Warning: file_put_contents(cache/omni_fde800d248c72594f8bfe628c98b8575.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Wikipedia @ 20 : stories of an incomplete revolution
"Founders, contributors, scholars, teachers, and students reflect on Wikipedia's first 20 years"-- Provided by publisher....
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Maryland - Yellow Pages - Baltimore - June 1958
...
View Book →
EPA nationwide facilities guide 2005
Includes index. Also available in digital form....
View Book →Buffer Overflow Attacks
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of a...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
For Congress and the Nation : a chronological history of the Library of Congress through 1975
Includes index. Bibliography: p. 177-179. Also available in digital form on the Library of Congress Web site....
View Book →
Digital entrepreneurship in Africa : how a continent is escaping Silicon Valley's long shadow
"Digital entrepreneurship has often been viewed as a game changer for African development. Empowered by a single smartphone, the thinking goes, an individual entrepreneur can lay the groundwork for th...
View Book →
An Empirical Case Study on Stack Overflow to Explore Developers' Security Challenges
The unprecedented growth of ubiquitous computing infrastructure has brought new challenges for security, privacy, and trust. New problems range from mobile apps with incomprehensible permission (trust...
View Book →
Body, personhood and privacy : perspectives on the cultural other and human experience
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Windows Stack Exploitation
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in ...
View Book →
Nature Inc. : environmental conservation in the neoliberal age
""Nature Inc. brings together cutting-edge research by respected scholars from around the world to analyze how 'neoliberal conservation' is reshaping human-nature relations"--Provided by publisher"-- ...
View Book →
An Approach to Stack Overflow Counter-measures Using Kernel Properties
No description available....
View Book →
Maryland - Yellow Pages - Baltimore - August 1954
...
View Book →
Windows Stack Exploitation 2
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in ...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →Architectural Support for Stack Buffer Overflow Exploit Prevention
Computing system security has drawn significant attention with devices deeply connected through the internet and increased popularity of ubiquitous computing through mobile devices. Most research work...
View Book →
Mobile ad hoc networks : current status and future trends
"3 Chapter 1 Mobile Ad hoc Network Jonathan Loo, Shafiullah Khan, and Ali Naser Al-Khwildi 1.1 Introduction Wireless industry has seen exponential growth in the last few years. The advancement in grow...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Embedded Software Development
Embedded Software Development: The Open-Source Approach delivers a practical introduction to embedded software development, with a focus on open-source components. This programmer-centric book is writ...
View Book →
Thinking like a climate : governing a city in times of environmental change
"THINKING LIKE A CLIMATE explores how climate change specifically and anthropocenic processes more broadly are affecting human experiences of being in the world. Based on fieldwork in Manchester, Engl...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Managing Cloud Native Data on Kubernetes
Architecting Cloud Native Data Services Using Open Source Technology...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
Evidence-based Positron Emission Tomography
Summary of Recent Meta-analyses on PET...
View Book →
Embedded Firmware Solutions
Development Best Practices for the Internet of Things...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Among digitized manuscripts : philology, codicology, paleography in a digital world
"Working with manuscripts has become a digital affair. But, are there downsides to digital photos? And how can you take advantage of the incredible computing power you have literally at your fingertip...
View Book →
Narrating North American borderlands : Thomas King, Howard F. Mosher, and Jim Lynch
Includes bibliographical references (pages 203-218) and index. Description based on print version record; resource not viewed....
View Book →
School architecture; principles and practices,
"Selected references": p. 711. Also available in digital form....
View Book →
Higher education revolutions in the Gulf : globalization and institutional viability
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →Network Security Assessment
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess ri...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Software Supply Chain Security
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions o...
View Book →
Debugging with GDB
The GNU Source-Level Debugger...
View Book →
The Endangered Species Act : history, implementation, successes, and controversies
Includes index. Description based on print version record; resource not viewed....
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
CISSP For Dummies
The bestselling guide to CISSP certification – now fully updated for the latest exam! There are currently over 75,000 CISSP certified people out there and thousands take this exam each year. The top...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Should the U.S. Federal Government significantly increase the exploration and/or development of spac
From the Library of Congress....
View Book →
Minnesota as it is in 1870; its general resources and attractions for immigrants, invalids, tourists
Minnesota as it is in 1870 is a detailed piece of promotional literature intended to attract settlers to the state of Minnesota. It is typical of many such publications that circulated during this per...
View Book →
On the margins : Jews and Muslims in interwar Berlin
"This study addresses encounters between Jews and Muslims in interwar Berlin. Living on the margins of German society, the two groups sometimes used that position to fuse visions and their personal li...
View Book →
Solving the Powertrain Puzzle
10th Schaeffler Symposium April 3/4, 2014...
View Book →
Imagining Chinese medicine
Includes bibliographical references and index. In English with some names and titles in Chinese, Japanese and Korean in contents and references. Description based on print version record; resource not...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Latining America : black-brown passages and the coloring of Latino/a studies
Includes bibliographical references (pages 259-288) and index. Description based on print version record; resource not viewed....
View Book →