Our documents are based on successfully executed projects which save you time and money.
application , compliances , data-center-soc-noc , itil , security , web-services

What you should look for when shopping for a Data Center

April 19, 2012

A wide range of state of the art facility and IT technology characteristics these characteristics include: Earthquake suppression (structural design), Lightning suppression, Tornado and flood suppression, Moisture detection, Sealed conduits, Sump pumps, Drainage Power distribution and backup power supply, Flywheel CPS (continuous power supplies), Surge protection and brownouts, Redundant...

Img
compliances , security

Sample Word – Sample Data Classification Policy

April 19, 2012

Free Word – document download Sample Data Classification Policy

Img
application , business , compliances , networking , projects , security , visio-stencils , web-services

Sample Visio – What is an IT Process

April 19, 2012

Free Visio Document Download What is an IT process and how does this might fit in your processes. What is a Process www.bestitdocuments.com

Img
compliances , itil , security , visio-stencils , web-services

Sample Visio – ITIL – Crisis Management Team Structure

April 18, 2012

Free – Visio Document download ITIL – Crisis Management Team Structure

Img
application , compliances , security

IT Architecture Principles

April 18, 2012

Just another opion of many that are out on the Internet. Architecture guides planning, design, implementation and testing and identifies key principles to be applied to the solution design. The architecture decision documents helps to maintain a record of the important decisions made during the development of the broader...

Img
application , compliances , networking , policies , projects

Sample Word – Data Center Cabling Installation Standards

April 17, 2012

Free Word – document download This document was pieced together from Internet resources for a Data Center build project and is focused on cabling. Cabling Installation Standards

Img
application , business , compliances , networking , security

CA eHealth Pilot Project Sample Requirements

April 17, 2012

Technical Startup Perform engagement management setup activities Prepare for engagement Review implementation information with customer Review project schedule with customer  Architecture and Design Conduct briefing with customer project sponsor Conduct kick-off session Gather project related information and requirements Document requirements Modify test plans as required Review implementation plan with...

Img
application , business , compliances , networking , o-s , security

CA eHealth Performance Manager 6.1 Report Project Sample Requirements

April 17, 2012

Some of the possible Sample Report outputs. Sample Report Produce By Ca’s eHealth Suites MPLS Bandwidth Utilization Bandwidth Utilization In / Out (Wan – Fqdn-Serial0/0) Server Utilization CPU Utilization Total Network (frames / second) Top 10 Partitions (utilization) Service Performance DNS Lookups TCP Connections per second Application Response Average...

Img
compliances , sharepoint , visio-stencils

Sample Visio – LiveLink and Integraph flows

April 14, 2012

Free – Visio Document download LiveLink and Integraph flows

Img
application , compliances , networking , security

Sample Word – Setup SNMP Configuration Suggestions

April 13, 2012

Free Word – Document download SNMP Configuration Suggestions www.bestitdocuments.com

Img
application , business , compliances , networking , projects , sample-it-spreadsheets , security

Sample – Network Infrastructure – Project Schedule for Networked Systems

April 13, 2012

Sample Project Tasls. Task Responsible Person Project initiation   Draft project proposal   Approve project   Develop project plan   Collect information from different anticipated users on network requirements   Specify network requirements   Approve network requirements   Specify network components: hardware, software   Develop network infrastructure plan  ...

Img
application , compliances , o-s , policies , security

Sample Word – Simple Patch Management Standard Example

April 12, 2012

Free Word – Document download Patch Management Standard

Img
application , business , compliances , networking , o-s , security , visio-stencils , web-services

Sample Visio – Network DMZ Drawing with Backup considerations

April 11, 2012

Free – Visio Network DMZ Drawing with Backup considerations Document download DMZ Drawing with Backup considerations www.bestitdocuments.com

Img
application , compliances , itil , security

Grouped Pieces of ITIL V3 Processes

April 11, 2012

ITIL Change Management o Service Catalog o Service Design o Design coordination o Service Level Management o Availability Management o Capacity Management o IT Service Continuity Management o Information Security Management o Vendor / Supplier Management ITIL Service Transition o Financial Management o Demand Management o Service Portfolio Management...

Img
application , compliances , security , web-services

Corporate IT Domain Knowledge

April 11, 2012

How to build or enhance your Corporate IT Domain Knowledge Objectives:   Build an understanding of 1. Business processes and workflows and dependencies 2. Build Domain Oriented Software Development Environment 3. Systems & Software (licensing, licensing recovery and cost to organization) 4. Asset management, know what you have where assets are and classify...

Img
application , compliances , networking , security

A Multi-Layered Security Approach

April 10, 2012

The best security plan is a multi-layered one that creates circles of protection within one another, so that if one defense is penetrated, an intruder still has to get through more levels in order to do damage. Such an approach is called a defense-in-depth design. Computer security should also...

Img
application , compliances , security , web-services

Sample Word – Data Classification and Encryption guidelines

April 9, 2012

What is Confidential Information?  1) Any information not known to outsiders that has value to corporate or whose premature disclosure would help competitors or be harmful to the corporate.  2) Can include physical, electronic, or oral information.  3) Must be classified and protected according to guidelines set in Global Information Classification...

Img
compliances , networking , o-s , policies , security

Suggested Secure Media Destruction Standard

April 9, 2012

Scope This standard applies to all corporate data, including corporate customer data, whether located at a corporate facility or a third party facility, and whether handled by corporate employees, or corporate contractors, vendors, third party service providers, or their staff or agents.  This standard also applies to all wholly...

Img
compliances , information-rights-management , o-s , security

Unix Cross Reference Command Summary

April 9, 2012

Backed by request from our blog comments. BSD Commands.pdf Quick Command Index.pdf RH Linux Commands.pdf Solaris 7 Commands.pdf Solaris 8 Commands.pdf UCR.PDF Universal Unix Commands.pdf Unix Crossreference.pdf Free – Document download Unix Cross Reference Command Summary

Img
compliances , security

Understanding Computer Forensics and Data Destruction

April 8, 2012

An often overlooked aspect of computer security involves data that remains on your computer after you think it is gone. The practice of recovering data from a computer is called computer forensics, a term that is usually associated with recovering data that constitutes evidence in a criminal or civil...

Img
application , compliances , projects , web-services

Project Review by Management Considerations?

April 8, 2012

Does management effectively review the progress of new developments (cost and timing) and costs of computing resources? Consider Reporting to senior management Forecasts/budgets Costing method Monitoring process All costs captured www.bestitdocuments.com

Img
application , compliances , web-services

SDLC – Package software support Considerations

April 7, 2012

Are packages appropriately supported and maintained? Consider Maintenance agreement with the supplier Changes and upgrades checked and tested before installation Source code provided Measures to prevent unauthorized access to the software Software supplier: number of support staff, references, reliability Contracts Software certified Where software is owned by the supplier-escrow...

Img
compliances , information-rights-management , o-s , security , visio-stencils

Sample Visio – Windows Access Control DACL File Access

April 7, 2012

Free – Visio Document download Windows Access Control DACL File Access

Img
application , business , compliances , networking , o-s , security , visio-stencils

Sample Visio – Windows Access Token and the Security Descriptor

April 6, 2012

 Free – Document download The Access Token and the Security Descriptor  

Img
application , business , compliances , networking , o-s , security , visio-stencils , web-services

Sample Visio – Windows 200x IPSEC flows

April 6, 2012

 Free – Document download Windows 200x IPSEC flows IKE Kerberos v5 Certificate Manual Key (Pre-shared Key) AH SHA1, MD5 ESP DES, 3DES IPSec mode Tunnel Transport

Img
compliances

HIPAA – Summary One pager

April 5, 2012

https://www.bestitdocuments.com/Samples/HIPAA_Compliances.zip

Img
business , compliances , firewalls , networking , security

Sample – Managed Security Serivce (MSS) Firewall Standard

April 3, 2012

Scope This standard applies to all corporate data, including corporate customer data, whether located at a corporate facility or a third party facility, and whether handled by corporate employees, or corporate contractors, vendors, third party service providers, or their staff or agents.  This standard also applies to all wholly...

Img
application , compliances , projects , web-services

Integration Test Process Summary

April 3, 2012

Test Planning Test Planning begins once scope closure has occurred and the list of projects is identified for which IT will be performing integration test.  The final deliverable from test planning will be a detailed Integration Test Plan which is the overarching document IT produces to govern the conduct...

Img
compliances , networking , security

Sample Word – General IPSEC IPsec RFC Descriptions

April 2, 2012

MIBs and RFC Descriptions Remote access and RFC Descriptions General MPLS and RFC Descriptions MPLS constrained by BGP routing and RFC Descriptions Transport of layer 2 frames over MPLS and RFC Descriptions Virtual Routers and RFC Descriptions Free Word document download All references www.bestitdocuments.comhttps://www.bestitdocuments.com/Samples/RFC_Descriptions.doc

Img
compliances , security , visio-stencils , web-services

Sample Visio – UNIX / Linux Interactive User Login simplified

April 2, 2012

Free – Visio Document download  UNIX / Linux Interactive User Login simplified www.bestitdocuments.com

Img
compliances , security , virtual-vmware

A comparative study of UNIX virtualization on both platforms

April 2, 2012

Great article on Virtualization. A comparative study of UNIX virtualization on both platforms

Img