DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. But learning DNSSEC requires wading through years of obsolete tutorials, dead ends, and inscrutable standards.
Your expert guide to building Microsoft® SharePoint® applications in the cloud
Deliver custom, cloud-based business solutions using SharePoint 2010 and Windows Azure™ together. By applying hands-on techniques from Microsoft cloud development expert Steve Fox, you'll learn how to increase the reach, resource capability, and reusability of your apps. Get the practical code exercises and solid advice you need—whether you're planning to build complete data-driven applications or hybrid solutions with simple Web parts.
Continue reading “Developing Microsoft SharePoint Applications Using Windows Azure (Developer Reference)”
Supercomputing research–the goal of which is to make computers that are
ever faster and more powerful–has been at the cutting edge of computer technology
since the early 1960s. Until recently, research cost in the millions of dollars, and
many of the companies that originally made supercomputers are now out of
business.The early supercomputers used distributed computing and parallel processing
to link processors together in a single machine, often called a mainframe.
Exploiting the same technology, researchers are now using off-the-shelf PCs to
produce computers with supercomputer performance. It is now possible to make a
supercomputer for less than $40,000. Given this new affordability, a number of
universities and research laboratories are experimenting with installing such
Beowulf-type systems in their facilities.This how-to guide provides step-by-step
instructions for building a Beowulf-type computer, including the physical elements
that make up a clustered PC computing system, the software required (most of which
is freely available), and insights on how to organize the code to exploit
parallelism. The book also includes a list of potential pitfalls.
Your guide to designing apps that extend the capabilities of your SharePoint site.
Take advantage of the most important new concept in Microsoft SharePoint 2013–the app. Led by two SharePoint experts, you’ll learn development techniques such as building app lists, creating event handlers, and the major classes in the object model that provide access to content stored in SharePoint.
Continue reading “Microsoft SharePoint 2013 App Development (Developer Reference)”
Tor And The Deep Web: The Complete Guide To Stay Anonymous In The Dark Net
Tor enables its users to surf the Internet, chat and send instant messages anonymously. Developed by the Tor Project, a nonprofit organization that promotes anonymity on the internet, Tor was originally called The Onion Router due to the fact that it uses a technique called “onion routing” to hide information about user activity.
With this book you can learn about:
-Introduction to Tor
-Installing the Tor browser
-How to use tor to protect your privacy
-5 important facts you need to know
-Legal or illegal
-Tips & recommendations
And much, much more!