Home > Articles > Information Technology

Information Technology

921 Items

Sort by Date | Title

DB2 Universal Data Base V8.1 Certification: Backup and Recovery
Apr 23, 2004
Defending Your Log Files
Sep 28, 2001
To mount an effective security defense, preventing attackers from altering logs is critical. Ed Skoudis shows you some tactics to employ here.
Defining ITIL Change and Release Management Processes
Mar 2, 2009
Learn how to customize your own change and release management processes.
Delivering Software Systems
Jan 8, 2001
Alan Gauld, author of Learn to Program Using Python (Addison-Wesley, 2001), discusses the tasks required for a successful delivery of a software application from development and system test to the end users in a corporate environment.
Deploying Cisco CallManager and Unity Devices
Oct 14, 2005
This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
Deploying iPhones and iPads on Your Network
Jan 19, 2011
Eric Geier shows how to give Apple iOS devices access to an 802.1X-protected Wi-Fi network, Microsoft Exchange services, VPN access, and more.
Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
Aug 5, 2005
This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
Deploying Windows 2000 Professional
Dec 13, 2000
Windows 2000 Professional is becoming the operating system of choice in the client environment of many organizations. But how should you go about deploying Windows 2000 Professional en masse in your organization? In this article, Windows 2000 expert ...
Deploying Your Hardware and Software Systems
Jan 24, 2003
This sample chapter discusses the details of the deployment process, from ordering hardware and software to installing it, and all the caveats and pitfalls that accompany deployments.
Design Challenges, Middleware Solutions, and ACE
Feb 22, 2002
In this sample chapter from C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns, Stephen Huston and Douglas Schmidt describe the paradigm shift that occurs when transitioning from stand-alone application architectures to networked application architectures.
Designing a Reliable Network Server
Sep 7, 2001
The reliability of network servers has always been important, but it is even more so in the present business environment. This article covers the most important aspects of a reliable network server.
Designing Development Support Infrastructures (Part 1 of 5): Meeting Mission-Critical Development Needs
May 31, 2002
IT must support the developer's need to install and configure software while simultaneously maintaining system stability. Seriously, it's possible!
Designing Development Support Infrastructures (Part 3 of 5): Using Active Directory to Support Internal Development
Jun 14, 2002
This article identifies how to design virtual security environments with Active Directory.
Designing Digital Communication Systems
Mar 8, 2002
This article examines bandwidth-limited, power-limited, bandwidth- and power-limited, and spread spectrum digital communication systems.
Designing Strategies for Security Management
Jul 23, 2004
With an eye towards passing the MSCE 70-298 Exam, Bill Ferguson and Ed Tittel explain the ins and outs of managing network security, and the tools that you can use to maintain security on a Windows Server 2003 Network. Included are several sample questions with detailed answers to help you prepare for the exam.
Desired State Configuration Basics in Windows PowerShell
Jun 9, 2015
This chapter from Windows PowerShell in 24 Hours, Sams Teach Yourself, explains the historical background of DSC, basic tenets of DSC, the DSC authoring environment, configuring the DSC environment, writing your first configuration script, and DSC push configuration.
Desktop Architecture Selection Guide
Dec 31, 2003
This article examines some of the main business drivers behind the current trend towards adoption of thin client desktop solutions.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Detecting Signs of Intrusion
Dec 28, 2001
This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
Developing a Scalable e-Business Strategy with Application Service Providers
Nov 2, 2001
The adoption of the ASP model is driven by the need for businesses to work more efficiently together, driving costs down and the level of collaboration up. This chapter profiles those driving needs in detail.

<< < Prev Page 7 8 9 10 11 Next >