- An Overview of Novell 6 Installation
- Jun 20, 2003
- Get all of the information you need to upgrade from Novell Netware 5.x to 6. You will be taken step-by-step through the installation process, and you will learn the difference between installing, migrating, and upgrading to help you decide which works best for you.
|
- Becoming a Java Programmer
- Dec 6, 2002
- This lesson provides an introduction to the Java language and computer programming itself, especially for people who are using it to learn software development for the first time.
|
- Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
- Jul 1, 2005
- This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
|
- CISA Exam Cram: Technical Infrastructure and Operational Practices and Infrastructure
- May 12, 2005
- As an IS auditor, you will need to understand the technical infrastructure of the organization, the IS organizational structure, and the operational practices including working with networking devices, servers and operating systems, data storage systems, applications, and the standards and protocols associated with network communication. This chapter will help you prepare for the CISA exam with detailed examples and sample questions.
|
- Cisco Asks, Can Security Skills Be Certified?
- Jul 23, 2004
- Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
|
- CISSP Exam Cram: Business Continuity and Disaster Recovery Planning
- Jun 8, 2009
- This chapter covers the steps that make up the business continuity plan process to pass the business continuity and disaster recovery domain portion of the CISSP exam.
|
- CISSP Exam Cram: Security Architecture and Models
- Feb 4, 2013
- This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
|
- CISSP Practice Questions: Application Security
- Jun 8, 2009
- This chapter provides sample questions (with answers and explanations) to help you prepare for the CISSP exam.
|
- CISSP Security Management and Practices
- Dec 20, 2002
- This sample chapter covers Domain 3, Security Management Practices, 1 of 10 domains of the Common Body of Knowledge (CBK) covered in the Certified Information Systems Security Professional Examination.
|
- CISSP Security-Management Practices
- Oct 28, 2005
- This chapter provides an overview of security management with an eye towards passing the CISSP exam, including sample questions with detailed answers to help you prepare.
|
- CNA Study Guide: Novell eDirectory
- Mar 5, 2004
|
- CompTIA Security+ Exam: Devices, Media, and Topology Security
- Apr 25, 2003
- Review basic security concepts and controls that can be used by administrators to secure physical devices and media and fulfill the CompTIA-specified objectives for the Communications Security section of the Security+ exam.
|
- CompTIA Security+ Infrastructure Basics
- Jun 8, 2009
- This chapter discusses the concepts of identifying and mitigating network infrastructure threats and alerts you to the most common attacks.
|
- Configuring DNS on SLES 9
- Sep 23, 2005
- This chapter will help you prepare for Novell's Certified Linux Engineer 9 exam with a focus on creating a domain name service using BIND. Sample lab exercises will help you practice for the exam.
|
- Configuring RIP and RDISC
- Nov 2, 2001
- Practice one of the Solaris 8 Certification exam objectives with expert Rafeeq Rehman's lesson on how configure RIP and RDISC.
|
- Controlling Access and Configuring System Messaging in Solaris 10
- May 22, 2009
- This chapter covers two main topics: Role-Based Access Control (RBAC) and system messaging (syslog) as they relate to the CX-310-202 exam.
|
- Creating Oracle Databases
- Dec 3, 2004
- This chapter from the Oracle 9i Fundamentals I Exam Cram book covers the creation of a database, with sample questions to help you prepare.
|
- Filtering (WHERE) and Sorting Data (ORDER BY) in Oracle 9i
- Nov 5, 2004
- This chapter covers filtering of rows using the WHERE clause and sorting of retrieved data using the ORDER BY clause. The WHERE clause applies to both queries and most DML commands; the ORDER BY clause applies to queries only.
|
- FISMA: Compliance vs. Security
- Apr 14, 2008
- Randy Nash asks this question: Does FISMA make our agencies any more secure?
|
- Hands-on Guide to the Red Hat Exams: System Logging, Monitoring, and Automation
- Apr 28, 2011
- This chapter covers working with Syslog, monitoring system performance, and automation with cron and at.
|