Warning: file_put_contents(cache/omni_f129a1c1ccbc892ac0913c39e56cc37a.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
bitdefender_tsecurity
Bitdefender total security...
View Book →
A Treatise on the Police of the Metropolis: Containing a Detail of the Various Crimes and Misdemeano
Public domain book available via Project Gutenberg....
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Modern Web Development on the JAMstack
Modern Techniques for Ultra Fast Sites and Web Applications...
View Book →Aging and ethnicity : knowledge and services
xii, 228 pages : 24 cm...
View Book →
Security analysis and portfolio management
First published in 1975...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
White-Collar Crime in the Shadow Economy
Lack of Detection, Investigation and Conviction Compared to Social Security Fraud...
View Book →
Atomic Assurance
The Alliance Politics of Nuclear Proliferation...
View Book →
Migration, Gender and Social Justice
Perspectives on Human Insecurity...
View Book →Canada's northern security : the eastern dimension
v, 94 p. : 28 cm...
View Book →
NGINX Unit Cookbook
Recipes for Using a Versatile Open Source Server...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →Security of tenure under the Rent Act
xxi, 163 p. ; 23 cm...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →Reconfiguring East Asia : regional institutions and organizations after the crisis
xiii, 270 p. : 24 cm...
View Book →
Migration and Social Protection in Europe and Beyond (Volume 2)
Comparing Consular Services and Diaspora Policies...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Managed Software Evolution
...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Microservices Best Practices for Java
...
View Book →
Africa-Europe Research and Innovation Cooperation
Global Challenges, Bi-regional Responses...
View Book →
Balanced Urban Development: Options and Strategies for Liveable Cities
...
View Book →
Proceedings of the XX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, October 9-10, 2017...
View Book →
The Hindu Kush Himalaya Assessment
Mountains, Climate Change, Sustainability and People...
View Book →JKLM Women’s PG In Coimbatore
Discover the perfect blend of comfort and security at JKLM Women’s PG Hostel in Sungam , Coimbatore. Our well-furnished rooms and modern amenities offer a hassle-free living experience. At the same ...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →European information technology law.
First published in 1994...
View Book →
Japan's Arduous Rejuvenation as a Global Power
Democratic Resilience and the US-China Challenge...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →
Legal Dynamics of EU External Relations
Dissecting a Layered Global Player...
View Book →
The Role of Smallholder Farms in Food and Nutrition Security
...
View Book →
Multimedia Big Data Computing for IoT Applications
Concepts, Paradigms and Solutions...
View Book →
Cyber Security
First published in 2015...
View Book →Cartel publications presents Pitbulls in a skirt 2. The finale
215 p. ; 22 cm...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
The Potato Crop
Its Agricultural, Nutritional and Social Contribution to Humankind...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Regulatory Pathways For Smart Grid Development in China
...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Security in Your Old Age: To Employees of Industrial and Business Establishments, Factories, Shops,
Public domain book available via Project Gutenberg....
View Book →Maritime terrorism : risk and liability
xxix, 167 p. : 23 cm...
View Book →Security Council - 51st Year Plenary Meetings
Available on Internet Archive....
View Book →
Transforming Food Systems for a Rising India
...
View Book →
Security Plan
Public domain book available via Project Gutenberg....
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Foundations of Trusted Autonomy
...
View Book →Creating and maintaining safe college campuses : a sourcebook for evaluating and enhancing safety pr
xv, 288 p. : 23 cm...
View Book →
Transformation and Development
Studies in the Organization for Security and Cooperation in Europe (OSCE) Member States...
View Book →Religion, the only security to society. A sermon preached in the Cathedral Church of St. David's on
Religion, the only security to society. A sermon preached in the Cathedral Church of St. David's on the 12th of March, 1787, ... 1787.. Digitized from IA40316209-22 . Previous issue: bim_eighteenth-ce...
View Book →
NGINX Cookbook
Advanced Recipes for High-Performance Load Balancing...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
The Climate-Smart Agriculture Papers
Investigating the Business of a Productive, Resilient and Low Emission Future...
View Book →
Handbook of Vascular Biometrics
...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Introducing Microsoft SQL Server 2016
Mission-Critical Applications, Deeper Insights, Hyperscale Cloud...
View Book →A Breach of Security: A Simon Serrailler Crime Short Story
Available on Internet Archive....
View Book →
Security Analysis
First published in 1934...
View Book →
Application Delivery and Load Balancing in Microsoft Azure
Practical Solutions with NGINX and Microsoft Azure...
View Book →
Security in computing
First published in 1989...
View Book →
The Whole Secret Laid Open, Or the Complete Art of Making the Chemical Fulminating Objects,: Such as
Public domain book available via Project Gutenberg....
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Security Risk
Public domain book available via Project Gutenberg....
View Book →
National Strategy for Combating Terrorism: September 2006
Public domain book available via Project Gutenberg....
View Book →
Introducing Vigilant Audiences
...
View Book →
United Nations Peace Operations in a Changing Global Order
...
View Book →
Agile Processes in Software Engineering and Extreme Programming – Workshops
XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...
View Book →
Climate Smart Agriculture
Building Resilience to Climate Change...
View Book →
Homeland Security Act of 2002: Updated Through October 14, 2008
Public domain book available via Project Gutenberg....
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
PHP: The Right Way
Your guide to PHP best practices, coding standards, and authoritative tutorials...
View Book →Computer security reference book
Available on Internet Archive....
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Food Anxiety in Globalising Vietnam
...
View Book →
Evolve the Monolith to Microservices with Java and Node
...
View Book →Dorame v. Commissioner of Social Security Administration
This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...
View Book →
Eating, Drinking: Surviving
The International Year of Global Understanding - IYGU...
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Target Suitability and the Crime Drop
...
View Book →Pension puzzles : social security and the great debate
xvi, 284 pages : 24 cm...
View Book →
Asylum Determination in Europe
Ethnographic Perspectives...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
An Estimate of the True Value of Vaccination as a Security Against Small Pox
Public domain book available via Project Gutenberg....
View Book →
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
...
View Book →
The Art of Deception
First published in 2001...
View Book →
Food Price Volatility and Its Implications for Food Security and Policy
...
View Book →
Security
Public domain book available via Project Gutenberg....
View Book →
Limits to the European Union's Normative Power in a Post-conflict Society
EULEX and Peacebuilding in Kosovo...
View Book →
The Future of Election Administration
Cases and Conversations...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Advanced Computing and Systems for Security
First published in 2015...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
The web application hacker's handbook
First published in 2007...
View Book →
Callahan v. Com. Social Security
This item represents a case in PACER, the U.S. Government's website for federal case data. This information is uploaded quarterly. To see our most recent version please use the source url parameter, l...
View Book →
Security in an Interconnected World
A Strategic Vision for Defence Policy...
View Book →Multimedia encryption and authentication techniques and applications
395 p. : 25 cm...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →
The NICE Cyber Security Framework
First published in 2019...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Sago Palm
Multiple Contributions to Food Security and Sustainable Livelihoods...
View Book →
Innovation, Economic Development, and Intellectual Property in India and China
Comparing Six Economic Sectors...
View Book →
Societal Implications of Community-Oriented Policing and Technology
...
View Book →The citizen-powered energy handbook : community solutions to a global crisis
xxxiv, 347 pages : 23 cm...
View Book →
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
...
View Book →