- DB2 Universal Data Base V8.1 Certification: Backup and Recovery
- Apr 23, 2004
|
- Defending Your Log Files
- Sep 28, 2001
- To mount an effective security defense, preventing attackers from altering logs is critical. Ed Skoudis shows you some tactics to employ here.
|
- Defining ITIL Change and Release Management Processes
- Mar 2, 2009
- Learn how to customize your own change and release management processes.
|
- Delivering Software Systems
- Jan 8, 2001
- Alan Gauld, author of Learn to Program Using Python (Addison-Wesley, 2001), discusses the tasks required for a successful delivery of a software application from development and system test to the end users in a corporate environment.
|
- Deploying Cisco CallManager and Unity Devices
- Oct 14, 2005
- This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
|
- Deploying iPhones and iPads on Your Network
- Jan 19, 2011
- Eric Geier shows how to give Apple iOS devices access to an 802.1X-protected Wi-Fi network, Microsoft Exchange services, VPN access, and more.
|
- Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
- Aug 5, 2005
- This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
|
- Deploying Windows 2000 Professional
- Dec 13, 2000
- Windows 2000 Professional is becoming the operating system of choice in the client environment of many organizations. But how should you go about deploying Windows 2000 Professional en masse in your organization? In this article, Windows 2000 expert ...
|
- Deploying Your Hardware and Software Systems
- Jan 24, 2003
- This sample chapter discusses the details of the deployment process, from ordering hardware and software to installing it, and all the caveats and pitfalls that accompany deployments.
|
- Design Challenges, Middleware Solutions, and ACE
- Feb 22, 2002
- In this sample chapter from C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns, Stephen Huston and Douglas Schmidt describe the paradigm shift that occurs when transitioning from stand-alone application architectures to networked application architectures.
|
- Designing a Reliable Network Server
- Sep 7, 2001
- The reliability of network servers has always been important, but it is even more so in the present business environment. This article covers the most important aspects of a reliable network server.
|
- Designing Development Support Infrastructures (Part 1 of 5): Meeting Mission-Critical Development Needs
- May 31, 2002
- IT must support the developer's need to install and configure software while simultaneously maintaining system stability. Seriously, it's possible!
|
- Designing Development Support Infrastructures (Part 3 of 5): Using Active Directory to Support Internal Development
- Jun 14, 2002
- This article identifies how to design virtual security environments with Active Directory.
|
- Designing Digital Communication Systems
- Mar 8, 2002
- This article examines bandwidth-limited, power-limited, bandwidth- and power-limited, and spread spectrum digital communication systems.
|
- Designing Strategies for Security Management
- Jul 23, 2004
- With an eye towards passing the MSCE 70-298 Exam, Bill Ferguson and Ed Tittel explain the ins and outs of managing network security, and the tools that you can use to maintain security on a Windows Server 2003 Network. Included are several sample questions with detailed answers to help you prepare for the exam.
|
- Desired State Configuration Basics in Windows PowerShell
- Jun 9, 2015
- This chapter from Windows PowerShell in 24 Hours, Sams Teach Yourself, explains the historical background of DSC, basic tenets of DSC, the DSC authoring environment, configuring the DSC environment, writing your first configuration script, and DSC push configuration.
|
- Desktop Architecture Selection Guide
- Dec 31, 2003
- This article examines some of the main business drivers behind the current trend towards adoption of thin client desktop solutions.
|
- Desktop Search Tools - A Security Investigator's New Best Friend
- Oct 26, 2007
- John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
|
- Detecting Signs of Intrusion
- Dec 28, 2001
- This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
|
- Developing a Scalable e-Business Strategy with Application Service Providers
- Nov 2, 2001
- The adoption of the ASP model is driven by the need for businesses to work more efficiently together, driving costs down and the level of collaboration up. This chapter profiles those driving needs in detail.
|