Implementing Security and Tokens: Current Standards, Tools, and Practices

Size: px
Start display at page:

Download "Implementing Security and Tokens: Current Standards, Tools, and Practices"

Transcription

1 Implementing Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc.

2

3 Implementing Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc.

4 Implementing Security and Tokens: Current Standards, Tools, and Practices Published by Wiley Publishing, Inc Crosspoint Boulevard Indianapolis, IN Copyright 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: Manufactured in the United States of America No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., Crosspoint Blvd., Indianapolis, IN 46256, (317) , fax (317) , or online at Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) , outside the U.S. at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data is available from publisher. Trademarks: Wiley, the Wiley logo, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

5 Dedicated to all those who helped develop the Internet and those who will help develop it in the future. S.T.andR.H. Thanks for the loving support from Sue, Ryan, and Patrick. R.H. Thanks for all the support Mom and Dad. S.T.

6

7 About the Authors Sean Turner Mr. Turner is vice president and a co-founder of International Electronic Communications Analysts Inc. ( a Virginia-based consulting services firm that specializes in information security, protocol design, and technical standardization for both the government and commercial sectors. His consulting efforts draw on his vast experience in secure systems analysis, architecture, design, and engineering of , public key infrastructures, and key management systems. He assists clients with Service Oriented Architecture concepts, developing certificate policies, applying security to web services, and addressing issues of security policy and access control. He has been active in technical standards efforts in the IETF for over 12 years, and he is the author of numerous RFCs. He has been the S/MIME WG co-chair since mid Mr. Turner holds a bachelor s degree in Electrical Engineering from the Georgia Institute of Technology. He has been an IEEE member since Russ Housley Mr. Housley is owner and founder of Vigil Security, LLC ( a very small firm that provides computer and networking security consulting. He has contributed to the development of many standards, including PKIX Part 1, Privacy-Enhanced Mail and S/MIME. He began participating in the development of Internet security specifications in 1988 as a member of the Privacy and Security Research Group. He was the chair of the IETF S/MIME WG when it was formed, passing the reigns to Sean v

8 vi About the Authors Turner and Blake Ramsdell when he accepted the position as IETF Security Area Director. Mr. Housley is now serving as the chair of the IETF. He is the author of more than 30 RFCs. Mr. Housley holds a bachelor s degree in Computer Science from Virginia Tech and a master s degree in Computer Science from George Mason University. He has been a member of ACM and IEEE since 1987.

9 Credits Executive Editor Carol Long Development Editor Julie M. Smith Production Editor Angela Smith Copy Editor Foxxe Editorial Services Editorial Manager Mary Beth Wakefield Production Manager Tim Tate Vice President and Executive Group Publisher Richard Swadley Vice President and Executive Publisher Joseph B. Wikert Project Coordinator, Cover Lynsey Stanford Proofreader Sossity Smith Indexer Johnna VanHoose Dinse vii

10

11 Contents Acknowledgments xv Part I and Security Background Chapter 1 Introduction 3 How This Book Is Organized 3 Part I: and Security Background 4 Part II: PKI Basics 4 Part III: Secure 4 Part IV: Tokens 4 Part V: Case Studies 5 Part VI: Expectations for the Future 5 Appendices 5 WhoShouldReadThisBook 5 Chapter 2 Understanding 7 History and Evolution 8 Internet 11 Wow! Is Just Like Snail Mail 11 Process 11 Formats 12 Commands 16 Mail Transfer System Architecture 19 ing 21 Client 21 Webmail 22 Chapter 3 Security Fundamentals 23 Who Wants to Read Your ? 24 Governments 24 Businesses 26 ix

12 x Contents Criminals 27 Hackers 27 Reporters and Bloggers 28 Friends and Family Members 28 Where They Can Read Your 28 How They Can Read Your 29 Eavesdrop 29 Masquerade 29 What Else Can They Do to the MTS? 30 How You Can Stop Them 30 Security Services 31 Fundamental Services 31 Derivative Services 32 Cryptographic Mechanisms 33 Encryption 33 Digital Signatures 33 One-Way Hash Functions 34 Basic Security Tools 34 Access Control Lists 34 Fake Traffic 34 Logs 34 Nonces 35 Signed Receipts 35 Sequence Numbering 35 Time 35 More Attacks 35 Chapter 4 Cryptography Primer 37 Symmetric Cryptography 38 Types 38 Algorithms 39 Modes 39 Symmetric Key Management 40 Symmetric Integrity Functions 42 Asymmetric Cryptography 45 Public Key Encryption 45 Digital Signatures 47 Asymmetric Key Management 51 Part II PKI Basics Chapter 5 Understanding Public Key Infrastructure 55 Trust 56 PKI Architectures 57 Single CA 57 Trust Lists 58 Hierarchical PKI 59

13 Contents xi Mesh PKI 61 Cross-Certified PKIs 62 Bridge CAs 64 X.509 Public Key Certificates 66 Tamper-Evident Envelope 66 Basic Certificate Contents 67 Certificate Extensions 68 Subject Type Extensions 69 Name Extensions 69 Key Attributes 70 Policy 71 Additional Information 72 X.509 Certificate Revocation Lists 73 Signed Certificate List 73 CRL Extensions 75 CRL Entry Extensions 77 PKI Components and Users 78 Infrastructure Users 78 Subscribers 79 Replying Parties 79 Infrastructure Components 79 Certification Authorities 80 Registration Authority 83 Repository 84 Archive 84 Part III Secure Chapter 6 Protecting Message Contents 87 Evolution 87 Privacy Enhanced Mail 88 Pretty Good Privacy 89 MIME Object Security Services 90 Message Security Protocol 91 Public-Key Cryptography Standard #7 91 Secure Multipurpose Internet Mail Extensions 91 Protecting Content 92 Concepts 93 CMS Content Types 93 Encapsulating 93 Version Numbers 95 Attributes 95 MIME Layer 95 Protecting CMS Content Types 96 Signed Data 96 Enveloped Data 98 Encrypted Data 102

14 xii Contents Digest Data 102 Authenticated Data 103 Authenticated-Enveloped Data 104 Non-Protecting Content Types 104 Data 105 Compressed Data 105 Receipt Syntax 105 Content Collection 106 Content with Attributes 107 Attributes 107 Content Type 108 Message Digest 109 Signing Time 110 Counter Signatures 110 S/MIME Capabilities 111 Encryption Key Preference 111 Signed Receipts 112 Content Hints 115 Content Reference 116 Signing Certificates 116 Security Labels 117 Equivalent Labels 118 Secure Mail Lists 118 Algorithms 120 Generating an S/MIME Message 122 Chapter 7 Protecting Passwords, Headers, and Commands 125 Password Scramble 126 Connection Security 127 Transport Layer Security 128 Handshake Protocol 129 Record Protocol 132 IPsec 133 Security Associations 134 Authentication Header 136 Encapsulating Security Payload 137 Internet Key Exchange (IKE) 139 Part IV Tokens Chapter 8 Tokens and Hardware Security Modules 143 Evaluation Criteria 144 Tokens 148 PC Cards 149 Smart Cards 151 Looking under the Hood 153 Operating Systems and Smart Cards 154

15 Contents xiii Choosing Smart Cards 154 USB Tokens 155 Software Tokens 156 ibutton Tokens 156 Embedded Tokens 157 Hardware Security Modules 158 Network-Attached Multi-User Hardware Security Modules 159 Application Program Interfaces 160 Part V Case Studies Chapter 9 Signatures and Authentication for Everyone 165 SAFE Architecture 166 Cryptographic Algorithms 166 PKI Architecture 167 Certificate Policies 169 Certificate, CRL, and OCSP Profiles 169 Tokens and Cryptographic Modules 173 Applications 174 Successes and Shortcomings 175 Lessons Learned 176 Chapter 10 Chapter 11 Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card 181 Architectures 182 Cryptographic Algorithms 182 PKI Architecture 183 DEERS/RAPIDS Architecture 184 Certificate Policies 186 Certificate and CRL Profiles 188 Certificate Status Responders 190 Repositories 191 CAC and Cryptographic Modules 193 Applications 194 Success and Shortcomings 196 Lessons Learned 197 National Institute of Standards and Technology Personal Identity Verification 201 PIV Architecture 203 Cryptographic Algorithms 203 Architecture 205 Certificate Policies 206 Certificate, CRL, and OCSP Profiles 209 Cards and Cryptographic Modules 215 Applications 218 Lessons Learned 220

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter

More information

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with

More information

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Securing SCADA Systems. Ronald L. Krutz

Securing SCADA Systems. Ronald L. Krutz Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,

More information

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition. DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and

More information

Linux Command Line and Shell Scripting Bible. Third Edtion

Linux Command Line and Shell Scripting Bible. Third Edtion Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third

More information

MCITP Windows Server 2008 Server Administrator Study Guide

MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson

More information

Study Guide. Robert Schmidt Dane Charlton

Study Guide. Robert Schmidt Dane Charlton Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine

More information

XSLT 2.0 and XPath 2.0

XSLT 2.0 and XPath 2.0 Wrox Programmer to Programmer TM Michael Kay Michael Kay has been working in the XML field since 1997. He became a member of the XSL Working Group soon after the publication of XSLT 1.0 and took over as

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.

More information

Ruby on Rails. Bible

Ruby on Rails. Bible Ruby on Rails Bible Ruby on Rails Bible Timothy Fisher Ruby on Rails Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing,

More information

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn: Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features

More information

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by

More information

iwork DUMmIES 2ND EDITION FOR

iwork DUMmIES 2ND EDITION FOR iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright

More information

Blade Servers and Virtualization. Barb Goldworm Anne Skamarock. Transforming Enterprise Computing While Cutting Costs. Wiley Publishing, Inc.

Blade Servers and Virtualization. Barb Goldworm Anne Skamarock. Transforming Enterprise Computing While Cutting Costs. Wiley Publishing, Inc. Blade Servers and Virtualization Transforming Enterprise Computing While Cutting Costs Barb Goldworm Anne Skamarock Wiley Publishing, Inc. Blade Servers and Virtualization Blade Servers and Virtualization

More information

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page Making Everything Easier! 9th Edition Creating Web Pages Learn to: Design, build, and post a Web page Build pages using HTML, Web design software, and online tools Optimize photos, video, and audio for

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development Companion Web Site Example FileMaker Pro 10 application Demos, tips, and additional resources Ray Cologon FileMaker Pro 10 Go from basics to full-scale development Write your own FileMaker applications

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment Nicholas A. Solter, Gerald Jelinek, and David Miner OpenSolaris Explore the OpenSolaris operating environment Master networking and systems administration Deploy web services using open source applications

More information

MacBook Air PORTABLE GENIUS

MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS by Paul McFedries MacBook Air Portable Genius Published by Wiley Publishing, Inc. 10475 Crosspoint Blvd. Indianapolis,

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

Microsoft SQL Server 2008 Integration Services

Microsoft SQL Server 2008 Integration Services Microsoft SQL Server 2008 Integration Services Problem Design Solution Erik Veerman Jessica M. Moss Brian Knight Jay Hackney Wiley Publishing, Inc. Microsoft SQL Server 2008 Integration Services Problem

More information

Flash Lite. Mobile Development. Professional. Build Flash Applications for Mobile Devices. Jermaine G. Anderson. Join the p2p.wrox.

Flash Lite. Mobile Development. Professional. Build Flash Applications for Mobile Devices. Jermaine G. Anderson. Join the p2p.wrox. Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Professional Flash Lite Mobile Development Build Flash Applications for Mobile Devices Jermaine G. Anderson Programmer to Programmer Get

More information

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson Windows 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson Acquisitions Editor: Jeff Kellum Development Editor: Gary Schwartz Technical Editors: Troy

More information

Hacking Gmail. Ben Hammersley

Hacking Gmail. Ben Hammersley Hacking Gmail Ben Hammersley Hacking Gmail Hacking Gmail Ben Hammersley Hacking Gmail Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2006

More information

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO

More information

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam Covers All Objectives for Exam 70-680 Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring: Custom Test Engine Hundreds of Sample Questions Electronic Flashcards

More information

CCNA. Security STUDY GUIDE. Tim Boyles. Covers All Exam Objectives for IINS

CCNA. Security STUDY GUIDE. Tim Boyles. Covers All Exam Objectives for IINS Covers All Exam Objectives for IINS 640-553 Includes Real-World Scenarios, Hands-On and Written Labs, and Leading-Edge Exam Prep Software Featuring: Custom Test Engine Hundreds of Sample Questions Electronic

More information

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice Making Everything Easier! Google Voice Learn to: Set up and use Google Voice Integrate Google Voice with other Google services such as Gmail and Google Chat Combine Google Voice with your existing phone

More information

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4

Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 July 2008 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Professional Windows PowerShell Programming

Professional Windows PowerShell Programming Professional Windows PowerShell Programming Snap-ins, Cmdlets, Hosts, and Providers Arul Kumaravel Jon White Michael Naixin Li Scott Happell Guohui Xie Krishna C. Vutukuri Wiley Publishing, Inc. Professional

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

Implementing 802.1X Security Solutions for Wired and Wireless Networks. Jim Geier

Implementing 802.1X Security Solutions for Wired and Wireless Networks. Jim Geier Implementing 802.1X Security Solutions for Wired and Wireless Networks Jim Geier Implementing 802.1X Security Solutions for Wired and Wireless Networks Implementing 802.1X Security Solutions for Wired

More information

WINDOWS 10. by Paul McFedries

WINDOWS 10. by Paul McFedries WINDOWS 10 by Paul McFedries WINDOWS 10 SIMPLIFIED Published by John Wiley & Sons, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Published simultaneously in Canada Copyright 2015

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

SQL Server Administration. Beginning Microsoft. Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger

SQL Server Administration. Beginning Microsoft. Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger Beginning Microsoft SQL Server 2008 Administration Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger Updates, source code, and Wrox technical support at www.wrox.com Programmer to Programmer

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Professional ASP.NET 4. in C# and VB. Bill Evjen, Scott Hanselman, Devin Rader

Join the p2p.wrox.com. Wrox Programmer to Programmer. Professional ASP.NET 4. in C# and VB. Bill Evjen, Scott Hanselman, Devin Rader Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Professional ASP.NET 4 in C# and VB Bill Evjen, Scott Hanselman, Devin Rader Programmer to Programmer Get more out of wrox.com Interact

More information

Beginning Visual Basic 2015

Beginning Visual Basic 2015 Beginning Visual Basic 2015 Introduction................................................... xxvii Chapter 1 Welcome to Visual Basic 2015................................ 1 Chapter 2 The Microsoft.NET Framework..............................

More information

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,

More information

Microsoft Office Simply the Easiest Way to Learn. Kate Shoup

Microsoft Office Simply the Easiest Way to Learn. Kate Shoup Microsoft Office 200 Simply the Easiest Way to Learn Kate Shoup OFFICE 200 by Kate Shoup OFFICE 200 SIMPLIFIED Published by Wiley Publishing, Inc. 0475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

Richard Wentk. Cocoa. Developer Reference.

Richard Wentk. Cocoa. Developer Reference. Richard Wentk Cocoa Developer Reference www.wileydevreference.com Cocoa Richard Wentk Cocoa Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright

More information

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server

More information

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

Making Everything Easier! Windows 7. Pick the task, Find it fast, Get it DONE! Nancy Muir

Making Everything Easier! Windows 7. Pick the task, Find it fast, Get it DONE! Nancy Muir Making Everything Easier! Windows 7 Pick the task, Find it fast, Get it DONE! Nancy Muir Hundreds of tasks including: What Do You Want to Do? Try This Task Find It Here Work in Windows 7 Work with the

More information

ASP.NET 3.5 SP1. In C# and VB. Professional. Covers. Service Pack 1. Bill Evjen, Scott Hanselman, Devin Rader

ASP.NET 3.5 SP1. In C# and VB. Professional. Covers. Service Pack 1. Bill Evjen, Scott Hanselman, Devin Rader Wrox Programmer to Programmer TM Professional ASP.NET 3.5 SP1 In C# and VB Covers Service Pack 1 Bill Evjen, Scott Hanselman, Devin Rader CD-ROM includes the full book in PDF format Programmer to Programmer

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Windows 10 Anniversary Update. Paul McFedries

Windows 10 Anniversary Update. Paul McFedries Windows 10 Anniversary Update Paul McFedries Teach Yourself VISUALLY Windows 10 Anniversary Update Published by John Wiley & Sons, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Published

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Office 2010 For Seniors

Office 2010 For Seniors Making Everything Easier! Microsoft Office 2010 For Seniors Learn to: Use Word, Excel, Outlook, and PowerPoint Dress up your letters, invitations, and other documents Manage your finances with Excel Use

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Professional Java Native Interfaces with SWT/JFace. Jackwind Li Guojie

Professional Java Native Interfaces with SWT/JFace. Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Copyright

More information

PROFESSIONAL SCALA. INTRODUCTION... xv

PROFESSIONAL SCALA. INTRODUCTION... xv PROFESSIONAL SCALA INTRODUCTION.................................................... xv CHAPTER 1 Language Features....................................... 1 CHAPTER 2 Functional Programming.................................

More information

Dreamweaver CS4. A Complete Training Package! Adobe. Full-color, step-by-step instructional book Video training from Adobe Certified Experts

Dreamweaver CS4. A Complete Training Package! Adobe. Full-color, step-by-step instructional book Video training from Adobe Certified Experts Adobe Dreamweaver CS4 A Complete Training Package! Full-color, step-by-step instructional book Video training from Adobe Certified Experts Tutorials and lesson files on companion DVD Jeremy Osborn & Aquent

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

CASP CompTIA. Advanced Security Practitioner. Study Guide

CASP CompTIA. Advanced Security Practitioner. Study Guide CASP CompTIA Advanced Security Practitioner Study Guide CASP CompTIA Advanced Security Practitioner Study Guide Michael Gregg Billy Haines Senior Acquisitions Editor: Jeff Kellum Development Editor: Dick

More information

Internet Engineering Task Force (IETF) Request for Comments: 5756

Internet Engineering Task Force (IETF) Request for Comments: 5756 Internet Engineering Task Force (IETF) Request for Comments: 5756 Updates: 4055 Category: Standards Track ISSN: 2070-1721 S. Turner IECA D. Brown Certicom K. Yiu Microsoft R. Housley Vigil Security T.

More information

Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track. December 2010

Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track. December 2010 Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track ISSN: 2070-1721 S. Turner IECA R. Housley Vigil Security December 2010 Cryptographic Message Syntax (CMS) Encrypted

More information

Customizing and Upgrading Linux Second Edition Linda McKinnon Al McKinnon Gearhead Press Wiley Computer Publishing John Wiley & Sons, Inc. Customizing and Upgrading Linux Customizing and Upgrading Linux

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

CISSP. DUMmIES 4TH EDITION FOR

CISSP. DUMmIES 4TH EDITION FOR CISSP FOR DUMmIES 4TH EDITION CISSP FOR DUMmIES 4TH EDITION by Lawrence Miller and Peter H. Gregory CISSP For Dummies, 4th Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774

More information

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R. OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing

More information

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package

More information

Beginning Visual Basic 2005 Databases. Thearon Willis

Beginning Visual Basic 2005 Databases. Thearon Willis Beginning Visual Basic 2005 Databases Thearon Willis Beginning Visual Basic 2005 Databases Beginning Visual Basic 2005 Databases Thearon Willis Beginning Visual Basic 2005 Databases Published by Wiley

More information

Microsoft. Excel. Paul McFedries

Microsoft. Excel. Paul McFedries Microsoft Excel 2010 Paul McFedries Excel 2010 by Paul McFedries Excel 2010 Visual Quick Tips Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Published

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Secure Messaging Buyer s Guide

Secure Messaging Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

Internet Engineering Task Force (IETF) Category: Informational. July Reclassification of Suite B Documents to Historic Status

Internet Engineering Task Force (IETF) Category: Informational. July Reclassification of Suite B Documents to Historic Status Internet Engineering Task Force (IETF) Request for Comments: 8423 Category: Informational ISSN: 2070-1721 R. Housley Vigil Security L. Zieglar National Security Agency July 2018 Reclassification of Suite

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Essential Angular for ASP.NET Core MVC

Essential Angular for ASP.NET Core MVC Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University

More information

Internet Engineering Task Force (IETF) Request for Comments: 5959 Category: Standards Track August 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5959 Category: Standards Track August 2010 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 5959 IECA Category: Standards Track August 2010 ISSN: 2070-1721 Abstract Algorithms for Asymmetric Key Package Content Type This document

More information

Internet Engineering Task Force (IETF) Request for Comments: 7193 Category: Informational. J. Schaad Soaring Hawk Consulting April 2014

Internet Engineering Task Force (IETF) Request for Comments: 7193 Category: Informational. J. Schaad Soaring Hawk Consulting April 2014 Internet Engineering Task Force (IETF) Request for Comments: 7193 Category: Informational ISSN: 2070-1721 S. Turner IECA R. Housley Vigil Security J. Schaad Soaring Hawk Consulting April 2014 The application/cms

More information

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Asseco Data Systems S.A. Podolska Street 21 81-321 Gdynia, Poland Certum - Powszechne

More information

ASP.NET MVC 1.0. Website Programming. Nick Berardi, Al Katawazi, Marco Bellinaso. Wrox Programmer to Programmer TM

ASP.NET MVC 1.0. Website Programming. Nick Berardi, Al Katawazi, Marco Bellinaso. Wrox Programmer to Programmer TM Wrox Programmer to Programmer TM ASP.NET MVC 1.0 Website Programming Nick Berardi, Al Katawazi, Marco Bellinaso Updates, source code, and Wrox technical support at www.wrox.com Programmer to Programmer

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Excel 2016 Formulas. Michael Alexander Dick Kusleika

Excel 2016 Formulas. Michael Alexander Dick Kusleika Excel 2016 Formulas Excel 2016 Formulas Michael Alexander Dick Kusleika Excel 2016 Formulas Published by John Wiley & Sons, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright

More information

Wrox Programmer to Programmer TM. Professional. Design Patterns. Aaron Saray PHP. Updates, source code, and Wrox technical support at

Wrox Programmer to Programmer TM. Professional. Design Patterns. Aaron Saray PHP. Updates, source code, and Wrox technical support at Wrox Programmer to Programmer TM Professional PHP Design Patterns Aaron Saray Updates, source code, and Wrox technical support at www.wrox.com Professional PHP Design Patterns Introduction... xxi Part

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

Microsoft Virtualization SECRETS

Microsoft Virtualization SECRETS Microsoft Virtualization SECRETS Microsoft Virtualization SECRETS DO WHAT YOU NEVER THOUGHT POSSIBLE WITH MICROSOFT VIRTUALIZATION John Savill Executive Editor: Carol Long Project Editor: Katherine Burt

More information