Books: 7

SSL

CoverTitleYear
A How-To Reference on Simulating a Realistic SharePoint Testing Environment
This book is a step-by-step guide to building your own SharePoint farm in a home lab setting. Learn how to build a windows domain and then join servers into the domain in order to create your own testing and learning environment. After you get the domain stood up, where you go from there is up to you. more » This book will help you learn how to spin up SharePoint in a least privileged fashion.This isn’t strictly a SharePoint book, though. For example, if you’re not a SharePoint professional and are just looking to create a working windows domain for other purposes; the home-lab domain that you’ll create will work great for Exam preparation for non-SharePoint purposes. You could even use it for learning how to install Exchange Server. After all, it’s your Home Lab domain.In this book you will build your home-lab domain and you’ll have a great place for learning how to administer SharePoint and develop SharePoint Apps. Here are just some of the tasks you’ll complete in easy to follow exercises: * Create a windows domain and a certificate authority, so that you can run SharePoint on SSL * Join servers to the domain and configure other technology on the member servers as needed * Install SQL Server, and correctly partition the server in accordance with best practices * Install and configure a SharePoint farm * Spin up Host Named Site Collections (HNSC’s) * Install and configure Visual Studio Who This Book Is For: This book is suitable for both developers and administrators. No technical knowledge is assumed beyond a general familiarity with computers and computing terminology. The resulting domain will be suitable for both IT and developer testing needs. « less
2016
Get to grips with advanced real-time communication applications and services on WebRTC with practical, hands-on recipes
Using WebRTC, it is easy to develop in-browser applications and web services with extended multimedia features such as audio/video calls, VoIP, screen casting, peer-to-peer file transferring and more, without installing any third-party components/plugins on the client. In this book, you'll explore practical more » recipes covering the core aspects of application and service development with WebRTC. After a recap of the basics of developing rich media web applications and services, you will delve into core functionalities such as security and SSL, integration with other technologies such as VoIP and SIP, debugging clients and servers, working with filters, native applications for mobile platforms, and using third-party components. By the end of this book, you will be able set up advanced, real-time, communicating networks with a full understanding of core WebRTC features. « less
2015
Leverage the power of JBoss EAP6 to successfully build high-availability clusters quickly and efficiently
From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix. Overview * A thorough introduction to the new domain mode provided more » by JBoss EAP6 * Use mod_jk and mod_cluster with JBoss EAP6 * Learn how to apply SSL in a clustering environment In Detail High availability is a system design approach and associated service implementation which ensures that a prearranged level of operational performance will be met during a contractual measurement period. High availability is usually a system combined with many different components that achieve different goals. High availability cluster implementations attempt to build redundancy into a cluster to eliminate single points of failure. JBoss EAP6 High Availability is the perfect guide for learning how to apply the newest technologies provided by JBoss to build your high availability system. With a clear explanation of the design of JBoss EAP6 and its clustering components, this book will help you customize each component to fulfill your specific requirements. Throughout the course of this book, you will learn how to build high availability clusters using the projects provided by JBoss. The book begins with an introduction to the design of JBoss EAP6 and its uses. The next step will be to explore the two companion open source projects - mod_jk and mod_cluster. In this section, you will get to grips with the concept of load balancing with mod_jk and mod_cluster. You will also learn how to enable SSL in the clustering environment and how to configure session replication between EAP6 servers. Furthermore, the appendix section introduces you to some troubleshooting techniques for Wildfly. What you will learn from this book * Understand the basic usages of JBoss EAP6 * Learn about domain management in JBoss EAP6 * Use mod_jk as the load balancer of a JBoss AS cluster * Deploy mod_cluster as the load balancer of a JBoss AS cluster * Learn how to apply SSL into a cluster * Enable session replication in a cluster * Understand CDI and EJB stateful session bean clustering * Configure sticky sessions with JK and mod_cluster Approach An easy-to-follow guide full of hands-on examples of real-world administration tasks. Who this book is written for JBoss EAP6 High Availability is ideal for those who want to learn how to use JBoss EAP6 to set up a cluster. Basic knowledge of Linux/Unix is required. « less
2013
The insiders guide on how to secure your VMware View Environment
The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced. Overview * Discover how to correctly implement more » View connection, security, and transfer servers * Understand all the firewall rules and the basics of multi-layered security * Secure all your connections between client and desktop In Detail Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering from it. These elements of security are what this book aims to address. VMware View Security Essentials addresses the topic of security in the corporate environment in a new way. It starts with the underlying virtual infrastructure and then delves into securing your base, your connection, and your client. This is not only a “how-to” book, but is also a book that explains the background and the insights of View security for the experienced professional's desktop virtualization. This book takes you through the four major View security areas. Each area deals with all the aspects of security and explains the background as well as laying out simple-to-follow recipes to implement a higher security standard. We start at the Virtualization base and work our way through the various View server types. We will then dive into the problems and issues of securing a connection before we address the security of the desktop itself. We conclude with a look into the backing up of our View installation and preparing for disaster recovery. What you will learn from this book * Create, use, and install SSL certificates * Acquire a new skill set in troubleshooting security issues * Learn about secure tunnelling your desktop connection with RDP and PCoIP * Understand the concepts of pairing View security and transfer severs with View connection servers * Understand the key aspects of blocking undesirable USB devices Approach A practical and fast-paced guide that gives you all the information you need to secure your virtual environment. Who this book is written for This book is a “how-to” for the novice, a “reference guide” for the advanced user, and a “go to" for the experienced user in all the aspects of VMware View desktop virtualization security. « less
2013
The Windows Azure Platform has rapidly established itself as one of the most sophisticated cloud computing platforms available. With Microsoft working to continually update their product and keep it at the cutting edge, the future looks bright—if you have the skills to harness it. In particular, new more » features such as remote desktop access, dynamic content caching and secure content delivery using SSL make the latest version of Azure a more powerful solution than ever before. It’s widely agreed that cloud computing has produced a paradigm shift in traditional architectural concepts by providing new ways to both store and process data. The basic concepts of the cloud are now well understood throughout the industry. What is much less well understood, and the primary focus of this book, is how the the Windows Azure technology can be applied in real-world scenarios and made to work for you. This book answers those questions, demonstrating how all the features of Windows Azure—both old and new—can be put to work. By the time you’re done reading, you will be comfortable building high-quality end-to-end Windows Azure services of your own. The book, like the Azure platform itself, is divided into three key parts—Windows Azure, SQL Azure, and Windows Azure AppFabric. Each of these plays a unique role in the functioning of your cloud service. It is the goal of this book to show you how to use these components, both separately and together, to build flawless cloud applications as well as hybrid architectures that fit in alongside your business' existing systems. Pro Windows Azure Platform, Second Edition is a down-to-earth, code-centric book that shows precisely how the all the components of Windows Azure are employed, and demonstrates the techniques and best practices you'll need to put them to work. « less
2011
A Practical Approach
"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters A Down-to-Earth Guide to Cloud Computing Cloud Computing: A Practical Approach provides more » a comprehensive look at the emerging paradigm of Internet-based enterprise applications and services. This accessible book offers a broad introduction to cloud computing, reviews a wide variety of currently available solutions, and discusses the cost savings and organizational and operational benefits. You'll find details on essential topics, such as hardware, platforms, standards, migration, security, and storage. You'll also learn what other organizations are doing and where they're headed with cloud computing. If your company is considering the move from a traditional network infrastructure to a cutting-edge cloud solution, you need this strategic guide. Cloud Computing: A Practical Approach covers: * Costs, benefits, security issues, regulatory concerns, and limitations * Service providers, including Google, Microsoft, Amazon, Yahoo, IBM, EMC/VMware, Salesforce.com, and others * Hardware, infrastructure, clients, platforms, applications, services, and storage * Standards, including HTTP, HTML, DHTML, XMPP, SSL, and OpenID * Web services, such as REST, SOAP, and JSON * Platform as a Service (PaaS), Software as a Service (SaaS), and Software plus Services (S+S) * Custom application development environments, frameworks, strategies, and solutions * Local clouds, thin clients, and virtualization * Migration, best practices, and emerging standards « less
2009
How TCP/IP Works in a Modern Network
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated more » Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other. Here are ten key differences between the two: Stevens Goralski's Older operating systems (AIX,svr4,etc.) Newer OSs (XP, Linux, FreeBSD, etc.) Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series) Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern) Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!) No IPSec IPSec No multicast Multicast No router security discussed Firewall routers detailed No Web Full Web browser HTML consideration No IPv6 IPv6 overview Few configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols * New Modern Approach to Popular Topic Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. * Shows and Tells Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision. * Over 330 Illustrations True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce concepts * Based on Actual Networks A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus. « less
2008