CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...
Microsoft Silverlight is a powerful development platform for creating rich media applications and line of business applications for the web and desktop.
Microsoft Windows Azure is a cloud services operating system that serves as the development, service hosting, and service management environment for the Windows Azure platform.
we2py is a framework for rapid development of secure database-driven Internet
applications. It is written in and is programmable in Python. It comprises libraries,
applications, and reusable examples.
Created in 2007,web2py has grown, evolved, and improved tremendously, thanks to
the work of many developers who have...
Citrix XenServer is a complete, managed server virtualization platform built on the
Xen hypervisor. You can use XenServer for virtualizing Microsoft Windows and
Linux servers easily and efficiently.
XenServer is the enterprise-ready, cloud-proven virtualization platform that contains
all the capabilities required...
Microsoft's Forefront Identity Manager simplifies enterprise Identity Management
for end users by automating admin tasks and integrating the infrastructure of an
enterprise with strong authentication systems.
The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide
to Identity Management....
OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...
OpenStack is an open source software for building public and private clouds, born from
Rackspace and NASA. It is now a global success and is developed and supported by scores
of people around the globe and backed by some of the leading players in the cloud space
today. This book is specifically designed to quickly help you get up...
As computing and networking technologies are gradually integrated with every
aspect of human lives and activities, computer and network security has become
a critical issue. The Handbook of Security and Networks presents a collection of
recent advances in computer networking and security areas. These include applied...
Security Smarts for the Self-Guided IT Professional
“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...