Most of our resources will ask you to log in as a JMU user through the browser (OpenAthens).
But a few resources are restricted to JMU's WifF network and require Pulse Secure. When they do, databases will have a little black square with a green S next to the name.
Most of our resources will ask you to log in as a JMU user through the browser (OpenAthens).
But a few resources are restricted to JMU's WifF network and require Pulse Secure. When they do, databases will have a little black square with a green S next to the name.
Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people.
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas.
With this hands-on guide, Harry Percival and Bob Gregory from MADE.com introduce proven architectural design patterns to help Python developers manage application complexity--and get the most value out of their test suites.
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues.
Explains some of the ways in which technological advances are altering, for better or worse, large-scale human behavior, thought processes, and critical thinking skills.
This in-depth guide provides the fundamental knowledge required to implement and administer a broad range of modern networking and IT infrastructure.
The purpose of designing this book is to discuss and analyze security protocols available for communication.
In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.