| by Zeljka Zorz - Thursday, 3 April 2014.
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the network is made and how these components are used. In short, they have to have an accurate picture of the situation. This book explains how to reach that goal.
| by Mirko Zorz - Monday, 24 March 2014.
With storage prices declining and the popularity of SD cards increasing, some computer makers are incorporating SD card readers into their machines. I find myself using them even more than USB thumb drives because of their small size and the fact that they fit into all my cameras, which makes it easy to carry files and photos around at all times.
What makes this Toshiba SD card stand out from the rest of what's in your drawer? It comes with a wireless connection. You can share your videos and photos with seven devices at the same time: PCs, Macs, smartphones and tablets, without the need for an Internet connection.
| by Zeljka Zorz - Wednesday, 19 March 2014.
With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover what of it is useful. This book explains how.
| by Berislav Kucan - Friday, 28 February 2014.
Rublon provides automatic two factor authentication for web applications. It currently supports Drupal, WordPress, Magento, PrestaShop and OpenCart. Two-factor authentication is definitely something that all web based applications should enforce, so using Rublon or some similar plugin is a good way to ramp up your security.
| by Zeljka Zorz - Friday, 21 February 2014.
A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the different service models, strategies on cloud adoption, and touches on cloud security, privacy and compliance.