Single sign-on lets users access multiple applications with one set of login credentials. Explore its types, pros and cons and implementation methods.| Search Security
A digital signature is a technique to validate the authenticity of a digital document. Learn how it works, its benefits and security issues.| Search Security
Data replication helps organizations maintain up-to-date copies of data in a disaster. Replication can occur over various networks, as well as the cloud.| Search Disaster Recovery
TCP/IP is the backbone of internet communications. Learn how this suite of protocols works, its pros and cons and how it differs from the OSI model.| Search Networking
Learn about Java, an object-oriented programming language that's easy to use, secure, offers network portability and is popular for internet apps.| TheServerSide.com
In programming, objects are building blocks for software. Find out what an object is, how it works and why it's so important for efficient and secure code.| Search App Architecture
Learn the definition of access control, why access control is important and how technology is shifting the way organizations approach access control.| Security
Learn all about Linux, including what goes into a Linux distribution, how Linux is used, how it works, the pros and cons of using Linux and its history.| Search Data Center
Hybrid cloud computing enables an enterprise to deploy an on-premises private cloud for critical data and use a public cloud for less-critical resources.| Search Cloud Computing