With all the people in the world who have only access to a smartphone but not a PC or a keyboard, creating a programming environment for developing in that environment became a reality with TouchDevelop from Microsoft Research. This book is meant to be a handy reference to this unique programming environment.
An easily accessible but detailed book making it easy for beginners to experienced engineers to get the lowdown on the latest policies, practices, tools, and technologies available in the field of information security.
This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed.The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Intel® Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in technical computing applications.
This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that can be used to customize the servers boot process to fit the datacenters requirements.
This book provides a comprehensive look at the various facets of cloud security infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their usage in real applications that the reader can build themselves. It includes access to a live execution environment and real code examples.