Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...
With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008. Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers. This...
Follow the "Proven Path" to successful implementation of enterprise resource planning
Effective forecasting, planning, and scheduling is fundamental to productivity–and ERP is a fundamental way to achieve it. Properly implementing ERP will give you a competitive advantage and help you run your business more...
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...
Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...
Intellectual property law is a demanding but enjoyable subject. It covers a range
of rights, some of which have little in common with others. Students should keep
in mind that, although some rights may be quite different to others, a number of
rights may exist in respect of the same subject matter. For example, a new design
of...
Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft...
Get up and running with XML using this innovative virtual classroom approach!
Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...