Active Directory is a common repository for information about objects that reside on
the network, such as users, groups, computers, printers, applications, and files. The
default Active Directory schema supports numerous attributes for each object class that
can be used to store a variety of information. Access Control Lists (ACLs) are...
Configuring your Linux infrastructure using Ansible is made logical and highly accessible when you follow this step-by-step tutorial. Combining a clear overview with the deeper details, it gives a solid grounding to managing your systems.
Overview
Starts with the most simple usage of Ansible and builds on...
This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...
While Java EE 5 is considered by everyone to be the most important enterprise release, Java EE 6 has a lot in store for you and every server-side Java developer. The most widely spread technology to write enterprise-class applications just got better with enhanced EJB 3.1, Java Persistence API (JPA) 2.0, the new, yet already very successful, Java...
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application...
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies
DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...
An Integrated Technology for Delivering Better Software—Cheaper and Faster!
This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...
This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers...
The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...
Published with the developer in mind, firstPress technical briefs explore emerging technologies that have the potential to be critical for tomorrow's industry. Apress keeps developers one step ahead by presenting key information as early as possible in a PDF of 150 pages or less. Explore the future through Apress...
Detailing the design and deployment of 802.11b networks in every flavor and size, this working handbook delivers the hands-on expertise you need—complete with illustrative case studies. From one-cell home systems to global provider networks, Wi-Fi Handbook provides the A-Z facts, details, tips, and strategies you need to...
This text offers processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services.
Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious...