Hyper-V Security
If you are an administrator with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory, but you're looking for more information on hardening your Hyper-V deployment, this book is for you. If you've already got a functional Hyper-V environment, you will have no trouble reading this book and following its... | | Learning Construct 2
Design and create your own engaging, extensible, and addictive game using Construct 2
About This Book
-
Discover the important game objects, behaviours, and events within Construct 2 to get you started with game development
-
Create mesmerizing games quickly and efficiently, and become a top...
| | Trust and Legitimacy in Criminal Justice: European Perspectives
The book explores police legitimacy and crime control, with a focus on the European region. Using comparative case studies, the contributions to this timely volume examine the effects of a transition to democracy on policing, public attitudes towards police legitimacy, and the ways in which perceptions of police legitimacy relate to... |