Single sign-on lets users access multiple applications with one set of login credentials. Explore its types, pros and cons and implementation methods.| Search Security
TCP/IP is the backbone of internet communications. Learn how this suite of protocols works, its pros and cons and how it differs from the OSI model.| Search Networking
Learn about Java, an object-oriented programming language that's easy to use, secure, offers network portability and is popular for internet apps.| TheServerSide.com
In programming, objects are building blocks for software. Find out what an object is, how it works and why it's so important for efficient and secure code.| Search App Architecture
Learn the definition of access control, why access control is important and how technology is shifting the way organizations approach access control.| Security
Learn all about Linux, including what goes into a Linux distribution, how Linux is used, how it works, the pros and cons of using Linux and its history.| Search Data Center
Hybrid cloud computing enables an enterprise to deploy an on-premises private cloud for critical data and use a public cloud for less-critical resources.| Search Cloud Computing