Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Ravinder, Rajat
CCDC
WASHINGTON, United States
 
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 15 reviews

   
   Migrating large-scale services to the cloud
Passmore E., Apress, New York, NY, 2016. 122 pp.  Type: Book (978-1-484218-72-3)

Are you moving large-scale workloads that cannot scale well to Microsoft Azure? Then you might want to take a look at this book, which discusses lessons learned from large-scale migration to the public cloud (Azure)....

Sep 18 2017  
   Pro PowerShell for Amazon Web Services: DevOps for the AWS cloud
Beach B., Apress, Berkeley, CA, 2014. 316 pp.  Type: Book (978-1-430264-51-4)

Development and operations (DevOps) is the art and science of streamlining the process between developers and operations (system/infrastructure/network administrators). This process is useful for software development shops using an agi...

Jan 19 2016  
   Virtualization vs. containerization to support PaaS
Dua R., Raja A., Kakadia D.  IC2E 2014 (Proceedings of the 2014 IEEE International Conference on Cloud Engineering,Mar 11-14, 2014) 610-614, 2014.  Type: Proceedings

Containers are sets of tools that package an application and all of its dependencies so that it can run on any Linux system or distribution. This paper deals with the onset of containers and how they immensely help drive the productivi...

Apr 21 2015  
   From techie to boss: transitioning to leadership
Cromar S., Apress, Berkeley, CA, 2013. 260 pp.  Type: Book (978-1-430259-32-9)

So you are a well-respected technician, have been in the field for several years, have paid your dues, and now want to move up to management. You have your doubts; are you management material? This book guides you through the transitio...

Dec 1 2014  
   Professional penetration testing: creating and learning in a hacking lab (2nd ed.)
Wilhelm T., Syngress Publishing, Waltham, MA, 2013. 464 pp.  Type: Book (978-1-597499-93-4)

Have you ever wondered what might be involved in penetration testing? If you are searching for a book on that topic, this one is a great starting point, especially for system administrators and security professionals....

Jan 22 2014  
   Observing industrial control system attacks launched via Metasploit framework
Wallace N., Atkison T.  ACMSE 2013 (Proceedings of the 51st ACM Southeast Conference, Savannah, GA, Apr 4-6, 2013) 1-4, 2013.  Type: Proceedings

Wallace and Atkison, in this paper, model several attacks against programmable logic controllers and observe packet timing during the attacks. During a denial of service attack, the researchers record observations of legitimate and spo...

Nov 20 2013  
   The official VCP5 certification guide
Ferguson B., VMware Press, Upper Saddle River, NJ, 2013. 624 pp.  Type: Book (978-0-789749-31-4)

I finally get it! I used to hear terms like cloud computing, private and public clouds, and virtual machines, and they just did not make any sense. I asked other people and they did not seem to know how these things worked either, or a...

Sep 16 2013  
  STACEE: enhancing storage clouds using edge devices
Neumann D., Bodenstein C., Rana O., Krishnaswamy R.  ACE 2011 (Proceedings of the 1st ACM/IEEE Workshop on Autonomic Computing in Economics, Karlsruhe, Germany, Jun 14, 2011) 19-26, 2011.  Type: Proceedings

In this day and age, lots of bandwidth is consumed by the delivery of Web content, such as file sharing via peer-to-peer (P2P) applications and video streaming. Internet service providers are feeling the pressure to deliver such multim...

Aug 1 2012  
  Design and evaluation of a proxy cache for peer-to-peer traffic
Hefeeda M., Hsu C., Mokhtarian K. IEEE Transactions on Computers 60(7): 964-977, 2011.  Type: Article

Web content delivery, be it file sharing via peer-to-peer (P2P) applications or video streaming, consumes a lot of bandwidth. Internet service providers (ISPs) are feeling the pressure to deliver such multimedia content faster to the c...

Dec 21 2011  
  Remote data checking using provable data possession
Ateniese G., Burns R., Curtmola R., Herring J., Khan O., Kissner L., Peterson Z., Song D. ACM Transactions on Information and System Security 14(1): 1-34, 2011.  Type: Article

As we increasingly embrace the concept of cloud computing, the risks of losing data could not be greater. This paper describes those risks, and offers a solution by providing a model for provable data possession....

Aug 25 2011  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy