Home > Articles > Certification > Other IT

Other IT

85 Items

Sort by Date | Title

Novell GroupWise 6.5 Messaging Fundamentals
Nov 21, 2003
GroupWise 6.5 is more than just an email program; it is an Internet-enabled personal time manager, a group scheduler, a document-management system, a collaboration program, and an email program all rolled into one. This chapter teaches you the fundamentals of GroupWise 6.5 messaging.
Novell NetWare 6.5 Management Tools
Jan 9, 2004
This chapter explains the various tools at your disposal for managing Novell NetWare 6.5, including ConsoleOne, NetWare Web Manager, and NetWare Remote Manager.
Now What? – The First Steps into IT
Sep 7, 2001
The key to breaking into any profession is being able to ask the right questions. Asking "Now what?" can help you break into the booming IT market. This article shows you the way.
Now What? — A Case for Certification
Nov 20, 2001
Now what? Which is the correct path: certification or a university degree? This is a question all IT professionals struggle with. This article gives you a recommendation from an IT trainer/professional.
Now What? — A Certification Resource List for Self-Study Career Changers
Sep 6, 2002
Now what? I want to change careers and enter IT, but I don't have the funds to enroll in instructor-led courses. Is it possible to get certified through self-study? If so, which certifications should I pursue, and what are the resources I should use? Warren Wyrostek addresses these questions, and lists relevant resources that he recommends for self-study.
Now What? — A Career Changer's Odyssey
Jun 29, 2001
Many of us who are in IT and have been somewhat successful never started out with thoughts of being involved in technology. We have had to ask, "Now what?" This is one IT professional's answer to this universal question.
Now What? — The Novell Certifications
Aug 6, 2001
Many of us who are in IT and have been somewhat successful never started out with thoughts of being involved in technology. We have had to ask, "Now what?" This is one IT professional's answer to this universal question.
Objectives and Deliverables for the Java 2 Developer Exam
Oct 10, 2003
This sample chapter reviews the objectives and deliverables for the Sun Certified Java Developer (SCJD) certification.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
Oracle versus SQL Server in the Enterprise
Mar 25, 2005
Can Oracle kick SQL Server's behind? Oracle expert David Hull throws down the gauntlet to Microsoft devotees.
Packaging, Testing, and Submitting the Assignment Application for the Java 2 Developer Exam
Oct 17, 2003
This chapter discusses how you should package and carefully test your certification project.
Physical Security in the CISSP Exam
Dec 10, 2004
This chapter provides sample questions from the CISSP exam with a focus on physical security, including extensive explanations for the correct answers.
Preparing for a FISMA Security Audit
Nov 16, 2007
How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
Protecting Your Network from Security Risks and Threats
Nov 18, 2005
The second your network connects to the greater world of the internet, you expose yourself to attack. For a large corporation, malware can cause plenty of problems, but for a small business, attacks can spell total disaster. This chapter explains the types of attacks and how to protect your network with a focus on security for small businesses.
SCEA for Java EE Exam Prep: Web Tier Technologies
Mar 29, 2010
In preparation for the SCEA for Java EE exam, this chapter covers the area of presentation in the JEE platform and focuses on presentation technologies designed to render in a standards-compliant HTML browser.
Securing the Cisco Security Monitoring, Analysis, and Response System
Jul 3, 2008
This chapter describes recommendations for securing MARS appliances, both physically and electronically.
Securing Wireless Networks
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.
Security Certification Overview
Aug 13, 2001
A bewildering variety of security certifications exists in today's marketplace. Ed Tittel sorts through the vendor-neutral security certs in this article and focuses on the three most worth pursuing: the CISSP, the SANS GIAC, and the CPP.
Security Features on Switches
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
Security Program and Policies: Governance and Risk Management
Apr 16, 2014
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.

<< < Prev Page 1 2 3 4 5 Next >