Warning: file_put_contents(cache/omni_b1f559bc8a05f9d0436dcece4273d1aa.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Zero Trust Networks: Building Secure Systems in Untrusted Network
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your ...
View Book →ShmooCon 2009 Slides
ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the resear...
View Book →Zero Trust Journey Across the Digital Estate
"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that shows us that our past approaches, w...
View Book →
White Gold: The Commercialisation of Rice Farming in the Lower Mekong Basin
...
View Book →
Bordieuan Field Theory as an Instrument for Military Operational Analysis
...
View Book →
Defense against the black arts : how hackers do what they do and how to protect against it
Includes index. Description based on print version record; resource not viewed....
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Handbook of Vascular Biometrics
...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →AI Governance Playbook
Artificial intelligence can evoke fears that evil robots are taking over the world. AI governance is key to making sure that never happens....
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
The Elusive Quest for Security Continues - The European Union's Foreign Policy and It's Implications
Master's Thesis from the year 2007 in the subject Politics - International Politics - Topic: European Union, grade: 1, University of Vienna, 240 entries in the bibliography, language: English, abstrac...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Principles of Finance
...
View Book →Microsoft Certified: Microsoft Security, Compliance, and Identity Fundamentals (SC-900)
Welcome to the forefront of knowledge with Cybellium, your trusted partner in mastering the cutting-edge fields of IT, Artificial Intelligence, Cyber Security, Business, Economics and Science. Designe...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Disrupting Finance
FinTech and Strategy in the 21st Century...
View Book →
President's National Security Telecommunications Advisory Committee
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
Societal Implications of Community-Oriented Policing and Technology
...
View Book →
Target Suitability and the Crime Drop
...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →Zero Trust Unlocked: From Strategy to Execution
🔒 Zero Trust Unlocked: From Strategy to Execution In today’s continuously evolving threat landscape, traditional security models are no longer enough. Zero Trust is not just an option, it’s a n...
View Book →SC-900 Practice Questions for Microsoft Security, Compliance, and Identity Fundamentals Certificatio
NotJustExam - SC-900 Practice Questions for Microsoft Security, Compliance, and Identity Fundamentals Certification Struggling to find quality study materials for the Microsoft Certified Security, Com...
View Book →Appendix-front
PRESERVING OUR DIGITAL HERITAGE Plan for the National Digital Information Infrastructure and Preservation Program A Collaborative Initiative of the Library of Congress APPENDICES First Printing, Octob...
View Book →Security for Microsoft Visual Basic.NET
This resource is an end-to-end guide, with clear prescriptive guidance for best practices, application design, and coding techniques for Windows and Web-based applications. It makes writing secure app...
View Book →
Project Zero Trust
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern M...
View Book →CISM Certified Information Security Manager Bundle, Second Edition
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam Take the 2022 version of ISACA’s challenging Certified Information Security M...
View Book →
A Treatise on Systems (volume 1)
Analytical Descriptions of Human-Information Networks...
View Book →
Niche Wars
Australia in Afghanistan and Iraq, 2001-2014...
View Book →LCSH Section M
M., Charlie (Fictitious character) USE Muffin, Charlie (Fictitious character) M (Computer program language) BT Programming languages (Electronic computers) M & A (Mergers and acquisitions of corpor...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Robotics, AI, and Humanity
Science, Ethics, and Policy...
View Book →
The Enterprise Path to Service Mesh Architectures
Decoupling at Layer 5...
View Book →Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Key ...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Foundations of Trusted Autonomy
...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Collaboration for Impact
Lessons from the Field...
View Book →
Ukrainian Migration to the European Union
Lessons from Migration Studies...
View Book →
A new dawn for the second sex : women's freedom practices in world perspective
"To what extent is Simone de Beauvoir's study The Second Sex still relevant? From her work it emerges that patriarchy is a many-headed monster. Over the past decades, various heads of this monster hav...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Safety and security of artificial intelligence systems : Australia, Canada, European Union, New Zeal
"LL File No. 2023-022302." "July 2023." Description based on online resource, PDF version; title from cover (LOC, viewed July 28, 2023)....
View Book →
Homeland Security Advisory Council
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Office 365
Migrating and Managing Your Business in the Cloud...
View Book →Learning Microsoft Azure
If your organization plans to modernize services and move to the cloud from legacy software or a private cloud on premises, this book is for you. Software developers, solution architects, cloud engine...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Security and Cyber Resilience with IBM Power11
This IBM Redbooks® publication examines the advanced security capabilities that are introduced with IBM Power11, which are designed to meet the challenges of hybrid cloud environments and evolving cy...
View Book →Building Secure Microsoft ASP.NET Applications
Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products--yet your complete application will only be as secure as it...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →SC-900:Microsoft Security, Compliance, and Identity Fundamentals Certification Exam Guide
The SC-900: Microsoft Security, Compliance, and Identity Fundamentals book serves as a comprehensive guide to understanding the core principles of security, compliance, and identity (SCI) in Microsoft...
View Book →Microsoft PowerPoint - Bit_Level_Threats_Combined
Prepared for Digital Preservation 2012 Washington, DC July 2012 Assessing and Mitigating BitLevel Preservation Risks NDSA Infrastructure Working Group INTRODUCTION: A Framework for Addressing Bit-Leve...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →
Modern Web Development on the JAMstack
Modern Techniques for Ultra Fast Sites and Web Applications...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
The Prevent Duty in Education
Impact, Enactment and Implications...
View Book →
National Security Commission on Artificial Intelligence
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
Food Anxiety in Globalising Vietnam
...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Mobile ad hoc networks : current status and future trends
"3 Chapter 1 Mobile Ad hoc Network Jonathan Loo, Shafiullah Khan, and Ali Naser Al-Khwildi 1.1 Introduction Wireless industry has seen exponential growth in the last few years. The advancement in grow...
View Book →
Africa-Europe Research and Innovation Cooperation
Global Challenges, Bi-regional Responses...
View Book →
Agile Processes in Software Engineering and Extreme Programming – Workshops
XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...
View Book →
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →
Greening Europe
2022 European Public Investment Outlook...
View Book →
The Potato Crop
Its Agricultural, Nutritional and Social Contribution to Humankind...
View Book →CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by ...
View Book →Microsoft Word - KZLAW OF NATIONSKZ.doc
KZ LAW OF NATIONS KZ Law of nations Class here works on legal principles recognized by nations, and rules governing conduct of nations and their relations with one another, including supra-regional In...
View Book →
Techlash
The Future of the Socially Responsible Tech Organization...
View Book →Mastering Zero trust
Traditional security models are no longer sufficient in today's rapidly evolving threat landscape. As cyber threats become more sophisticated and boundaries blur, organizations need a new approach to ...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Happiness is the Wrong Metric
A Liberal Communitarian Response to Populism...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Evolve the Monolith to Microservices with Java and Node
...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Geeks On Call Security and Privacy
Bringing order to the lawless frontier Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To ...
View Book →
Sustainable Supply Chains
A Research-Based Textbook on Operations and Strategy...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →Zero Trust Overview and Playbook Introduction
Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts Key Features Get simple, clear, and practical ad...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →19th International Conference on Cyber Warfare and Security
These proceedings represent the work of contributors to the 19th International Conference on Cyber Warfare and Security (ICCWS 2024), hosted University of Johannesburg, South Africa on 26-27 March 202...
View Book →