Linux Thin Client Networks Design and DeploymentA thin client network is a client-server architecture where client computers depend primarily on a central server for processing activities. The client machines (thin clients) mainly focus on passing user input to remote services and receiving and displaying the output; thin clients aren't as much about the hardware or software as about the design.
This book has all the information you need to easily set up your own Linux thin client network. It will help you evaluate how a thin client network fits into your organization and make informed choices on the hardware and software needed for your deployment, discusses design issues, and guides you with building, configuring, and supporting the network. ...
VMware Workstation - No Experience NecessaryVMware Workstation runs on Linux as well as Windows hosts and handles different virtual machine formats, which allows you to share your work with users of other virtualization platforms, including VirtualBox, VMware Player, and VMware vSphere environments.
VMware Workstation - No Experience Necessary helps you in getting started with VMware Workstation. You'll learn how to install VMware Workstation in any circumstance, and how to create virtual machines and keep different configurations for each virtual machine, which helps in setting up extensive test environments. You'll also learn how to share these virtual machines with users of other virtualization products as well as the cloud. ...
3D Game Development with Microsoft Silverlight 3Microsoft Silverlight is a programmable web browser plug-in that enables the animation, vector graphics, and audio-video playback features that characterize Rich Internet Applications. Silverlight is a great (and growing) RIA platform and games are the next level to exploit in it. But it doesn't offer 3D capabilities out of the box and integrating a 3D engine can involve lot of complex mathematics and matrix algebra. This book will help C# developers to get their fingers on the pulse of 3D in Silverlight.
This book uses Balder, an open source 3D engine offering 3D capabilities for Silverlight 3. It leaves out boring matrix algebra and complex 3D mathematics. By the end of the book you will have explored the entire engine, and will be able to design and program your own 3D games with ease! ...
Blender Compositing and Post ProcessingBlender Compositing allows you to assemble and enhance an image (or movie). Using Composition nodes, you can glue two pieces of footage together and colorize the whole sequence all at once. You can enhance the colors of a single image or an entire movie clip in a static manner or in a dynamic way that changes over time (as the clip progresses).
Blender Compositing and Post Processing enables you to attain a firm grounding in order to arrive at a desired look of the film, with more ease and efficiency. You will also learn how to create and manage compositing flows that are effective and productive in meeting project deadlines. ...
Building a Home Security System with BeagleBoneOne of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection system. Security companies make a fortune each year by charging exorbitant fees to their customers. You will learn how easy it is to make an alarm system with Beaglebone.
A company-maintained-and-monitored alarm system has its place - your dear old mum is probably not going to be creating her own system any time soon. But if you are reading this book, you are probably a builder or a hobbyist with all the skills required to do it yourself. With Building a Home Security System with BeagleBone, you will learn everything you need to know to develop your own state-of-the-art security system, all for less than a year's worth of monitoring charges from your local alarm company! ...
Securing HadoopSecurity of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. ...
Learning Nessus for Penetration TestingIT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively.
Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gives you a comprehensive insight into the use of this tool. This book is a step-by-step guide that will teach you about the various options available in the Nessus vulnerability scanner tool so you can conduct a vulnerability assessment that helps to identify exposures in IT infrastructure quickly and efficiently. This book will also give you an insight into penetration testing and how to conduct compliance checks using Nessus. ...
Three.js EssentialsCreate beautiful visualizations and 3D scenes using Three.js with this practical, example-rich book. Learn all the core concepts of Three.js, and whether you are targeting mobile devices or desktop browsers, you will gain the necessary skills to build a 3D application and improve web performance.
From setting up a development environment and creating your first Three.js scene, you will quickly dive into more complex scene-making. Discover a variety of possible scenes from how to make a rotating planet with data overlay to mini games. Through these examples, you will be shown an array of skills from using materials, controls, and lighting to creating particle systems and geometries from scratch. ...
Introducing Windows 8Get a head start evaluating Window 8. Based on the Release Preview of the software, this guide introduces new features and capabilities, with scenario-based insights demonstrating how to plan for, deploy, and maintain Windows 8 in an enterprise environment.
Network administrators will get an early, high-level view of these topics and more: Performance, reliability, and security features; Deployment options; Managing the new UI using; Group Policy and Windows PowerShell; Internet Explorer 10; Virtualization and cloud solutions; Microsoft Desktop Optimization Pack; Recovery features. ...
Lean-Agile Acceptance Test-Driven DevelopmentWithin the framework of Acceptance Test-Driven-Development (ATDD), customers, developers, and testers collaborate to create acceptance tests that thoroughly describe how software should work from the customer's viewpoint. By tightening the links between customers and agile teams, ATDD can significantly improve both software quality and developer productivity. ...