|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 15
reviews
|
|
|
|
|
|
|
|
Migrating large-scale services to the cloud Passmore E., Apress, New York, NY, 2016. 122 pp. Type: Book (978-1-484218-72-3)
Are you moving large-scale workloads that cannot scale well to Microsoft Azure? Then you might want to take a look at this book, which discusses lessons learned from large-scale migration to the public cloud (Azure)....
|
Sep 18 2017 |
|
|
|
|
|
|
Pro PowerShell for Amazon Web Services: DevOps for the AWS cloud Beach B., Apress, Berkeley, CA, 2014. 316 pp. Type: Book (978-1-430264-51-4)
Development and operations (DevOps) is the art and science of streamlining the process between developers and operations (system/infrastructure/network administrators). This process is useful for software development shops using an agi...
|
Jan 19 2016 |
|
|
|
|
|
|
Virtualization vs. containerization to support PaaS Dua R., Raja A., Kakadia D. IC2E 2014 (Proceedings of the 2014 IEEE International Conference on Cloud Engineering,Mar 11-14, 2014) 610-614, 2014. Type: Proceedings
Containers are sets of tools that package an application and all of its dependencies so that it can run on any Linux system or distribution. This paper deals with the onset of containers and how they immensely help drive the productivi...
|
Apr 21 2015 |
|
|
|
|
|
|
From techie to boss: transitioning to leadership Cromar S., Apress, Berkeley, CA, 2013. 260 pp. Type: Book (978-1-430259-32-9)
So you are a well-respected technician, have been in the field for several years, have paid your dues, and now want to move up to management. You have your doubts; are you management material? This book guides you through the transitio...
|
Dec 1 2014 |
|
|
|
|
|
|
Professional penetration testing: creating and learning in a hacking lab (2nd ed.) Wilhelm T., Syngress Publishing, Waltham, MA, 2013. 464 pp. Type: Book (978-1-597499-93-4)
Have you ever wondered what might be involved in penetration testing? If you are searching for a book on that topic, this one is a great starting point, especially for system administrators and security professionals....
|
Jan 22 2014 |
|
|
|
|
|
|
Observing industrial control system attacks launched via Metasploit framework Wallace N., Atkison T. ACMSE 2013 (Proceedings of the 51st ACM Southeast Conference, Savannah, GA, Apr 4-6, 2013) 1-4, 2013. Type: Proceedings
Wallace and Atkison, in this paper, model several attacks against programmable logic controllers and observe packet timing during the attacks. During a denial of service attack, the researchers record observations of legitimate and spo...
|
Nov 20 2013 |
|
|
|
|
|
|
The official VCP5 certification guide Ferguson B., VMware Press, Upper Saddle River, NJ, 2013. 624 pp. Type: Book (978-0-789749-31-4)
I finally get it! I used to hear terms like cloud computing, private and public clouds, and virtual machines, and they just did not make any sense. I asked other people and they did not seem to know how these things worked either, or a...
|
Sep 16 2013 |
|
|
|
|
|
|
STACEE: enhancing storage clouds using edge devices Neumann D., Bodenstein C., Rana O., Krishnaswamy R. ACE 2011 (Proceedings of the 1st ACM/IEEE Workshop on Autonomic Computing in Economics, Karlsruhe, Germany, Jun 14, 2011) 19-26, 2011. Type: Proceedings
In this day and age, lots of bandwidth is consumed by the delivery of Web content, such as file sharing via peer-to-peer (P2P) applications and video streaming. Internet service providers are feeling the pressure to deliver such multim...
|
Aug 1 2012 |
|
|
|
|
|
|
Design and evaluation of a proxy cache for peer-to-peer traffic Hefeeda M., Hsu C., Mokhtarian K. IEEE Transactions on Computers 60(7): 964-977, 2011. Type: Article
Web content delivery, be it file sharing via peer-to-peer (P2P) applications or video streaming, consumes a lot of bandwidth. Internet service providers (ISPs) are feeling the pressure to deliver such multimedia content faster to the c...
|
Dec 21 2011 |
|
|
|
|
|
|
Remote data checking using provable data possession Ateniese G., Burns R., Curtmola R., Herring J., Khan O., Kissner L., Peterson Z., Song D. ACM Transactions on Information and System Security 14(1): 1-34, 2011. Type: Article
As we increasingly embrace the concept of cloud computing, the risks of losing data could not be greater. This paper describes those risks, and offers a solution by providing a model for provable data possession....
|
Aug 25 2011 |
|
|
|
|
|
|
|
|
|
|
|