You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Measure, manage, and improve the speed and reliability of Web services with this complete reference for creating relevant, effective Service Level Agreements. Starting with an explanation of SLM and common performance metrics, the book provides detailed discussions of methods to measure and improve performance.
Accompanying CD-ROM contains resources for Macromedia Flash including project files, Flash-related software, royalty-free sounds and web resources.
bull; Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts bull; Experience how remote access concepts work in a real network with practice labs that walk you through their implementation bull; Review set-up guides that show you how to prepare a lab for study bull; Ready yourself for the new simulation-based questions on the CCNP exams
By using this innovative text, students will obtain an understanding of how contemporary operating systems and middleware work, and why they work that way.
The only guide to the CISCO Secure Access Control Server, this resource examines the concepts and configuration of the Cisco Secure ACS. Users will learn how to configure a network access server to authenticate, authorize, and account for individual network users that telecommute from an unsecured site into the secure corporate network.
A systems analysis approach to enterprise network design Master techniques for checking the health of an existing network to develop a baseline for measuring performance of a new network design Explore solutions for meeting QoS requirements, including ATM traffic management, IETF controlled-load and guaranteed services, IP multicast, and advanced switching, queuing, and routing algorithms Develop network designs that provide the high bandwidth and low delay required for real-time applications such as multimedia, distance learning, and videoconferencing Identify the advantages and disadvantages of various switching and routing protocols, including transparent bridging, Inter-Switch Link (ISL)...
Itâe(tm)s OK to feel angry. What does being angry feel like? What does it look like? How can you help anger go away? Everyone feels angry sometimes.
Updated to cover the functionality and ActionScripting changes that have come with the release of Flash MX Professional 2004, this edition brings more clarity to the use of object-oriented programming for developing Flash applications. Topics include object design, basic patterns, using components, and debugging applications, all covered with a backdrop of a sample application.
The most comprehensive guide to learning and maximizing the latest version of ColdFusion. Inside ColdFusion MX begins with a discussion of ColdFusion MX and how it differs from previous versions of ColdFusion. The authors discuss the new ColdFusion Administration/Administration, integration with existing IDE's, recent language extensions, and the planning and development of ColdFusion applications under the new CF architecture. The book delves into a detailed discussion of the CFML language, the heart-and-soul of ColdFusion application development, including real-world example code and discussion on how to solve common problems. Coverage includes advanced application development topics, such as exception handling, interacting with other application/server resources, and extending ColdFusion MX with other technologies. The book discusses complex topics in an easy-to-follow and easy-to-understand way, focusing on the questions developers will ask when using the book for problem-solving.
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-auth...