Call Number (LC) | Title | Results |
---|---|---|
TK5105.597 |
Getting Started with XenDesktop 7.x : Deliver Desktops and Applications to Your End Users, Anywhere, Anytime, with XenDesktop 7.x / Highly efficient data access with RoCE on IBM Elastic Storage Systems and IBM Spectrum Scale / Microsoft DirectAccess Best Practices and Troubleshooting : secure and efficient functioning of your DirectAccess environment / Citrix XenServer 6.0 Administration Essential Guide. Securing the perimeter : deploying identity and access management with free open source software / Windows to go : a guide for users and IT professionals / Asynchronous control for networked systems / Pro Oracle Identity and access management suite / Citrix XenApp 6.5 expert cookbook : over 125 recipes that enable you to configure, administer, and troubleshoot a XenApp infrastructure for effective application virtualization / MAC protocol design in full-duplex enabled wireless networks / Getting started with OpenBTS : build open source mobile networks / |
17 |
TK5105.597 .B85 2000eb |
Building Cisco remote access networks. Building Cisco remote access networks |
2 |
TK5105.597 .C37 2009eb | Citrix XenApp platinum edition for Windows : the official guide / | 1 |
TK5105.597 .C65 2003 | Complete book of remote access : connectivity and security / | 1 |
TK5105.597 .C65 2003eb |
Complete book of remote access connectivity and security / Complete book of remote access : connectivity and security / |
2 |
TK5105.597 .E57 2014 | RESTful Java web services security : secure your RESTful applications against common vulnerabilities / | 1 |
TK5105.597 .F57 2012 | Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / | 1 |
TK5105.597 .H64 2008 | Implementing NAP and NAC security technologies : the complete guide to network access control / | 1 |
TK5105.597 .H64 2008eb | Implementing NAP and NAC security technologies : the complete guide to network access control / | 2 |
TK5105.597 .I47 2003eb | Implementing IBM Tivoli Remote Control across firewalls / | 1 |
TK5105.597 .I675 2014 | Implementing Citrix XenDesktop on IBM Flex System / | 1 |
TK5105.597 J356 2010 |
Citrix XenDesktop implementation : a practical guide for IT professionals / Citrix XenDesktop implementation a practical guide for IT professionals / |
3 |
TK5105.597 .K623 2004 | Creating web-based laboratories / | 1 |
TK5105.597 K623 2004 | Creating web-based laboratories | 1 |
TK5105.597 .M87 2012 | Getting started with Citrix XenApp 6.5 / | 1 |
TK5105.597 .N43 2003 | Troubleshooting remote access networks / | 1 |
TK5105.597 .O75 2012 |
Client-side attacks and defense Client-side attacks and defense / |
2 |
TK5105.597 .P47 2017 | Performance and scalability : remote access. | 1 |
TK5105.597 .P76 2005eb | Pro .NET 1.1 remoting, reflection, and threading | 1 |
TK5105.597 .R36 2002b | Advanced .NET remoting | 1 |