Features
Features
-
Snort configuration -- Non-dynamic preprocessors
This segment of the Snort configuration tip deals with non-dynamic preprocessors. Continue Reading
-
Snort configuration -- Defining IP ranges of interest
This segment of Snort configuration discusses how channel professionals can define IP ranges of interest. Continue Reading
-
Snort configuration -- Conclusion
This segment wraps up the Snort configuration tip. Continue Reading
-
Snort configuration -- snort.conf file
This portion of Snort Report helps channel professionals understand the snort.conf file. Continue Reading
-
BitLocker demystified: The basics
In the second part of the guide to BitLocker, channel professionals will learn how the tool works, and find out about special features. Continue Reading
-
MySQL alternatives
IBM DB2, Informix, Microsoft SQL Server and Oracle are some of the expensive alternatives to MySQL, described in this excerpt from "The Definitive Guide to MySQL 5". Continue Reading
-
MySQL versions, by the numbers
Keeping track of MySQL versions can be challenging. This list of version numbers will help you get started. Continue Reading
-
MySQL database glossary
Look up basic database and MySQL terms in this book excerpt from "The Definitive Guide to MySQL 5" Continue Reading
-
MySQL version names
Since MySQL 4.0, free and commercial MySQL versions have different names, outlined in this excerpt from "The Definitive Guide to MySQL 5". Continue Reading
-
MySQL limitations
Prepare yourself to overcome or avoid this list of MySQL shortcomings from the book "The Definitive Guide to MySQL 5". Continue Reading
-
What are the top MySQL features?
Find the most important MySQL properties listed in this book excerpt from "The Definitive Guide to MySQL 5". Continue Reading
-
Using MySQL licensing: Open source license vs. commercial license
Get an overview of the MySQL open source licensing options in this excerpt from "The Definitive Guide to MySQL 5". Continue Reading
-
Installing Snort: Intrusion detection mode
In this installment of Snort Report, learn how to run the open source IDS/IPS in intrusion detection mode. Continue Reading
-
Installing Snort: Packet logger mode
In this installment of Snort Report, learn how to run the open source intrusion detection system in packet logger mode. Continue Reading
-
Installing Snort: Conclusion
A conclusion to the Snort Report installments on installation and fundamentals. Continue Reading
-
Installing Snort: Sniffer mode
In this installment of Snort Report, learn how to run the open source IDS/IPS in sniffer mode. Continue Reading
-
Consuming Web Services and the Handheld Device
.Net Web Service enables consumers to create rich applications that can access Web Service data--such as GPS--from a Pocket PC. To learn more read on. Continue Reading
-
Internet Protocols and the .NET Pluggable Protocol Mode
.NET's pluggable protocol modes enable handheld devices to request Internet information. Learn more in this book excerpt from Pocket PC Network Programming. Continue Reading
-
Winsock, .NET and the Compact Framework
Getting started using Winsock Interface is outlined in this book excerpt from Steve Makofsky's Pocket PC Network Programming. Continue Reading
-
Networking with Compact Framework
Use .NET's Compact Framework to help your customers set up their end users with Web-accessible handheld devices. Learn more in this book excerpt from Pocket PC Network Programming. Continue Reading
-
TCP IP protocol and application performance
Understand how TCP flow control can impact storage network performance in this excerpt from IP Storage Networking: Straight to the Core. Continue Reading
-
Network bandwidth: Sizing for long-distance storage networking applications
Decide which type of data mirroring to use in a customer's environment and learn how to size network bandwidth in this excerpt from IP Storage Networking: Straight to the Core. Continue Reading
-
Network latency effects on application performance
Learn how to troubleshoot storage networking performance limitations caused by network latency in this excerpt from IP Storage Networking: Straight to the Core. Continue Reading
-
Primary advantages of Linux
Linux has low or no licensing fees, allows you to reuse code, and enables you to incorporate with it inexpensive hardware and compatible applications. Continue Reading
-
Linux's roots in Unix
Find out what were the conditions that made the world ripe for a computer system like Linux. Continue Reading
-
Understanding the Linux kernel's common features
The Linux kernel can be modified to support a variety of features, from multiuser accounts to graphical user interfaces in the open source operating system. Continue Reading
-
What is the Linux operating system?
Today thousands of software developers contribute to the Linux initiative. Find out where it all began in this short Linux history lesson. Continue Reading
-
Why choose Fedora or Red Hat Enterprise Linux?
Each Linux distribution adds some extra features to distinguish one from another. This book excerpt outlines many of those features in detail. Continue Reading
-
Virtualization technology: Server, storage and network virtualization
Virtualization technologies mask, abstract and transparently leverage underlying resources in server, data storage and networking environments. Continue Reading
-
Governance should be a key part of app development
A large majority of organizations have difficulty integrating IT management and governance processes with their systems for managing application development. One solutions provider offers tips for addressing this problem. Continue Reading
-
Eight steps to reducing compliance risks
Get one risk management tool provider's take on the top three corporate ethics and compliance issues facing major companies today. Continue Reading
-
VMware configuration: Verifying and viewing VMware ESX Server configuration files
Before starting a VMware configuration, follow these best practices for preparing a VMware ESX Server configuration from Virtualization: From the Desktop to the Enterprise. Continue Reading
-
Virtual machines: Installing and deploying VMs on enterprise servers
Install and deploy virtual machines (VMs) in your customers' production environments with advice in this chapter from Virtualization: From the Desktop to the Enterprise. Continue Reading
-
VMware ESX Server installation
To tackle a VMware ESX Server installation, you must first know Linux. Get VMware installation scenarios in this excerpt from Virtualization: From the Desktop to the Enterprise. Continue Reading
-
Packaged integration applications
Packaging common integration processes allows for better data movement between enterprise applications. Find out how you may be able to profit from packaged integration solutions. Continue Reading
-
Enterprise Information Integration's pros and cons
Understand the differences between Enterprise Information Integration and a data warehouse before tackling an EII project. Continue Reading
-
Supporting real-time BI with real-time ETL
Companies are looking to invest in real-time ETL for several reasons. Find out what they are in this Q&A before pitching real-time ETL to a customer. Continue Reading
-
VARs/SIs will be the new face of open source support
Customers want to know who to call when something goes wrong with open source solutions, and VARs and SIs are finding themselves the source for support as they move into the open source arena. Continue Reading
-
Five components of a data protection strategy
When developing a data protection strategy, you have five storage practices and techniques to consider. Continue Reading