All Research Sponsored By:Global Knowledge
-
Managing SharePoint in an Enterprise Environment
Microsoft Office SharePoint Server 2007 and other SharePoint technologies are excellent tools for a modern, web-based office environment. This white paper gives pointers on managing them.
-
ITIL® v3: What It Is and Why You Should Care
This paper explains ITIL by describing its benefits, where it comes from, why you need to know about it, which types of IT organization can benefit from using it, and how to get started.
-
Troubleshooting SQL 2005: Opening the Database Administrator's Toolbox
This white paper guides you through troubleshooting using some of SQL 2005's built-in features to diagnose issues with your database.
-
Hardware Neutral Imaging with ImageX: The Ghost Killer
Learn how ImageX can help facilitate successful image management and lower the total cost of ownership of your Vista implementation.
-
Longhorn Server and New Group Policy Settings
With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
-
Ten Ways Hackers Breach Security
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
-
Is It the Network? Solving VoIP Problems on a Wireless LAN
The goal of this paper is to combine a deep knowledge of 802.11 protocols, quality of service (QoS) mechanisms and VoIP handsets with the feedback from IT professionals to identify potential problems and solutions when rolling out VoIP on a Wi-...
-
Network Access Protection: New Ways to Keep Your Network Healthy
Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.
-
An Introduction to PMI's Project Life Cycle
This paper provides a review of the steps and stages associated with project management according to the Project Management Institute® (PMI). It is a primer for anyone new to the PMBOK® and who is preparing to take the PMP exam.
-
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
-
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
-
7 Types of Hard CISSP Exam Questions and How to Approach Them
Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
-
VoIP: How to Plan for the Bandwidth and Calculate the Cost Savings
VoIP integrated networks are easy to design and the cost justifications are simple to calculate, learn the step-by-step process of how to calculate the potential cost savings of a voice and data integrated network for your organization.