iPhone with Microsoft Exchange Server 2010

A solution for integrating iPhone and iPad is built into Microsoft's Exchange Server, and this guide will walk you through successfully deploying it to allow Apple's devices to be used securely and effectively in your organization. Learn about Apple's mobile devices and how they work with Exchange Server 2010 Plan and deploy a highly available Exchange organization and Office 365 tenant Create and enforce security policies and set up...

Focus on IAM (Identity and Access Management)

Focus on IAM (Identity and Access Management) is a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT. This book is not focused on any specific IAM tool/ product; it will provide the deep delving information on Identity and Access Management with respect to process, technology, best practices, checklists, etc.

Mastering Yii

Key Features Learn to work with the key aspects of Yii Framework 2 Explore how to create RESTful APIs with Yii Incorporate codeception with Yii2 to test your code thoroughly Book Description The successor of Yii Framework 1.1, Yii2 is a complete rewrite of Yii Framework, one of the most popular PHP 5 frameworks for making modern web applications. The update embraces the best practices and protocols established with newer versions of ...

Distributed Networks: Intelligence, Security, and Applications

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific research in distributed network intelligence, security, and novel applications. The book...

Apache Tomcat 7 Essentials

Apache Tomcat (or simply Tomcat) is an open source servlet container developed by the Apache Software Foundation (ASF). The latest major stable release, Apache Tomcat version 7 implements the Servlet 3 and JavaServer Pages 2 specifications from the Java Community Process, and includes many additional features that make it a useful platform for developing and deploying web applications and web services. Apache Tomcat 7 Essentials foll...

Bridge Mind Maps With Google Drawings

Bridge maps are used for showing analogies. Google Drawings is a free application that is part of a Google account. This application can be used to create thinking maps from scratch. The process of creating thinking maps from scratch helps students learn about the creation and use of thinking maps by providing the visual and kinesthetic tools we all use to learn. Through the process of using Google Drawings to create thinking maps, s...

Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)

In just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up. Practical discussions provide an inside look at TCP/IP components and protocols. Step-by-step instructions walk you through many common tasks. Q&As at the end of each hour help you test your...

Inconsistency Robustness

Inconsistency robustness is information system performance in the face of continually pervasive inconsistencies---a shift from the previously dominant paradigms of inconsistency denial and inconsistency elimination attempting to sweep them under the rug. Inconsistency robustness is a both an observed phenomenon and a desired feature: • Inconsistency Robustness is an observed phenomenon because large information-systems are required t...

Twitter API: Up and Running: Learn How to Build Applications with the Twitter API

This groundbreaking book provides you with the skills and resources necessary to build web applications for Twitter. Perfect for new and casual programmers intrigued by the world of microblogging, Twitter API: Up and Running carefully explains how each part of Twitter's API works, with detailed examples that show you how to assemble those building blocks into practical and fun web applications.

Cisco Nac Appliance: Enforcing Host Security with Clean Access

This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.