Warning: file_put_contents(cache/omni_f3f845e48b0430c964407036eb101212.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Transnational Entrepreneurship in South East Asia
Japanese Self-Initiated Expatriate Entrepreneurs...
View Book →
Uses of Technology in Lower Secondary Mathematics Education
A Concise Topical Survey...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Of Cigarettes, High Heels, and Other Interesting Things
An Introduction to Semiotics...
View Book →
The Mathematics Education of Prospective Secondary Teachers Around the World
...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Improving Psychiatric Care for Older People
Barbara Robb's Campaign 1965-1975...
View Book →
Sensor Technologies
Healthcare, Wellness, and Environmental Applications...
View Book →
Planning for Ecosystem Services in Cities
...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Urbanization, Biodiversity and Ecosystem Services: Challenges and Opportunities
A Global Assessment...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →
Shaping Natural History and Settler Society
Mary Elizabeth Barber and the Nineteenth-Century Cape...
View Book →
Meaning-Making for Living
The Emergence of the Presentational Self in Children's Everyday Dialogues...
View Book →
Tellings and Texts
Music, Literature and Performance in North India...
View Book →
Managing Socio-ecological Production Landscapes and Seascapes for Sustainable Communities in Asia
Mapping and Navigating Stakeholders, Policy and Action...
View Book →
Investigations Into the Phenomenology and the Ontology of the Work of Art
What are Artworks and How Do We Experience Them?...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Housing Estates in Europe
Poverty, Ethnic Segregation and Policy Challenges...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
The Art of SEO
Mastering Search Engine Optimization...
View Book →
Semiotics in Mathematics Education
...
View Book →
Geographies of Asylum in Europe and the Role of European Localities
...
View Book →
Seeing Theory
A Visual Introduction to Probability and Statistics...
View Book →
Multimedia Big Data Computing for IoT Applications
Concepts, Paradigms and Solutions...
View Book →
The Art of Sustainable Performance
A Model for Recruiting, Selection, and Professional Development...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Contested Childhoods: Growing up in Migrancy
Migration, Governance, Identities...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →
Market Segmentation Analysis
Understanding It, Doing It, and Making It Useful...
View Book →
The Limits of Art
On Borderline Cases of Artworks and their Aesthetic Properties...
View Book →
Empathetic Space on Screen
Constructing Powerful Place and Setting...
View Book →
Designing Sustainable Energy for All
Sustainable Product-Service System Design Applied to Distributed Renewable Energy...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Making Servers Work
A Practical Guide to Linux System Administration...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
25 Secrets for Faster ASP.NET Applications
...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
Multilevel Modelling for Public Health and Health Services Research
Health in Context...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Twin-Control
A Digital Twin Approach to Improve Machine Tools Lifecycle...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Ocean-Atmosphere Interactions of Gases and Particles
...
View Book →
Environmental Governance of the Baltic Sea
...
View Book →
Bio-based Building Skin
...
View Book →
Models, Methods and Tools for Product Service Design
The Manutelligence Project...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Compositionality and Concepts in Linguistics and Psychology
...
View Book →
OpenIntro Statistics
A complete foundation for Statistics, also serving as a foundation for Data Science....
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
SQL Server Internals: In-Memory OLTP
Inside the SQL Server 2016 Hekaton Engine...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
Formalizing the Shadow Economy in Serbia
Policy Measures and Growth Effects...
View Book →
Energy Efficient Servers
Blueprints for Data Center Optimization...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Innovation, Economic Development, and Intellectual Property in India and China
Comparing Six Economic Sectors...
View Book →
Disability and Vocational Rehabilitation in Rural Settings
Challenges to Service Delivery...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
The Future of the Law of the Sea
Bridging Gaps Between National, Individual and Common Interests...
View Book →
Semantic Systems. The Power of AI and Knowledge Graphs
15th International Conference, SEMANTiCS 2019, Karlsruhe, Germany, September 9–12, 2019, Proceedings...
View Book →
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape
...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Human Challenge Studies in Endemic Settings
Ethical and Regulatory Issues...
View Book →
Boundary Value Problems, Weyl Functions, and Differential Operators
...
View Book →
RESTful Web Services
Web Services for the Real World...
View Book →
Performance Tuning with SQL Server Dynamic Management Views
...
View Book →
From Bilateral Arbitral Tribunals and Investment Courts to a Multilateral Investment Court
Options Regarding the Institutionalization of Investor-State Dispute Settlement...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Sequence Analysis and Related Approaches
Innovative Methods and Applications...
View Book →