| by Zeljka Zorz - Friday, 21 February 2014.
A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the different service models, strategies on cloud adoption, and touches on cloud security, privacy and compliance.
| by Mirko Zorz - Monday, 27 January 2014.
| by Zeljka Zorz - Wednesday, 8 January 2014.
Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through the steps of such an investigation and provides information about collecting and interpreting electronic evidence that will be used to prosecute the criminals.
| by Mirko Zorz - Thursday, 2 January 2014.
I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network and share a variety of information, while companies use it to communicate with their customers.
However, it's not all great since social media brings also copious privacy and security concerns. While individuals tend to over share sensitive information, the enterprise treads on even more sensitive ground with a varied set of potential disasters. This book presents the risks present in social networking and shows you how to mitigate them. Read on to discover how it fares.
| by Zeljka Zorz - Thursday, 21 November 2013.
“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video conferencing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax),” Wikipedia explains. This book concentrates on VoIP and the attacks leveraged against it.