As computing and networking technologies are gradually integrated with every
aspect of human lives and activities, computer and network security has become
a critical issue. The Handbook of Security and Networks presents a collection of
recent advances in computer networking and security areas. These include applied...
Microsoft SQL Server is becoming a more mature, more feature-rich, and more
secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...
OpenStack is an open source software for building public and private clouds, born from
Rackspace and NASA. It is now a global success and is developed and supported by scores
of people around the globe and backed by some of the leading players in the cloud space
today. This book is specifically designed to quickly help you get up...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...
Email was the Internet’s first killer app. One of the most frequently asked questions
about Java is how to send email from a Java applet or application. While it’s certainly
possible to write a Java program that uses sockets to communicate with mail servers,
this requires detailed knowledge of some fairly...
Welcome to Microsoft SharePoint 2013: Designing and Architecting Solutions. The purpose of this book is to help Microsoft SharePoint professionals understand the Microsoft SharePoint 2013 architecture and give them the tools they need to be successful in planning, designing, building, and validating infrastructure architectures. As...
With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...
This introductory textbook presents the modern signal processing concepts used in computer vision and image analysis in a systematic and mathematically coherent way. For the first time in a textbook on image processing, single direction, group direction, corners and edges, Hough transform, and motion estimation are developed in a principled...
Manage the huMONGOus amount of data collected through your web application with MongoDB. This authoritative introduction—written by a core contributor to the project—shows you the many advantages of using document-oriented databases, and demonstrates how this reliable, high-performance system allows for almost infinite...