|
|
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.
As the... | | | | Microsoft SharePoint 2010 Developer Reference
Microsoft SharePoint is one of the biggest productivity frameworks released during the last ten years. Microsoft SharePoint 2010 is just the last step of a fabulous journey (that began in 2001) in the world of business productivity, collaboration, knowledge sharing, search technologies, and social networking.
From a... |
|
Performance Testing Guidance for Web Applications
Performance Testing Guidance for Web Applications provides an end-to-end approach for implementing performance testing. Whether you are new to performance testing or looking for ways to improve your current performance-testing approach, you will gain insights that you can tailor to your specific scenarios.
The information in this... | | Microsoft Dynamics CRM 2011 Step by Step
Welcome to Microsoft Dynamics CRM 2011 Step by Step! Most likely, your organization has implemented—or is considering implementing—a Microsoft Dynamics CRM system, and you’re ready to learn more about what the software can do. Whether you’re a sales associate following up with your top accounts, a marketing... | | Deploying Microsoft Forefront Threat Management Gateway 2010
When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,... |
|
|
Out of the Inner Circle: A Hacker's Guide to Computer Security
This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system.... | | Working with Microsoft Dynamics CRM 2011
We love Microsoft Dynamics CRM 2011, and we hope that by the time you finish reading this book, you will love Microsoft Dynamics CRM, too. We understand that you might be skeptical about the possibility of falling for a piece of software, but we want you to know right up front that our goal is to show you all of the wonderful and... | | Programming Applications for Microsoft Office Outlook 2007
Microsoft Office Outlook 2007 offers compelling new product features including Instant Search, task flagging, the To-Do Bar, Calendar overlays, sharing with friends and coworkers, Really Simple Syndication (RSS) feeds, Electronic Business Cards, Microsoft Office SharePoint Server integration, and plenty of other features that make Outlook... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |