Warning: file_put_contents(cache/omni_bf887e08805b95f5ee8557d21e0d2ec1.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The A-Z of the PhD Trajectory
A Practical Guide for a Successful Journey...
View Book →
Teaching Tolerance in a Globalized World
...
View Book →
Coronavirus: A book for children
A vitally useful book explaining the current situation in a simple format for children...
View Book →
The NGINX Real-Time API Handbook
Our NGINX Real-Time API Handbook equips enterprises to deliver reliable, high-performance APIs...
View Book →
The DARPA Model for Transformative Technologies
Perspectives on the U.S. Defense Advanced Research Projects Agency...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Beej's Guide to Network Programming
Using Internet Sockets...
View Book →
Into the Mind of Microsoft Security
Into the Mind of Microsoft Security - 2026 Edition Security leaders are being asked to do two things at once: move faster than attackers, and prove they stayed in control while doing it. AI copilots a...
View Book →
Learning Landscape Ecology
A Practical Guide to Concepts and Techniques...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Raspberry Pi Beginner's Guide
How to use your new computer...
View Book →
The Official Raspberry Pi Handbook 2022
...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
Making Games with Python & Pygame
A guide to programming with graphics, animation, and sound...
View Book →
A Concise Guide to Market Research
The Process, Data, and Methods Using IBM SPSS Statistics...
View Book →
Java 3D Programming
A Guide to Key Concepts and Effective Techniques...
View Book →
Programming Persistent Memory
A Comprehensive Guide for Developers...
View Book →
Earth 2020
An Insider's Guide to a Rapidly Changing Planet...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
A Complete Guide to Maggot Therapy
Clinical Practice, Therapeutic Principles, Production, Distribution, and Ethics...
View Book →
The Path to Funding
The Artist's Guide to Building Your Audience, Generating Income, and Realizing Career Sustainability...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
The Official Raspberry Pi Handbook 2023
...
View Book →
.NET Performance Testing and Optimization
The Complete Guide...
View Book →
Get Started with Arduino
Robots, musical instruments, smart displays and more...
View Book →
Don't Just Roll the Dice
A usefully short guide to software pricing...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →EXAM REF SC-200 MICROSOFT SECURITY OPERATIONS ANALYST.
No description available....
View Book →
The Big Book of Machine Learning Use Cases
Your complete how-to guide to putting ML to work - plus code samples and notebooks...
View Book →
Making Servers Work
A Practical Guide to Linux System Administration...
View Book →Microsoft Security Copilot
Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscape of cyber defense Key Features Explore the Security Copilot ecosystem and learn to design effective ...
View Book →
Non-Vitamin K Antagonist Oral Anticoagulants
A Concise Guide...
View Book →
Learn Programming
Your Guided Tour Through the Programming Jungle...
View Book →
Professor Frisby's Mostly Adequate Guide to Functional Programming
...
View Book →Ultimate Microsoft Security Copilot for Security Operations
TAGLINE Defend Smarter, Faster, and Stronger with Microsoft Security Copilot. KEY FEATURES ● Comprehensive, hands-on guidance to master Microsoft Security Copilot in real-world security operations. ...
View Book →
Solidarity in Europe
Citizens' Responses in Times of Crisis...
View Book →
Compartment Syndrome
A Guide to Diagnosis and Management...
View Book →
Code Club Book of Scratch
Simple coding for total beginners...
View Book →
Civilian Lunatic Asylums During the First World War
A Study of Austerity on London's Fringe...
View Book →
Tobacco Control Policy in the Netherlands
Between Economy, Public Health, and Ideology...
View Book →
The Design and Implementation of the Anykernel and Rump Kernels
The definitive technical guide to the core of the Rump Kernel project...
View Book →
Jenkins: The Definitive Guide
Continuous Integration for the Masses...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
High-Performance Caching with Nginx and Nginx Plus
Implement high‑performance caching and cache clustering for your web applications with Nginx and Nginx Plus...
View Book →
Estimating Illicit Financial Flows
A Critical Guide to the Data, Methodologies, and Findings...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →
Just Enough Linux
Learning about Linux one command at a time...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
Training Site Reliability Engineers
What Your Organization Needs to Create a Learning Program...
View Book →Microsoft Identity and Access Administrator Exam Guide
This certification guide focuses on identity solutions and strategies that will help you prepare for Microsoft Identity and Access Administrator certification, while enabling you to implement what you...
View Book →
Version Control with Subversion
Next Generation Open Source Version Control...
View Book →
The Law Is (Not) for Kids
A Legal Rights Guide for Canadian Children and Teens...
View Book →
Asterisk: The Future of Telephony
Join the Open Source PBX Revolution...
View Book →
When Can Oil Economies Be Deemed Sustainable?
...
View Book →
Game Hacking Academy
A Beginner's Guide to Understanding Game Hacking Techniques...
View Book →Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Key ...
View Book →Mastering Microsoft Teams 2026
No description available....
View Book →
Like Nobody's Business
An Insider's Guide to How US University Finances Really Work...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →
Getting Started with InnerSource
Keys to collaboration and productivity inside your company...
View Book →
PHP: The Right Way
Your guide to PHP best practices, coding standards, and authoritative tutorials...
View Book →
Linux Appliance Design
A Hands-on Guide to Building Linux Appliances...
View Book →
Blazor, A Beginners Guide
A quick-start guide to productivity with Blazor...
View Book →
Scaling a Software Business
The Digitalization Journey...
View Book →
The Definitive Guide to Graph Databases
for the RDBMS Developer...
View Book →
Demystifying Climate Models
A Users Guide to Earth System Models...
View Book →
Transforming Lives and Systems
Cultural Competence and the Higher Education Interface...
View Book →
A Practical Guide to Cloud Migration
Essays on Organizational Transformation from Google Practitioners...
View Book →
New Metropolitan Perspectives
Knowledge Dynamics, Innovation-driven Policies Towards the Territories’ Attractiveness Volume 1...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
Decision Making under Deep Uncertainty
From Theory to Practice...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →