RSS Feed Subscribe to this topic  RSS details

1210 Items

Sort by Date | Title

Virtualizing SQL Server with VMware: Architecting for Performance: Storage
By Michael Corey, Jeff Szastak, Michael Webster
Aug 14, 2014
This chapter from Virtualizing SQL Server with VMware: Doing IT Right first covers the key aspects of storage architecture relevant to both physical and virtual environments as well as the differences you need to understand when architecting storage, specifically for virtualized SQL Server Databases.
Administrator's Guide to VMware Virtual SAN: Introduction to VSAN
By Cormac Hogan, Duncan Epping
Aug 11, 2014
This chapter introduces you to the world of the software-defined datacenter, but with a focus on the storage aspect.
CompTIA Security+ SY0-401 Authorized Cert Guide: OS Hardening and Virtualization
By David L. Prowse
Aug 5, 2014
This chapter focuses on the hardening of operating systems and the securing of virtual operating systems and will help you prepare for the CompTIA Security+ SY0-401 exam.
Exam Profile: CompTIA's New Security+ SY0-401 Exam
By Diane Barrett
Aug 4, 2014
This article describes the new CompTIA Security+ SY0-401 exam, including the objectives, preparation hints, and study resources.
Cisco WSA: User Authentication with Transparent Proxy
By Natalie Timms
Jul 30, 2014
In this video Natalie Timms covers integrating user authentication with Web Cache Communication Protocol (WCCP) based transparent proxy service on the Cisco Web Services Appliance (WSA). She shows how an existing Microsoft Active Directory user database can be leveraged to validate user credentials when determining if redirected traffic flows should be permitted through the WSA.
VCAP5-DCA Official Cert Guide: Network Administration
By John B. Davis, Steve Baca
Jul 16, 2014
This chapter provides the knowledge and skills needed to successfully configure and administer an enterprise network that includes virtual networks built using vSphere.
CCIE Security v4.0 Practice Lab
By Natalie Timms
Jul 15, 2014
In this practice lab to help in your preparation for the CCIE Security exam, Natalie Timms focuses on initializing and configuring the Cisco Adaptive Security Appliance (ASA) in both single- and multi-context modes.
31 Days Before Your CCNA Routing and Switching Exam: Spanning Tree Protocols
By Allan Johnson
Jul 9, 2014
This step in preparing for the CCNA Routing and Switching exam covers STP and its variations — standards that allow for redundant switched networks without worrying about switching loops.
Caring for the Client with Disorders of the Respiratory System
By Wilda Rinehart, Clara Hurd, Diann Sloan
Jul 8, 2014
This chapter covers terms and skills you'll need to know for the NCLEX-RN exam section on caring for patients with respiratory disorders, including diagnostic tests, pharmacology categories, and exam prep questions.
VMware Horizon Suite: How View, Mirage, and Workspace Form the New End-User Model
By Paul O'Doherty, Stephane Asselin
Jul 8, 2014
This chapter introduces the core pieces of the VMware Horizon Suite, View, Mirage, and Workspace, while additionally covering some high-level predeployment considerations and the base-level components of each solution.
Information Security Principles of Success
By Jim Breithaupt, Mark S. Merkow
Jul 4, 2014
This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
The IT Consultant's Guide to Using LinkedIn for Business Development
By Matthew Moran
Jul 3, 2014
Learn how to use LinkedIn’s powerful networking capabilities to build your consulting business.
CCIE Collaboration Quick Reference: Cisco Unified Communications Security
By Akhil Behl
Jul 2, 2014
In this chapter, Akhil Behl explains how to secure a converged communications network by discussing potential threats as well as options for maintaining the confidentiality of network data and its integrity.
Security by Design: Planning for Security in the Design, Deployment, and Operation of IT Systems
By Keith Barker, Scott Morris
Jul 2, 2014
In this video Keith Barker and Scott Morris discuss the importance of security as part of the design, deployment and operations of information system today.
The IT Consultant's Guide to Building Clout and Credibility
By Matthew Moran
Jun 27, 2014
Discover proven strategies and tools you can use to establish yourself as a subject matter expert.
Cisco Networking Academy Switched Networks Companion Guide: VLANs
By Cisco Networking Academy
Jun 25, 2014
This chapter covers how to configure, manage, and troubleshoot VLANs and VLAN trunks. It also examines security considerations and strategies relating to VLANs and trunks, and best practices for VLAN design.
Warmup for the CCIE Troubleshooting Lab 1
By Martin Duggan
Jun 20, 2014
This chapter details the equipment requirements and pre-lab tasks to help you prepare for the troubleshooting portion of the CCIE Routing and Switching exam.
The IT Consultant's Guide to Hiring and Managing Subcontractors
By Matthew Moran
Jun 19, 2014
As your consulting business grows, you may want or need to hire subcontractors. Here is guidance to help you hire and effectively manage your subcontractors.
The IT Consultant’s Guide to Writing a Winning Proposal
By Matthew Moran
Jun 9, 2014
An effective proposal is one of the most important tools in a consultant’s toolkit. This article describes an effective strategies to turn your proposals into projects.
Introduction to 31 Days Before Your CCNA Routing and Switching Exam
By Allan Johnson
May 19, 2014
Allan Johnson provides a list of recommended resources to assist in your preparation for taking the CCNA Routing and Switching Exam. He also provides a brief introduction to the CCNA 200-201 Exam itself.

1 2 3 4 5 Next >