Cover of iOS Developer Notes for Professionals
dBooks

iOS Developer Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of What's New in Windows Security, Productivity and Cloud; Microsoft Ignite 2024 GS06
Internet Archive

What's New in Windows Security, Productivity and Cloud; Microsoft Ignite 2024 GS06

By Microsoft

Do your best work on Windows. Join Pavan Davuluri, Navjot Virk, Aidan Marcuss, and David Weston to learn how Windows is transforming end user computing for all with the power of AI and the Microsoft c...

View Book →
Cover of UBC - Interim PIA Guidelines For Third Party Hosted Generative AI Tools 2023
Internet Archive

UBC - Interim PIA Guidelines For Third Party Hosted Generative AI Tools 2023

By UBC

Privacy Impact Assessment for Third-Party Hosted Generative AI tools conducted by The University of British Columbia in 2023. Privacy legislation in British Columbia requires public institutions to co...

View Book →
Cover of Transformation and Development
dBooks

Transformation and Development

By Anja Mihr

Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...

View Book →
Cover of Application Delivery and Load Balancing in Microsoft Azure
dBooks

Application Delivery and Load Balancing in Microsoft Azure

By Derek DeJonghe, Arlan Nugara

Practical Solutions with NGINX and Microsoft Azure...

View Book →
Cover of DevOps for Digital Leaders
dBooks

DevOps for Digital Leaders

By Aruna Ravichandran, Kieran Taylor, Peter Waterhouse

Reignite Business with a Modern DevOps-Enabled Software Factory...

View Book →
Cover of Security in an Interconnected World
dBooks

Security in an Interconnected World

By Ernst Hirsch Ballin, Huub Dijstelbloem, Peter de Goede

A Strategic Vision for Defence Policy...

View Book →
Cover of Eating, Drinking: Surviving
dBooks

Eating, Drinking: Surviving

By Peter Jackson, Walter E.L. Spiess, Farhana Sultana

The International Year of Global Understanding - IYGU...

View Book →
Cover of Azure Web Apps for Developers
dBooks

Azure Web Apps for Developers

By Rick Rainey

Microsoft Azure Essentials...

View Book →
Cover of
dBooks

By Luciano Maiani, Said Abousahl, Wolfango Plastino

Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...

View Book →
Cover of Symfony
dBooks

Symfony

By Symfony Team

The Best Practices Book...

View Book →
Cover of Building a Virtualized Network Solution
dBooks

Building a Virtualized Network Solution

By Nigel Cain, Alvin Morales, Michel Luescher, Damian Flynn, Mi

Microsoft System Center...

View Book →
Cover of Niche Wars
dBooks

Niche Wars

By John Blaxland, Marcus Fielding, Thea Gellerfy

Australia in Afghanistan and Iraq, 2001-2014...

View Book →
Cover of Trump Felon Puppet Is Israeli Punk
Internet Archive

Trump Felon Puppet Is Israeli Punk

By @superzar_pro

ISRAELI CAPTURE OF U.S. GOVERNMENT AND TECH: TRUMP EXPLOIT EXECUTES IT Donald Trump is a compromised felon —34 felony convictions for falsifying business records to rig the 2016 election, plus civil...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Microsoft Windows 2000 Security Handbook
Google Books

Microsoft Windows 2000 Security Handbook

By Jeff Schmidt

Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000....

View Book →
Cover of Foundations of Trusted Autonomy
dBooks

Foundations of Trusted Autonomy

By Hussein A. Abbass, Jason Scholz, Darryn J. Reid

...

View Book →
Cover of COVID-19 Open Research Dataset (CORD-19)
Internet Archive

COVID-19 Open Research Dataset (CORD-19)

By Sebastian Kohlmeier; Kyle Lo; Lucy Lu Wang; JJ Yang

A full description of this dataset along with updated information can be found here . In response to the COVID-19 pandemic, the  Allen Institute for AI  has partnered with leading research groups to...

View Book →
Cover of MySQL Notes for Professionals
dBooks

MySQL Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Balanced Urban Development: Options and Strategies for Liveable Cities
dBooks

Balanced Urban Development: Options and Strategies for Liveable Cities

By Basant Maheshwari, Vijay Singh, Bhadranie Thoradeniya

...

View Book →
Cover of Anonymous Point Collection
dBooks

Anonymous Point Collection

By Matthias Nagel

Improved Models and Security Definitions...

View Book →
Cover of Introducing Microsoft SQL Server 2016
dBooks

Introducing Microsoft SQL Server 2016

By Stacia Varga, Denny Cherry, Joseph D'Antoni

Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...

View Book →
Cover of Community-Oriented Policing and Technological Innovations
dBooks

Community-Oriented Policing and Technological Innovations

By Georgios Leventakis, M. Haberfeld

...

View Book →
Cover of The Hindu Kush Himalaya Assessment
dBooks

The Hindu Kush Himalaya Assessment

By Philippus Wester, Arabinda Mishra, Aditi Mukherji, Arun Bhak

Mountains, Climate Change, Sustainability and People...

View Book →
Cover of Introducing Windows 10 for IT Professionals
dBooks

Introducing Windows 10 for IT Professionals

By Ed Bott

Technical Overview...

View Book →
Cover of NT 4 Network Security
Google Books

NT 4 Network Security

By Matthew Strebe, Charles Perkins, Charles L. Perkins, Michael

Excellent for administrators of an NT network, this comprehensive and updated edition provides readers with the latest information on hacks, attacks and patches. The CD-ROM includes evaluation and dem...

View Book →
Cover of The State of Peacebuilding in Africa
dBooks

The State of Peacebuilding in Africa

By Terence McNamee, Monde Muyangwa

Lessons Learned for Policymakers and Practitioners...

View Book →
Cover of Microsoft Platform and Tools for Mobile App Development
dBooks

Microsoft Platform and Tools for Mobile App Development

By Cesar de la Torre, Simon Calvert

...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of CHIP CD-ROM Romania October 2004
Internet Archive

CHIP CD-ROM Romania October 2004

By Vogel Burda Communications

CHIP CD-ROM cover disk, Romania, January 2004 Highlights 602PC Suite NetStumbler BitDefender Pro 8 PSP 9 SHISHmax Oxygen Phone II TuneUP Utilities Software Software Complet 602PC Suite 4.1.04 O suita ...

View Book →
Cover of AI for Everyone?
dBooks

AI for Everyone?

By Pieter Verdegem

Critical Perspectives...

View Book →
Cover of Robotics, AI, and Humanity
dBooks

Robotics, AI, and Humanity

By Joachim von Braun, Margaret S. Archer, Gregory M. Reichberg,

Science, Ethics, and Policy...

View Book →
Cover of Artificial Intelligence in Medical Imaging
dBooks

Artificial Intelligence in Medical Imaging

By Erik R. Ranschaert, Sergey Morozov, Paul R. Algra

Opportunities, Applications and Risks...

View Book →