The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...
The opportunities provided by Cloud Computing solutions allowed for significant growth within an industry that continues to mature and develop at a rapid pace.
The primary goal of this book and course is to provide the quality education and support materials needed to enable the understanding and application of Cloud Computing in a wide-range...
At times when the IT manager’s best friend is systems consolidation (which is a euphemism for centralisation), it may come somewhat as a surprise for you that this book investigates decentralisation in the context of content management systems. It may seem quite obvious
that content will and should be managed by the party who...
Windows Server 2012 is probably the most significant release of the Windows
Server platform ever. With an innovative new user interface, powerful
new management tools, enhanced Windows PowerShell support, and hundreds
of new features in the areas of networking, storage, and virtualization, Windows
Server 2012...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...
By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either...
Microsoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment. You'll get step-by-step guidelines for getting Hyper-V up and running, followed by best practices for...
Reduce the environmental and budgetary impact of your IT infrastructure
This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a...
The IT pro's must-have guide to Windows Server 2016
Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...
Virtualization is not a new concept, but it is changing the computing industry in a profound way. Server virtualization is now #1 on enterprises’ budget lists. According to analysts, it will continue to be the highest impact trend, changing infrastructure and operations through 2012.
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...