Our documents are based on successfully executed projects which save you time and money.
application , projects , web-services

Service-Oriented Architecture (SOA)

October 2, 2009

Service-Oriented Architecture (SOA) is an architectural style that supports service orientation. Service orientation is a way of thinking in terms of services and service-based development and the outcomes of services. A service: Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer...

Img
networking

TCP and UDP ports

September 27, 2009

  Port Category Port Number Range Description Well-known ports 0 – 1023 Typically used by standard system processes or programs executed by users with administrator credentials. Assigned by IANA. Registered ports 1024 – 49151 Used by ordinary user processes or programs executed by ordinary users. IANA does not assign...

Img
security

Physical and Perimters test cases

September 21, 2009

Perimeter Review This is a method of testing the physical security of an organization and its assets by reviewing is its physical perimeter security measures. Expected Results: 1        Map of physical perimeter 2        Types of physical protective measures 3        List of unprotected / weakly protected areas Tasks to perform...

Img
information-rights-management , security

Identity Theft

September 5, 2009

Identity theft is a crime where a person’s legal identity is stolen and used to conduct financial fraud. Identity thieves steal information about a victim such as bank account information, Social Security number and driver’s license number in order to open accounts in the victim’s name or to change...

Img
security

What is Tempest

August 3, 2009

Tempest stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission...

Img
email

Email Archiving Software Products

July 16, 2009

Different product options to consider: AXS-One C2C Archive One CA Message Manager (iLumin) EMC Documentum Archive Services for Email EMC EmailXtender (Legato) FileNet HP StorageWorks Reference Information Manager (RIM) for Messaging IBM DB2 Content Manager CommonStore Messaging Architects GWArchive Mimosa Systems NearPoint for Exchange Open Text Livelink ECM-Email Archiving...

Img
business , compliances

Mergers and Acquisitions and Open Source Issues

July 6, 2009

Author unknown… In mergers and acquisitions, open source issues have become a significant concern. Open source considerations may affect the representations, warranties, indemnities, value and structure of a merger or acquisition transaction. Typical documentation used to “paper” merger transactions may have to be modified to reflect open source issues....

Img
business , compliances

How to pretend to be succesful in IT Today

July 1, 2009

Items to Consider Target Behaviors: Analysis and Problem Solving 1        Follows technical interrelated sets of complex issues without difficulty 2        Asks clarifying and shaping questions geared towards thoroughly assessing critical issues 3        Demonstrates creative and occasionally innovative approaches to information gathering within a structured framework 4        Able to enlist...

Img
visio-stencils

Sample Visio – Storage Stencils

May 17, 2009

Free Visio Sample Document download Storage Stencils.zip Directory listing Adaptec.vss Antec.vss Back-UPS-Pro.vss Line-R.vss MasterSwitch.vss MX_Series.vss PDU.vss PowerManager.vss PowerShield.vss ProtectNet.vss Smart-UPS_RM.vss SmartSlot.vss Symmetra.vss BestPower.vss CacheFlow.vss ElectronicsforImagingInc.vss F5Labs.vss Iomega.vss Maxtor.vss NetworkStorageSol.vss nStor.vss Quantum.vss StorageSolutions.vss https://www.bestitdocuments.com/Samples/

Img
security

Operating System Defacement statistics

May 15, 2009

48581 time(s)               “Windows“       which is 58.184% of all defacements 16976 time(s)                 “Linux”             which is 21.844% of all defacements 2762 time(s)                 “Unknown”       which is 8.649% of all  defacements 2242 time(s)                 “Solaris”           which is 3.889% of all  defacements 8275...

Img
networking , o-s

TCP/IP Address Resolution

May 10, 2009

Windows order of resolution: NetBIOS WINS Broadcast LM Hosts Hosts DNS Hosts Local Hosts DNS Cache WINS Broadcast LM Hosts https://www.bestitdocuments.com/Samples/

Img
networking

Tons of Bytes

May 4, 2009

Lots of Bytes When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the...

Img
o-s

Download PC – MacIntosh Documentation

May 1, 2009

AppleTalk Reference: Protocol Suite Macintosh.zip https://www.bestitdocuments.com/Samples/

Img
business

Building Mission & Vision Statements

April 25, 2009

Mission statements are defining statements for an organization. An organization exists to accomplish its mission. The mission statement typically defines: o The business of the organization, o The product of the organization, o The customers of the organization. When stating the mission of the organization, focus outside of the...

Img
data-center-soc-noc , security

What to do with Correlated Data

April 19, 2009

Threat Analysis – This is a process of taking the correlated data and determining what it means and then prioritizing the data. Includes the reduction of False Positives. Forensic Analysis – The ability to analyze correlated events historically for trending and for prosecution. Policy Analysis – Correlation provides a...

Img
security

Why is Correlation and Threat Analysis Important

April 16, 2009

Reduce operating costs through efficiency and better resource allocation: Monitor existing environment and deploy additional security measures without increasing resources Improve decision-making processes Dramatically reduce response times Avoid the costs associated with a breach Downtime, theft, or damage to reputation Maximize utilization of existing security infrastructure Allows customers to...

Img
business

Download Tons of free miscellanious Research Documents

April 15, 2009

Download all files here: All_PPTs.zip 101 Security.ppt As time permits this list of files will increase in content 2000 Accounts.ppt 8021x simplified.ppt Administration of a Windows 2000 Network.ppt Advanced Windows NT Security.ppt Application Support with MSI.ppt Business Data Communications and Networking.ppt Communications Decency Act.doc COPPA.ppt Distributed File System.ppt Distributed Firewall Architecture.ppt...

Img
security

Viruses, Spyware and Malware Impacts

April 14, 2009

Performance Impacts to your System(s) Tax – Memory resources Tax – Processor resources Pop-ups Trojans Malware Spyware Greyware Virus propagation P2P applications / file sharing Hidden applications Removal of restore points Keystroke loggers Results in a: Compromise use Compromise data Compromise email Compromise confidentiality System could be used to...

Img
information-rights-management , security , visio-stencils

Sample Visio – Requirements for Security Auditing – Logging Tool

April 13, 2009

Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Audit Reports – Intelligent reporting, not just dumps of logs. Real time...

Img
security

Blended Threats

April 12, 2009

A blended threat is a security attack or threat that uses multiple methods and techniques to propagate an attack Combine hacking, DoS, and worm-like propagation Can rapidly compromise millions of machines Often spread without human interaction Require multiple layers of protection and response to neutralize Exploit software vulnerabilities Email...

Img
business , o-s , security

Legacy IE Browser Settings

April 11, 2009

Microsoft Internet Explorer 6.0 Advanced Properties Tab – within Internet Options (the ones that are checked) Browsing Always send URLs as UTF-8 Close unused folders in History and Favorites Disable script debugging Enable folder view for FTP sites Enable Install On Demand Enable Offline items to be synchronized on...

Img
business , security

Unhappy employees Risk Factors

April 10, 2009

Employees are a greater risk to computer-security for companies than the much-feared hacker, and experts say. Eight in 10 computer-security breaches are caused by staff members, many of whom are simply disgruntled, says a risk consultant Eighty per cent of IT security breaches are the result of actions by...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
security

Did you know?

March 26, 2009

Interesting tidbits of information: E-mails, contracts, and PowerPoint files account for 80 percent of corporate information. 71% Use Email to Negotiate Contracts and Agreements 69% Use Email to Exchange Invoices, Statements, and Payment Information 93% Use Email to Communicate with Customers. 38% Use Email to Respond to Regulators 44%...

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
business , security

Are you the Next Target?

March 12, 2009

They’re after you, who are they? Competitors Disgruntled employees Upset customers Hackers out for a lark  Hactivists Cartels that can buy the latest gadgets and best brainpower Hostile foreign governments / nations Your organization may not be a specific target, just on that had a few vulnerabilities as it...

Img
business , compliances , information-rights-management , security

Securing the confidentiality of PHI

March 8, 2009

PHI (Protected Health Information) requires passwords but…. a) Easy-to-guess passwords are one of the top ten threats to network security b) When passwords change often to improve security, users write them down, increasing the risk of a breach In addition, employers must block terminated staff from continued access to systems...

Img
o-s

From DOS, Windows, Windows 9x / XP Windows NT, and OS/2

March 1, 2009

You can use the following procedure to identify your video card. From a command prompt type the “debug” command and hit enter. You will leave the C:> prompt and be put in the debug’s “-” dash prompt. C:> DEBUG At the dash prompt type “d C000:0010” and hit enter....

Img
networking , security

Short list of IEEE Standards

February 26, 2009

802.1 Internetworking 802.2 Logical Link Control 802.3 CMSA/CD or Ethernet 802.4 Token Bus LAN 802.5 Token Ring LAN 802.6 Metropolitan Area Network or MAN 802.7 Broadband Technical Advisory Group 802.8 Fiber-Optic Technical Advisory Group 802.9 Integrated Voice/Data Networks 802.10 Network Security 802.11 Wireless Networks 802.12 Demand Priority Access LAN...

Img
projects

Useful Project Management Definitions

February 17, 2009

Accountability Matrix. See responsibility assignment matrix. Activity – An element of work performed during the course of a project. An activity normally has an expected duration, an expected cost, and expected resource requirements. Activities are often subdivided into tasks. Activity Definition – Identifying the specific activities that must be...

Img
compliances , policies , security

Why should I bother with a Security Policy?

February 14, 2009

The image that most frequently comes to mind when discussing security is that of the great firewall standing guard at the opening to your network, fending off attacks from malevolent hackers. Although a firewall will play a crucial role, it is only a tool that should be part of...

Img