Linux Network Administrator's Guide
Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator's Guide spells out all the information needed for joining a network, whether it's a simple UUCP connection or a full LAN with a Linux system serving as a firewall, an NFS or ...
The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
Research Assessment in the Humanities
This book is open access, which means that you have free and unlimited access.This book analyses and discusses the recent developments for assessing research quality in the humanities and related fields in the social sciences. Research assessments in the humanities are highly controversial and the evaluation of humanities research is delicate. Whi...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of long...
Office 365
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
Global Health Collaboration
This stimulating open access volume details the innovative work of the Pan Institution Network for Global Health in creating collaborative research-based answers to large-scale health issues. Equitable partnerships among member universities representing North America, Africa, Asia, and Europe reverse standard cross-national dynamics to develop loca...
Inside Asylum Bureaucracy: Organizing Refugee Status Determination in Austria
This open access monograph provides sociological insight into governmental action on the administration of asylum in the European context. It offers an in-depth understanding of how decision-making officials encounter and respond to structural contradictions in the asylum procedure produced by diverging legal, political, and administrative objectiv...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Energy Efficient Servers
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
Open and Distance Education in Australia, Europe and the Americas
This free book describes the history, structure and institutions of open and distance education in six countries: Australia, Brazil, Canada, Germany, the UK and the US. It discusses how open and distance education is evolving in a digital age to reflect the needs and circumstances of national higher education systems in these countries, and explore...
The Future of Election Administration
As the American election administration landscape changes as a result of major court cases, national and state legislation, changes in professionalism, and the evolution of equipment and security, so must the work of on-the-ground practitioners change. This Open Access title presents a series of case studies designed to highlight practical response...
Open and Distance Education in Asia, Africa and the Middle East
This book describes the history, structure and institutions of open and distance education in six countries: China, India, Russia, Turkey, South Africa and South Korea. It describes how open and distance education is evolving in a digital age to reflect the needs and circumstances of the national higher education systems in these countries. It al...
Reforms, Organizational Change and Performance in Higher Education
This book investigates the effects of changes in leadership and managerial structures of Nordic universities resulting from reforms in the last decade. It builds on a rich, comparative dataset across a multiplicity of system-wide (macro) and organisational (meso and micro) dimensions, namely: reform or policy initiatives; drivers, aims, instruments...
SQL Server Hardware
SQL Server Hardware will provide the fundamental knowledge and resources you need to make intelligent decisions about choice, and optimal installation and configuration, of SQL Server hardware, operating system and the SQL Server RDBMS. Relational databases place heavy demands on their underlying hardware and many of these databases are mission-...
Ten Steps to Linux Survival
Linux systems are everywhere today, even in companies once considered "pure Windows." If you're a sysadmin, network administrator, or developer in a small Windows shop, you may have to jump in and fix a system problem when your site goes down. What if you have no Linux knowledge? This short guide provides tips to help you survive. Linu...
WSES Handbook of Mass Casualties Incidents Management
This manual, written by world opinion leaders in the field, is designed to provide readily accessible, step-by-step guidance on all aspects of the management of mass casualty incidents. Readers will find a wealth of helpful practical suggestions as well as information on the latest relevant scientific advances and their implications. Globally, mass...
Introducing Microsoft Power BI
Introducing Microsoft Power BI enables you to evaluate when and how to use Power BI. Get inspired to improve business processes in your company by leveraging the available analytical and collaborative features of this environment. This book is targeted to a variety of readers. There are information workers and people who are totally new to the B...
Configuring Microsoft SharePoint Hybrid Capabilities
Microsoft SharePoint hybrid consists of a growing list of advanced hybrid solutions that empowers organizations to consume benefits of the cloud and maintain their on-premises investments. This book is the second in a series of SharePoint hybrid books in which we show you how to configure, troubleshoot, and manage a SharePoint hybrid environment. ...
Building a Virtualized Network Solution
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
Data Science with Microsoft SQL Server 2016
R is one of the most popular, powerful data analytics languages and environments in use by data scientists. Actionable business data is often stored in Relational Database Management Systems (RDBMS), and one of the most widely used RDBMS is Microsoft SQL Server. Much more than a database server, it's a rich ecostructure with advanced analytic capab...
DevOps: WTF?
"DevOps" is creating a lot of anxiety amongst the IT professionals of the world. It's also causing a bit of a boom for technology marketing people, who in turn are making the whole concept confusing for businesses and professionals alike. This is an effort to set the record straight for someone who might be feeling a little vague or un...
Blazor Succinctly
Blazor technology enables you to create sophisticated, manageable, and extensible single-page applications using C# and Razor syntax. Blazor Succinctly will cover the core elements of Blazor, then explore additional features by building a sample help desk application. Michael Washington will take readers from creating the project in Visual Studio t...
Planning and Preparing for Microsoft SharePoint Hybrid
Microsoft SharePoint hybrid deployments are rapidly becoming popular with Microsoft's investments on increased SharePoint productivity, not only in your own environment (on-premises) but also collaborating in new ways through the largest and most advanced cloud service platform in the world - Microsoft Office 365 and Microsoft Azure. SharePoint hyb...
The DSC Book
Learn everything you need to know about Microsoft's Desired State Configuration, a management platform in Windows PowerShell. The DSC Book is designed to help you understand how DSC works, and how you can use it in a variety of scenarios....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
Effective AWK Programming
When processing text files, the awk language is ideal for handling data extraction, reporting, and data-reformatting jobs. This practical guide serves as both a reference and tutorial for POSIX-standard awk and for the GNU implementation, called gawk. This book is useful for novices and awk experts alike. In this thoroughly revised 5th edition, ...
Mathematics Teacher Preparation in Central America and the Caribbean
This open book is an excellent synthesis of the initial and continuing preparation for Mathematics Teaching in Colombia, Costa Rica, Dominican Republic and Venezuela, from which comparative analyses can be made that show similarities and differences, and highlight various perspectives. In August 2012, a workshop of the Capacity and Networking Proj...
25 Years of Ed Tech
In this lively and approachable volume based on his popular blog series, Martin Weller demonstrates a rich history of innovation and effective implementation of ed tech across higher education. From Bulletin Board Systems to blockchain, Weller follows the trajectory of education by focusing each chapter on a technology, theory, or concept that has ...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
Version Control with Subversion
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.7 with a complete introduction and guided tour of its capabilities, along with best practice recommendations. Version Control with Subve...
Blazor WebAssembly Succinctly
Blazor is a framework for creating SPA webpages with either client-side or server-side architectures, using Razor technology written with the C# language. Because client-side Blazor with WebAssembly executes entirely on a user's browser, it's very fast for many applications. In Blazor WebAssembly Succinctly, Michael Washington will take readers thr...