A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Designing for the web is di!erent than designing for any other medium. The breadth of skills required is sometimes daunting. The depth of experience required, seemingly unobtainable. Yet, the medium attracts designers from all spheres of design practice: from engineering and architecture, to product and graphic design. This chapter aims to...
Ask any graphic designer the world over about their preferred approach to setting type, choosing a color, or beginning a new layout, and you will rarely get exactly the same answer twice. All designers have their own way of working and their own combinations of the thousands of techniques one can apply when planning a new...
Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)
The acceleration of change and innovation in the publishing industry today is dizzying, and the pace can be overwhelming. At O’Reilly’s TOC New York Conference in February 2012, practitioners and executives from the publishing and tech...
HTML5 is revolutionizing the Web, and now it's coming to your ebook reader! With the release of the EPUB 3 specification, HTML5 support is officially a part of the EPUB standard, and publishers are able to take full advantage of HTML5's rich...
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...
Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking." —Tom Clark, Director, Technical Marketing, Nishan Systems
Evaluating, Planning, and Implementing High-Value Storage Virtualization Solutions
Storage virtualization has come of age, offering IT professionals powerful new ways to simplify infrastructure, streamline management, improve utilization, and reduce costs. Now, the...