- Novell GroupWise 6.5 Messaging Fundamentals
- Nov 21, 2003
- GroupWise 6.5 is more than just an email program; it is an Internet-enabled personal time manager, a group scheduler, a document-management system, a collaboration program, and an email program all rolled into one. This chapter teaches you the fundamentals of GroupWise 6.5 messaging.
|
- Novell NetWare 6.5 Management Tools
- Jan 9, 2004
- This chapter explains the various tools at your disposal for managing Novell NetWare 6.5, including ConsoleOne, NetWare Web Manager, and NetWare Remote Manager.
|
- Now What? – The First Steps into IT
- Sep 7, 2001
- The key to breaking into any profession is being able to ask the right questions. Asking "Now what?" can help you break into the booming IT market. This article shows you the way.
|
- Now What? A Case for Certification
- Nov 20, 2001
- Now what? Which is the correct path: certification or a university degree? This is a question all IT professionals struggle with. This article gives you a recommendation from an IT trainer/professional.
|
- Now What? A Certification Resource List for Self-Study Career Changers
- Sep 6, 2002
- Now what? I want to change careers and enter IT, but I don't have the funds to enroll in instructor-led courses. Is it possible to get certified through self-study? If so, which certifications should I pursue, and what are the resources I should use? Warren Wyrostek addresses these questions, and lists relevant resources that he recommends for self-study.
|
- Now What? A Career Changer's Odyssey
- Jun 29, 2001
- Many of us who are in IT and have been somewhat successful never started out with thoughts of being involved in technology. We have had to ask, "Now what?" This is one IT professional's answer to this universal question.
|
- Now What? The Novell Certifications
- Aug 6, 2001
- Many of us who are in IT and have been somewhat successful never started out with thoughts of being involved in technology. We have had to ask, "Now what?" This is one IT professional's answer to this universal question.
|
- Objectives and Deliverables for the Java 2 Developer Exam
- Oct 10, 2003
- This sample chapter reviews the objectives and deliverables for the Sun Certified Java Developer (SCJD) certification.
|
- Online Security: A Quest to Be One Step Ahead of the Bad Guys
- May 29, 2009
- Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
|
- Oracle versus SQL Server in the Enterprise
- Mar 25, 2005
- Can Oracle kick SQL Server's behind? Oracle expert David Hull throws down the gauntlet to Microsoft devotees.
|
- Packaging, Testing, and Submitting the Assignment Application for the Java 2 Developer Exam
- Oct 17, 2003
- This chapter discusses how you should package and carefully test your certification project.
|
- Physical Security in the CISSP Exam
- Dec 10, 2004
- This chapter provides sample questions from the CISSP exam with a focus on physical security, including extensive explanations for the correct answers.
|
- Preparing for a FISMA Security Audit
- Nov 16, 2007
- How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
|
- Protecting Your Network from Security Risks and Threats
- Nov 18, 2005
- The second your network connects to the greater world of the internet, you expose yourself to attack. For a large corporation, malware can cause plenty of problems, but for a small business, attacks can spell total disaster. This chapter explains the types of attacks and how to protect your network with a focus on security for small businesses.
|
- SCEA for Java EE Exam Prep: Web Tier Technologies
- Mar 29, 2010
- In preparation for the SCEA for Java EE exam, this chapter covers the area of presentation in the JEE platform and focuses on presentation technologies designed to render in a standards-compliant HTML browser.
|
- Securing the Cisco Security Monitoring, Analysis, and Response System
- Jul 3, 2008
- This chapter describes recommendations for securing MARS appliances, both physically and electronically.
|
- Securing Wireless Networks
- Jul 2, 2008
- This chapter discusses wireless security, including a checklist for securing Wi-Fi.
|
- Security Certification Overview
- Aug 13, 2001
- A bewildering variety of security certifications exists in today's marketplace. Ed Tittel sorts through the vendor-neutral security certs in this article and focuses on the three most worth pursuing: the CISSP, the SANS GIAC, and the CPP.
|
- Security Features on Switches
- Jul 4, 2008
- This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
|
- Security Program and Policies: Governance and Risk Management
- Apr 16, 2014
- This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
|