http://cdn.oreillystatic.com/images/people/weblogs/richard_bejtlich-50.jpgRichard Bejtlich
By Richard Bejtlich | February 19, 2014
Richard will show how Network Security Monitoring can help you implement a security strategy that wins against a variety of intruders, based on fast, comprehensive, and accurate incident detection, response, and containment.
http://cdn.oreillystatic.com/images/people/weblogs/patrick_leblanc-50.jpgPatrick LeBlanc
By Patrick LeBlanc | April 12, 2013
In this hands-on webcast presented by Patrick Leblanc author of Microsoft SQL Server 2012 Step by Step we will take a look at some of the new features of SQL Server 2012.
http://cdn.oreillystatic.com/images/people/weblogs/ed_wilson-50.jpgEd Wilson
By Ed Wilson | April 11, 2013
Join us for a hands-on webcast presented by Ed Wilson author of Windows PowerShell 3.0 Step by Step to jump start the process of learning about Windows PowerShell 3.0.
http://cdn.oreillystatic.com/images/people/weblogs/mike_halsey3-50.jpgMike Halsey
By Mike Halsey | February 07, 2013
In this webcast, Mike Halsey MVP, the author of Windows 8: Out of the Box and Troubleshoot and Optimize Windows 8 Inside Out will show you how to configure and optimize Windows 8 so you can get the very best from it.
http://cdn.oreillystatic.com/images/people/weblogs/matthew_gast.jpgMatthew Gast
By Matthew Gast | August 08, 2012
Join Matthew Gast to learn why 802.11n is so fast, how to build a network based on it, and take a peek ahead at the coming gigabit standards.
http://cdn.oreillystatic.com/images/people/weblogs/joseph_davies-50.jpgJoseph Davies
By Joseph Davies | June 06, 2012
In this webcast, Internet Protocol version 6 (IPv6) expert Joe Davies describes and demonstrates the various way that you can configure IPv6 addresses and configuration settings with a focus on the relevant and useful combinations.
http://cdn.oreillystatic.com/images/people/weblogs/diego_zamboni.jpgDiego Zamboni
By Diego Zamboni | June 05, 2012
In this webcast presentation Diego Zamboni , author of Learning CFEngine 3, will explore some of the basic concepts of CFEngine, and how it can help you in managing your IT infrastructure.
http://cdn.oreillystatic.com/images/people/weblogs/mike_halsey3-50.jpgMike Halsey
By Mike Halsey | February 02, 2012
In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out explains how you can use free virtualization tools in any edition of Windows 7 to keep valuable and useful older software working in a safe and secure way.
http://cdn.oreillystatic.com/images/people/weblogs/dan_kusnetzky_2.jpgDan Kusnetzky
By Dan Kusnetzky | December 13, 2011
This webcast presents the model of virtualization described in the book Virtualization: A Manager's Guide, the virtualization tools that make up desktop virtualization and examine why this combination of technologies hasn't replaced everyone's desktop...
http://cdn.oreillystatic.com/images/people/weblogs/dan_kusnetzky_2.jpgDan Kusnetzky
By Dan Kusnetzky | November 15, 2011
This webcast will review the model of virtualization described in Virtualization: A Manager's Guide and discuss different virtualization solutions for different IT problems.
http://cdn.oreillystatic.com/images/people/weblogs/bruce_hartpence.jpgBruce Hartpence
By Bruce Hartpence | October 14, 2011
In this webcast we'll talk about address space, the purpose of the network mask and the reasons we manipulate network masks.
http://cdn.oreillystatic.com/images/people/50/ciprian_rusen-50.jpgCiprian Adrian Rusen
By Ciprian Adrian Rusen | August 23, 2011
If you want to learn just how complex home networks are today and what are the main challenges of home networking, don't hesitate to join this webcast.
http://cdn.oreillystatic.com/images/people/weblogs/george_reese.jpgGeorge Reese
By George Reese | July 30, 2010
Dasein Cloud is an Open Source Java API that enables write-once, run against any cloud programming. With Dasein Cloud, you can run the same application across any number of supported clouds without any need for a recompile. This developer-oriented webinar...
http://cdn.oreillystatic.com/images/people/weblogs/bernard_golden.jpgBernard Golden
By Bernard Golden | May 19, 2010
This one-hour presentation will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications.
By Subra Kumaraswamy, Shahed Latif, Tim Mather | January 20, 2010
In this 90 minute webcast, the three coauthors of Cloud Security and Privacy (recently published by O'Reilly) will take a deep dive into cloud security issues and focus on three specific aspects: (1) data security; (2) identity management in the cloud...
By Subra Kumaraswamy, Shahed Latif, Tim Mather | January 20, 2010
This 75-minute webcast will discuss current issues in cloud computing with regard to security and privacy. The presenters are the three coauthors of a recently published O'Reilly book, Cloud Security and Privacy. In this webcast, they will discuss cloud...
http://cdn.oreillystatic.com/images/people/weblogs/jorge_noa.jpgJorge Noa
By Jorge Noa | October 13, 2009
This presentation analyzes aspects of the Amazon EC2 IaaS cloud environment that differ from a traditional data center and introduces general best practices for ensuring data privacy, storage persistence, and reliable DBMS backup.
By Subra Kumaraswamy, Shahed Latif, Tim Mather | September 24, 2009
In this webcast, the authors of Cloud Security and Privacy will discuss cloud computing's SPI delivery model.