Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing VMware Horizon View 5.2
Implementing VMware Horizon View 5.2

VMware Horizon View helps you simplify desktop and application management while increasing security and control. This book will introduce you to all of the components of the VMware Horizon View suite, walk you through their deployment, and show how they are used. We will also discuss how to assess your virtual desktop resource requirements,...

FreeSWITCH 1.6 Cookbook
FreeSWITCH 1.6 Cookbook

Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features

About This Book

  • Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
  • Trap all the common functionalities of the telephony platform using popular communication protocols
  • ...
Advanced Express Web Application Development
Advanced Express Web Application Development

For experienced JavaScript developers this book is all you need to build highly scalable, robust applications using Express. It takes you step by step through the development of a single page application so you learn empirically.

Overview

  • Learn how to build scalable, robust, and reliable web applications...
Deploying Microsoft Forefront Unified Access Gateway 2010
Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

SSL VPN : Understanding, evaluating and planning secure, web-based remote access
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the...
   
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy