Architecting Enterprise Blockchain Solutions


Book Description

Demystify architecting complex blockchain applications in enterprise environments Architecting Enterprise Blockchain Solutions helps engineers and IT administrators understand how to architect complex blockchain applications in enterprise environments. The book takes a deep dive into the intricacies of supporting and securing blockchain technology, creating and implementing decentralized applications, and incorporating blockchain into an existing enterprise IT infrastructure. Blockchain is a technology that is experiencing massive growth in many facets of business and the enterprise. Most books around blockchain primarily deal with how blockchains are related to cryptocurrency or focus on pure blockchain development. This book teaches what blockchain technology is and offers insights into its current and future uses in high performance networks and complex ecosystems. Provides a practical, hands-on approach Demonstrates the power and flexibility of enterprise blockchains such as Hyperledger and R3 Corda Explores how blockchain can be used to solve complex IT support and infrastructure problems Offers numerous hands-on examples and diagrams Get ready to learn how to harness the power and flexibility of enterprise blockchains!




MPE/iX System Administration Handbook


Book Description

This book will provide a complete reference to the essential tools and skills required for successful MPE/iX system management. The handbook offers hands-on examples, solutions to common problems, and tips on how to streamline operations and get the most out of your "HP e3000" system.




Enterprise Architecture A to Z


Book Description

Enterprise Architecture A to Z examines cost-saving trends in architecture planning, administration, and management. The text begins by evaluating the role of Enterprise Architecture planning and Service-Oriented Architecture (SOA) modeling. It provides an extensive review of the most widely-deployed architecture framework models, including The Open Group Architecture and Zachman Architectural Frameworks, as well as formal architecture standards. The first part of the text focuses on the upper layers of the architecture framework, while the second part focuses on the technology architecture. Additional coverage discusses Ethernet, WAN, Internet communication technologies, broadband, and chargeback models.




Halting the Hacker


Book Description

Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.




OpenView Network Node Manager


Book Description

PLEASE PROVIDE COURSE INFORMATION PLEASE PROVIDE




Developing Enterprise Web Services


Book Description

& Includes a detailed case study - with complete source code - of building Web Services with Java AND .Net. & & Covers key emerging standards in transactioning, conversations, workflow, security and authentication, mobile and wireless, QoS, portlets, and management. & & Presents best practices based on authors' experiences building real world Web Services-based applications.




Itanium Architecture for Programmers


Book Description

Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more Learn how to comprehend and optimize open source, Intel, and HP-UX compiler output Understand the full power of 64-bit Itanium EPIC processors Itanium(R) Architecture for Programmers is a comprehensive introduction to the breakthrough capabilities of the new 64-bit Itanium architecture. Using standard command-line tools and extensive examples, the authors illuminate the Itanium design within the broader context of contemporary computer architecture via a step-by-step investigation of Itanium assembly language. Coverage includes: The potential of Explicitly Parallel Instruction Computing (EPIC) Itanium instruction formats and addressing modes Innovations such as the register stack engine (RSE) and extensive predication Procedure calls and procedure-calling mechanisms Floating-point operations I/O techniques, from simple debugging to the use of files Optimization of output from open source, Intel, and HP-UX compilers An essential resource for both computing professionals and students of architecture or assembly language, Itanium Architecture for Programmers includes extensive printed and Web-based references, plus many numeric, essay, and programming exercises for each chapter.




J2EE and JAX


Book Description

CD-ROM contains: Source code -- Tools for developing and deploying Web services.




Mobilize Your Enterprise


Book Description

Explains mobile technology in clear language Provides business-specific perspective, applications, and analysis Outlines a methodology for reengineering processes around mobility Covers the why, how, who, when, and where of this powerful, emerging technology "...an insightful--and essential--guidebook to the wireless transformation of the enterprise, a 'must-read' for any business or IT manager." --Barry Zellen, Editorial Director and CEO, WirelessReport.net Companies can gain an enormous advantage by mastering mobile technology. A wireless workforce allows information to flow immediately and freely between off-site employees and the home office, leading to what mobile business strategy expert Patrick Brans calls friction-free sales and service. In Mobilize Your Enterprise, Brans explains precisely what you need to know about this emerging technology, where it's heading, and how it can benefit your organization. You'll discover how to profitably apply the technology to your particular situation and how reengineer your processes around mobility, all without delving into unnecessary technical detail. Wireless technology--how, when, and why to deploy it, and anticipating what's next Wireless solutions you can apply to your company Methods to reengineer business processes and claim huge competitive advantages from mobility Portable solutions presented in detail, from computing devices, wireless network technologies and application gateways to enterprise applications and security Real-life applications--you'll learn a great deal about wireless technology without being swamped in needless details Vendor profiles--software, infrastructure, hardware, hosting, and integration Managers, planners, and anyone else looking to improve their business using wireless technology will find Mobilize Your Enterprise an excellent resource. Brans' enthusiasm animates this complex topic--you'll grasp the big picture and understand how to apply the technology to your particular situation.