Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Zero Trust Security and Strategy | Microsoft Security

Warning: file_put_contents(cache/omni_b1f559bc8a05f9d0436dcece4273d1aa.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Zero Trust Networks: Building Secure Systems in Untrusted Network
Google Books

Zero Trust Networks: Building Secure Systems in Untrusted Network

By Razi Rais, Christina Morillo, Evan Gilman

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your ...

View Book →
Cover of ShmooCon 2009 Slides
Internet Archive

ShmooCon 2009 Slides

By ShmooCon

ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the resear...

View Book →
Cover of Zero Trust Journey Across the Digital Estate
Google Books

Zero Trust Journey Across the Digital Estate

By Abbas Kudrati, Binil A. Pillai

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that shows us that our past approaches, w...

View Book →
Cover of Introducing Windows 10 for IT Professionals
dBooks

Introducing Windows 10 for IT Professionals

By Ed Bott

Technical Overview...

View Book →
Cover of Defense against the black arts : how hackers do what they do and how to protect against it
Library of Congress

Defense against the black arts : how hackers do what they do and how to protect against it

By mcfadden, matthew, varsalone, jesse

Includes index. Description based on print version record; resource not viewed....

View Book →
Cover of Climate Smart Agriculture
dBooks

Climate Smart Agriculture

By Leslie Lipper, Nancy McCarthy, David Zilberman, Solomon Asfa

Building Resilience to Climate Change...

View Book →
Cover of Handbook of Vascular Biometrics
dBooks

Handbook of Vascular Biometrics

By Andreas Uhl, Christoph Busch, Sébastien Marcel, Raymond Vel

...

View Book →
Cover of Operations Manager Field Experience
dBooks

Operations Manager Field Experience

By Danny Hermans, Uwe Stürtz, Mihai Sarbulescu, Mitch Tulloch

Microsoft System Center...

View Book →
Cover of AI Governance Playbook
Google Books

AI Governance Playbook

By Robert F. Smallwood, Chris Surdak

Artificial intelligence can evoke fears that evil robots are taking over the world. AI governance is key to making sure that never happens....

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Computer Aided Verification
dBooks

Computer Aided Verification

By Isil Dillig, Serdar Tasiran

31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of The Elusive Quest for Security Continues - The European Union's Foreign Policy and It's Implications
Google Books

The Elusive Quest for Security Continues - The European Union's Foreign Policy and It's Implications

By Harald Löberbauer

Master's Thesis from the year 2007 in the subject Politics - International Politics - Topic: European Union, grade: 1, University of Vienna, 240 entries in the bibliography, language: English, abstrac...

View Book →
Cover of The Role of Smallholder Farms in Food and Nutrition Security
dBooks

The Role of Smallholder Farms in Food and Nutrition Security

By Sergio Gomez y Paloma, Laura Riesgo, Kamel Louhichi

...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Azure Web Apps for Developers
dBooks

Azure Web Apps for Developers

By Rick Rainey

Microsoft Azure Essentials...

View Book →
Cover of Principles of Finance
dBooks

Principles of Finance

By Alan Adams, Curtis Bacon, Samantha Cooper, Michael Griffin,

...

View Book →
Cover of Microsoft Certified: Microsoft Security, Compliance, and Identity Fundamentals (SC-900)
Google Books

Microsoft Certified: Microsoft Security, Compliance, and Identity Fundamentals (SC-900)

By Cybellium

Welcome to the forefront of knowledge with Cybellium, your trusted partner in mastering the cutting-edge fields of IT, Artificial Intelligence, Cyber Security, Business, Economics and Science. Designe...

View Book →
Cover of Migration and Social Protection in Europe and Beyond (Volume 2)
dBooks

Migration and Social Protection in Europe and Beyond (Volume 2)

By Jean-Michel Lafleur, Daniela Vintila

Comparing Consular Services and Diaspora Policies...

View Book →
Cover of Disrupting Finance
dBooks

Disrupting Finance

By Theo Lynn, John G. Mooney, Pierangelo Rosati, Mark Cummins

FinTech and Strategy in the 21st Century...

View Book →
Cover of Mitteleuropa
dBooks

Mitteleuropa

By Kurtis Sunday

A novel...

View Book →
Cover of President's National Security Telecommunications Advisory Committee
Library of Congress

President's National Security Telecommunications Advisory Committee

By united states. executive office of the president, united sta

Federal Advisory Committee depository collection. Committee name may vary....

View Book →
Cover of The Little ASP.NET Core Book
dBooks

The Little ASP.NET Core Book

By Nate Barbettini

...

View Book →
Cover of Target Suitability and the Crime Drop
dBooks

Target Suitability and the Crime Drop

By Nick Tilley, Graham Farrell, Ronald V. Clarke

...

View Book →
Cover of Balanced Urban Development: Options and Strategies for Liveable Cities
dBooks

Balanced Urban Development: Options and Strategies for Liveable Cities

By Basant Maheshwari, Vijay Singh, Bhadranie Thoradeniya

...

View Book →
Cover of Introducing Microsoft SQL Server 2016
dBooks

Introducing Microsoft SQL Server 2016

By Stacia Varga, Denny Cherry, Joseph D'Antoni

Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...

View Book →
Cover of Anonymous Point Collection
dBooks

Anonymous Point Collection

By Matthias Nagel

Improved Models and Security Definitions...

View Book →
Cover of Zero Trust Unlocked: From Strategy to Execution
Google Books

Zero Trust Unlocked: From Strategy to Execution

By Melis Böke Yazıcıoğlu

🔒 Zero Trust Unlocked: From Strategy to Execution In today’s continuously evolving threat landscape, traditional security models are no longer enough. Zero Trust is not just an option, it’s a n...

View Book →
Cover of SC-900 Practice Questions for Microsoft Security, Compliance, and Identity Fundamentals Certificatio
Google Books

SC-900 Practice Questions for Microsoft Security, Compliance, and Identity Fundamentals Certificatio

By Dormouse Quillsby

NotJustExam - SC-900 Practice Questions for Microsoft Security, Compliance, and Identity Fundamentals Certification Struggling to find quality study materials for the Microsoft Certified Security, Com...

View Book →
Cover of Appendix-front
Library of Congress

Appendix-front

By Unknown Author

PRESERVING OUR DIGITAL HERITAGE Plan for the National Digital Information Infrastructure and Preservation Program A Collaborative Initiative of the Library of Congress APPENDICES First Printing, Octob...

View Book →
Cover of Security for Microsoft Visual Basic.NET
Google Books

Security for Microsoft Visual Basic.NET

By Ed Robinson, Michael Bond

This resource is an end-to-end guide, with clear prescriptive guidance for best practices, application design, and coding techniques for Windows and Web-based applications. It makes writing secure app...

View Book →
Cover of Managing Risk and Information Security
dBooks

Managing Risk and Information Security

By Malcolm Harkins

Protect to Enable...

View Book →
Cover of Project Zero Trust
Google Books

Project Zero Trust

By George Finney

Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern M...

View Book →
Cover of CISM Certified Information Security Manager Bundle, Second Edition
Google Books

CISM Certified Information Security Manager Bundle, Second Edition

By Peter H. Gregory

This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam Take the 2022 version of ISACA’s challenging Certified Information Security M...

View Book →
Cover of PowerShell Notes for Professionals
dBooks

PowerShell Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of A Treatise on Systems (volume 1)
dBooks

A Treatise on Systems (volume 1)

By Mark Burgess

Analytical Descriptions of Human-Information Networks...

View Book →
Cover of Niche Wars
dBooks

Niche Wars

By John Blaxland, Marcus Fielding, Thea Gellerfy

Australia in Afghanistan and Iraq, 2001-2014...

View Book →
Cover of LCSH Section M
Library of Congress

LCSH Section M

By library of congress cds

M., Charlie (Fictitious character) USE Muffin, Charlie (Fictitious character) M (Computer program language) BT Programming languages (Electronic   computers) M & A (Mergers and acquisitions of corpor...

View Book →
Cover of The Huawei and Snowden Questions
dBooks

The Huawei and Snowden Questions

By Olav Lysne

Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...

View Book →
Cover of Platform Embedded Security Technology Revealed
dBooks

Platform Embedded Security Technology Revealed

By Xiaoyu Ruan

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of Robotics, AI, and Humanity
dBooks

Robotics, AI, and Humanity

By Joachim von Braun, Margaret S. Archer, Gregory M. Reichberg,

Science, Ethics, and Policy...

View Book →
Cover of The Enterprise Path to Service Mesh Architectures
dBooks

The Enterprise Path to Service Mesh Architectures

By Lee Calcote

Decoupling at Layer 5...

View Book →
Cover of Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Google Books

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide

By Trevor Stuart, Joe Anich

Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Key ...

View Book →
Cover of Learning Java
dBooks

Learning Java

By Stack Overflow Community

...

View Book →
Cover of Guide to Computer Network Security
dBooks

Guide to Computer Network Security

By Joseph Migga Kizza

...

View Book →
Cover of VBA Notes for Professionals
dBooks

VBA Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Foundations of Trusted Autonomy
dBooks

Foundations of Trusted Autonomy

By Hussein A. Abbass, Jason Scholz, Darryn J. Reid

...

View Book →
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of Collaboration for Impact
dBooks

Collaboration for Impact

By John Butcher, David Gilchrist

Lessons from the Field...

View Book →
Cover of Ukrainian Migration to the European Union
dBooks

Ukrainian Migration to the European Union

By Olena Fedyuk, Marta Kindler

Lessons from Migration Studies...

View Book →
Cover of A new dawn for the second sex : women's freedom practices in world perspective
Library of Congress

A new dawn for the second sex : women's freedom practices in world perspective

By vintges, karen

"To what extent is Simone de Beauvoir's study The Second Sex still relevant? From her work it emerges that patriarchy is a many-headed monster. Over the past decades, various heads of this monster hav...

View Book →
Cover of DevOps for Digital Leaders
dBooks

DevOps for Digital Leaders

By Aruna Ravichandran, Kieran Taylor, Peter Waterhouse

Reignite Business with a Modern DevOps-Enabled Software Factory...

View Book →
Cover of Safety and security of artificial intelligence systems : Australia, Canada, European Union, New Zeal
Library of Congress

Safety and security of artificial intelligence systems : Australia, Canada, European Union, New Zeal

By gesley, jenny, law library of congress (u.s.). global legal

"LL File No. 2023-022302." "July 2023." Description based on online resource, PDF version; title from cover (LOC, viewed July 28, 2023)....

View Book →
Cover of Homeland Security Advisory Council
Library of Congress

Homeland Security Advisory Council

By united states. department of homeland security

Federal Advisory Committee depository collection. Committee name may vary....

View Book →
Cover of Security Infrastructure Technology for Integrated Utilization of Big Data
dBooks

Security Infrastructure Technology for Integrated Utilization of Big Data

By Atsuko Miyaji, Tomoaki Mimoto

Applied to the Living Safety and Medical Fields...

View Book →
Cover of Office 365
dBooks

Office 365

By Matthew Katzer, Don Crawford

Migrating and Managing Your Business in the Cloud...

View Book →
Cover of Learning Microsoft Azure
Google Books

Learning Microsoft Azure

By Jonah Carrio Andersson

If your organization plans to modernize services and move to the cloud from legacy software or a private cloud on premises, this book is for you. Software developers, solution architects, cloud engine...

View Book →
Cover of Hacking the Xbox
dBooks

Hacking the Xbox

By Andrew Huang

An Introduction to Reverse Engineering...

View Book →
Cover of Python Notes for Professionals
dBooks

Python Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Security in an Interconnected World
dBooks

Security in an Interconnected World

By Ernst Hirsch Ballin, Huub Dijstelbloem, Peter de Goede

A Strategic Vision for Defence Policy...

View Book →
Cover of Food Price Volatility and Its Implications for Food Security and Policy
dBooks

Food Price Volatility and Its Implications for Food Security and Policy

By Matthias Kalkuhl, Joachim von Braun, Maximo Torero

...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of SQL Server Metadata Succinctly
dBooks

SQL Server Metadata Succinctly

By Joseph D. Booth

...

View Book →
Cover of Security and Cyber Resilience with IBM Power11
Google Books

Security and Cyber Resilience with IBM Power11

By Tim Simon, Faraz Ahmad, Felipe Bessa, Mathieu Ferre, Kevin G

This IBM Redbooks® publication examines the advanced security capabilities that are introduced with IBM Power11, which are designed to meet the challenges of hybrid cloud environments and evolving cy...

View Book →
Cover of Building Secure Microsoft ASP.NET Applications
Google Books

Building Secure Microsoft ASP.NET Applications

By Microsoft Corporation

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products--yet your complete application will only be as secure as it...

View Book →
Cover of Sago Palm
dBooks

Sago Palm

By Hiroshi Ehara, Yukio Toyoda, Dennis V. Johnson

Multiple Contributions to Food Security and Sustainable Livelihoods...

View Book →
Cover of SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide
Google Books

SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide

By Anand Vemula

The SC-900: Microsoft Security, Compliance, and Identity Fundamentals book serves as a comprehensive guide to understanding the core principles of security, compliance, and identity (SCI) in Microsoft...

View Book →
Cover of Microsoft PowerPoint - Bit_Level_Threats_Combined
Library of Congress

Microsoft PowerPoint - Bit_Level_Threats_Combined

By mashe

Prepared for Digital Preservation 2012 Washington, DC July 2012 Assessing and Mitigating BitLevel Preservation Risks NDSA Infrastructure Working Group INTRODUCTION: A Framework for Addressing Bit-Leve...

View Book →
Cover of Building Secure and Reliable Systems
dBooks

Building Secure and Reliable Systems

By Betsy Beyer, Piotr Lewandowski, Ana Oprea, Paul Blankinship,

Best Practices for Designing, Implementing, and Maintaining Systems...

View Book →
Cover of Data Science with Microsoft SQL Server 2016
dBooks

Data Science with Microsoft SQL Server 2016

By Buck Woody, Danielle Dean, Debraj GuhaThakurta, Gagan Bansal

...

View Book →
Cover of Community-Oriented Policing and Technological Innovations
dBooks

Community-Oriented Policing and Technological Innovations

By Georgios Leventakis, M. Haberfeld

...

View Book →
Cover of Application Delivery and Load Balancing in Microsoft Azure
dBooks

Application Delivery and Load Balancing in Microsoft Azure

By Derek DeJonghe, Arlan Nugara

Practical Solutions with NGINX and Microsoft Azure...

View Book →
Cover of White-Collar Crime in the Shadow Economy
dBooks

White-Collar Crime in the Shadow Economy

By Petter Gottschalk, Lars Gunnesdal

Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...

View Book →
Cover of Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
dBooks

Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa

By Abebe Shimeles, Audrey Verdier-Chouchane, Amadou Boly

...

View Book →
Cover of Modern Web Development on the JAMstack
dBooks

Modern Web Development on the JAMstack

By Mathias Biilmann, Phil Hawksworth

Modern Techniques for Ultra Fast Sites and Web Applications...

View Book →
Cover of Programming Languages and Systems
dBooks

Programming Languages and Systems

By Amal Ahmed

27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...

View Book →
Cover of The Prevent Duty in Education
dBooks

The Prevent Duty in Education

By Joel Busher, Lee Jerome

Impact, Enactment and Implications...

View Book →
Cover of The SysAdmin Handbook
dBooks

The SysAdmin Handbook

By Various

The Best of Simple-Talk...

View Book →
Cover of National Security Commission on Artificial Intelligence
Library of Congress

National Security Commission on Artificial Intelligence

By united states. national security commission on artificial in

Federal Advisory Committee depository collection. Committee name may vary....

View Book →
Cover of Java Notes for Professionals
dBooks

Java Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Food Anxiety in Globalising Vietnam
dBooks

Food Anxiety in Globalising Vietnam

By Judith Ehlert, Nora Katharina Faltmann

...

View Book →
Cover of Ethics and Civil Drones
dBooks

Ethics and Civil Drones

By María de Miguel Molina, Virginia Santamarina Campos

European Policies and Proposals for the Industry...

View Book →
Cover of Mobile ad hoc networks : current status and future trends
Library of Congress

Mobile ad hoc networks : current status and future trends

By loo, jonathan, lloret mauri, jaime, ortiz, jesus hamilton

"3 Chapter 1 Mobile Ad hoc Network Jonathan Loo, Shafiullah Khan, and Ali Naser Al-Khwildi 1.1 Introduction Wireless industry has seen exponential growth in the last few years. The advancement in grow...

View Book →
Cover of Africa-Europe Research and Innovation Cooperation
dBooks

Africa-Europe Research and Innovation Cooperation

By Andrew Cherry, James Haselip, Gerard Ralphs, Isabella E. Wag

Global Challenges, Bi-regional Responses...

View Book →
Cover of Learning Microsoft SQL Server
dBooks

Learning Microsoft SQL Server

By Stack Overflow Community

...

View Book →
Cover of Agile Processes in Software Engineering and Extreme Programming – Workshops
dBooks

Agile Processes in Software Engineering and Extreme Programming – Workshops

By Rashina Hoda

XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...

View Book →
Cover of Introduction to Embedded Systems
dBooks

Introduction to Embedded Systems

By Edward Ashford Lee, Sanjit Arunkumar Seshia

A Cyber-Physical Systems Approach...

View Book →
Cover of When Right Makes Might
dBooks

When Right Makes Might

By Stacie E. Goddard

Rising Powers and World Order...

View Book →
Cover of Greening Europe
dBooks

Greening Europe

By Floriana Cerniglia, Francesco Saraceno

2022 European Public Investment Outlook...

View Book →
Cover of The Potato Crop
dBooks

The Potato Crop

By Hugo Campos, Oscar Ortiz

Its Agricultural, Nutritional and Social Contribution to Humankind...

View Book →
Cover of CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
Google Books

CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition

By Peter H. Gregory

Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by ...

View Book →
Cover of Microsoft Word - KZLAW OF NATIONSKZ.doc
Library of Congress

Microsoft Word - KZLAW OF NATIONSKZ.doc

By phay

KZ LAW OF NATIONS KZ Law of nations Class here works on legal principles recognized by nations, and rules governing conduct of nations and their relations with one another, including supra-regional In...

View Book →
Cover of Techlash
dBooks

Techlash

By Ian I. Mitroff, Rune Storesund

The Future of the Socially Responsible Tech Organization...

View Book →
Cover of Mastering Zero trust
Google Books

Mastering Zero trust

By Cybellium

Traditional security models are no longer sufficient in today's rapidly evolving threat landscape. As cyber threats become more sophisticated and boundaries blur, organizations need a new approach to ...

View Book →
Cover of Enterprise Cloud Strategy
dBooks

Enterprise Cloud Strategy

By Barry Briggs, Eduardo Kassner

...

View Book →
Cover of
dBooks

By Luciano Maiani, Said Abousahl, Wolfango Plastino

Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...

View Book →
Cover of Transformation and Development
dBooks

Transformation and Development

By Anja Mihr

Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...

View Book →
Cover of Happiness is the Wrong Metric
dBooks

Happiness is the Wrong Metric

By Amitai Etzioni

A Liberal Communitarian Response to Populism...

View Book →
Cover of Security as Code
dBooks

Security as Code

By BK Sarthak Das, Virginia Chu

DevSecOps Patterns with AWS...

View Book →
Cover of Piracy in World History
dBooks

Piracy in World History

By Stefan Amirell, Hans Hägerdal, Bruce Buchan

...

View Book →
Cover of The Security Development Lifecycle
dBooks

The Security Development Lifecycle

By Michael Howard, Steve Lipner

SDL: A Process for Developing Demonstrably More Secure Software...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of Internet of Things
dBooks

Internet of Things

By Leon Strous, Vinton Cerf

Information Processing in an Increasingly Connected World...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of Evolve the Monolith to Microservices with Java and Node
dBooks

Evolve the Monolith to Microservices with Java and Node

By Sandro De Santis, Luis Florez, Duy V Nguyen, Eduardo Rosa

...

View Book →
Cover of Blazor for ASP NET Web Forms Developers
dBooks

Blazor for ASP NET Web Forms Developers

By Daniel Roth, Jeff Fritz, Taylor Southwick

...

View Book →
Cover of Geeks On Call Security and Privacy
Google Books

Geeks On Call Security and Privacy

By Geeks On Call

Bringing order to the lawless frontier Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To ...

View Book →
Cover of Sustainable Supply Chains
dBooks

Sustainable Supply Chains

By Yann Bouchery, Charles J. Corbett, Jan C. Fransoo, Tarkan Ta

A Research-Based Textbook on Operations and Strategy...

View Book →
Cover of The Cloud-to-Thing Continuum
dBooks

The Cloud-to-Thing Continuum

By Theo Lynn, John G. Mooney, Brian Lee, Patricia Takako Endo

Opportunities and Challenges in Cloud, Fog and Edge Computing...

View Book →
Cover of Protecting SQL Server Data
dBooks

Protecting SQL Server Data

By John Magnabosco

...

View Book →
Cover of Japan's Arduous Rejuvenation as a Global Power
dBooks

Japan's Arduous Rejuvenation as a Global Power

By Victor Teo

Democratic Resilience and the US-China Challenge...

View Book →
Cover of Zero Trust Overview and Playbook Introduction
Google Books

Zero Trust Overview and Playbook Introduction

By Mark Simos, Nikhil Kumar

Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts Key Features Get simple, clear, and practical ad...

View Book →
Cover of Microsoft Platform and Tools for Mobile App Development
dBooks

Microsoft Platform and Tools for Mobile App Development

By Cesar de la Torre, Simon Calvert

...

View Book →
Cover of Legal Dynamics of EU External Relations
dBooks

Legal Dynamics of EU External Relations

By Henri de Waele

Dissecting a Layered Global Player...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of 19th International Conference on Cyber Warfare and Security
Google Books

19th International Conference on Cyber Warfare and Security

By Prof Brett van Niekerk

These proceedings represent the work of contributors to the 19th International Conference on Cyber Warfare and Security (ICCWS 2024), hosted University of Johannesburg, South Africa on 26-27 March 202...

View Book →