Our documents are based on successfully executed projects which save you time and money.
application , compliances , networking , security

A Multi-Layered Security Approach

April 10, 2012

The best security plan is a multi-layered one that creates circles of protection within one another, so that if one defense is penetrated, an intruder still has to get through more levels in order to do damage. Such an approach is called a defense-in-depth design. Computer security should also...

Img
application , compliances , security , web-services

Sample Word – Data Classification and Encryption guidelines

April 9, 2012

What is Confidential Information?  1) Any information not known to outsiders that has value to corporate or whose premature disclosure would help competitors or be harmful to the corporate.  2) Can include physical, electronic, or oral information.  3) Must be classified and protected according to guidelines set in Global Information Classification...

Img
compliances , networking , o-s , policies , security

Suggested Secure Media Destruction Standard

April 9, 2012

Scope This standard applies to all corporate data, including corporate customer data, whether located at a corporate facility or a third party facility, and whether handled by corporate employees, or corporate contractors, vendors, third party service providers, or their staff or agents.  This standard also applies to all wholly...

Img
compliances , information-rights-management , o-s , security

Unix Cross Reference Command Summary

April 9, 2012

Backed by request from our blog comments. BSD Commands.pdf Quick Command Index.pdf RH Linux Commands.pdf Solaris 7 Commands.pdf Solaris 8 Commands.pdf UCR.PDF Universal Unix Commands.pdf Unix Crossreference.pdf Free – Document download Unix Cross Reference Command Summary

Img
compliances , security

Understanding Computer Forensics and Data Destruction

April 8, 2012

An often overlooked aspect of computer security involves data that remains on your computer after you think it is gone. The practice of recovering data from a computer is called computer forensics, a term that is usually associated with recovering data that constitutes evidence in a criminal or civil...

Img
application , networking , sample-it-spreadsheets , security

Sample Excel – Network Communication Speed Comparison Table

April 8, 2012

Free – Excel document download Network Communication Speed Comparison Table www.bestitdocuments.com

Img
compliances , information-rights-management , o-s , security , visio-stencils

Sample Visio – Windows Access Control DACL File Access

April 7, 2012

Free – Visio Document download Windows Access Control DACL File Access

Img
application , business , compliances , networking , o-s , security , visio-stencils

Sample Visio – Windows Access Token and the Security Descriptor

April 6, 2012

 Free – Document download The Access Token and the Security Descriptor  

Img
application , business , compliances , networking , o-s , security , visio-stencils , web-services

Sample Visio – Windows 200x IPSEC flows

April 6, 2012

 Free – Document download Windows 200x IPSEC flows IKE Kerberos v5 Certificate Manual Key (Pre-shared Key) AH SHA1, MD5 ESP DES, 3DES IPSec mode Tunnel Transport

Img
business , security

Sample Word – Sales Representative Agreement

April 5, 2012

Free Word document download Sales Representative Agreement

Img
o-s , security

Sample Word – Common UNIX command Oracle users need an the corresponding VMS commands

April 5, 2012

Free Word document download VMS Commands

Img
o-s , sample-it-spreadsheets , security

Sample Excel – Unix – Redhat, etc… UNIX / Linux Command Summary

April 4, 2012

Free – Document download UNIX / Linux Command Summary

Img
business , compliances , firewalls , networking , security

Sample – Managed Security Serivce (MSS) Firewall Standard

April 3, 2012

Scope This standard applies to all corporate data, including corporate customer data, whether located at a corporate facility or a third party facility, and whether handled by corporate employees, or corporate contractors, vendors, third party service providers, or their staff or agents.  This standard also applies to all wholly...

Img
compliances , networking , security

Sample Word – General IPSEC IPsec RFC Descriptions

April 2, 2012

MIBs and RFC Descriptions Remote access and RFC Descriptions General MPLS and RFC Descriptions MPLS constrained by BGP routing and RFC Descriptions Transport of layer 2 frames over MPLS and RFC Descriptions Virtual Routers and RFC Descriptions Free Word document download All references www.bestitdocuments.comhttps://www.bestitdocuments.com/Samples/RFC_Descriptions.doc

Img
compliances , security , visio-stencils , web-services

Sample Visio – UNIX / Linux Interactive User Login simplified

April 2, 2012

Free – Visio Document download  UNIX / Linux Interactive User Login simplified www.bestitdocuments.com

Img
compliances , security , virtual-vmware

A comparative study of UNIX virtualization on both platforms

April 2, 2012

Great article on Virtualization. A comparative study of UNIX virtualization on both platforms

Img
application , compliances , networking , o-s , policies , security

Security – Standard Patch and Cert Update Policy Recommendations

April 1, 2012

Suggested Standard for Patch, Cert and Vendor updates Policy Standard Security Update Recommendations Statement All security patch fixes and Cert recommendation, and other such materials provided by vendors or official computer emergency response teams (CERTs) must be promptly implemented for testing, and production. Within 30 days of receipt of...

Img
compliances , itil , security , visio-stencils , web-services

Sample Visio – ITIL Service Delivery

April 1, 2012

Free – Visio Document download ITIL Service Delivery

Img
application , compliances , security , web-services

Suggestion – Securing Oracle Environments

April 1, 2012

Suggested Oracle Standard Corporate’s business functions rely upon the integrity, confidentiality, and availability of its computer systems and the information assets stored within them. Responsibilities and procedures for the management, operation and security of all information processing facilities must be established. This standard supports the stated objectives. Requirements and...

Img
compliances , policies , security

Sample Word – Supplier Security Standard

April 1, 2012

Free Word document download Supplier Security Standard

Img
application , compliances , o-s , policies , security

Sample Word – Remote Desktop Protocol Standard

April 1, 2012

Free Word document download Remote Desktop Protocol Standard

Img
application , compliances , security

Sample Word – Third Party Connectivity Guidelines

March 28, 2012

Free Word document download Third Party Connectivity Guidelines www.bestitdocuments.com

Img
compliances , policies , security

Sample Word – TrueCrypt File Encryption Standard

March 28, 2012

Free Word document download TrueCrypt File Encryption Standard

Img
application , business , compliances , information-rights-management , security , visio-stencils , web-services

Sample Visio – Certificate Life-Cycle Management (CLM)

March 28, 2012

Free – Visio Document download Certificate Life-Cycle Management www.bestitdocuments.com

Img
compliances , policies , security

Sample Word – MSS Intrusion Detection System Standard

March 27, 2012

Free – Word document download MSS Intrusion Detection System Standard

Img
application , compliances , policies , security , web-services

Sample Word – System Protection Monitoring Standard

March 27, 2012

Free Word document download System Protection Monitoring Standard

Img
application , compliances , networking , policies , security , web-services

Sample Word – Secure Password Storage Standard

March 26, 2012

Free Word document download Secure Password Storage Standard

Img
application , compliances , networking , policies , security , web-services

Sample Word – Corporate Authentication Standard

March 26, 2012

Free Word document download Corporate Authentication Standard

Img
application , compliances , policies , security , web-services

Sample Word – Secure Solaris Standard

March 26, 2012

Free Word document download Secure Solaris Standard

Img
application , compliances , policies , security , web-services

Sample Word – Secure Java Coding Standard

March 25, 2012

Free Word document download Secure Java Coding Standard

Img
application , compliances , o-s , security , web-services

Oracle Server Performance Monitoring Considerations

March 25, 2012

The following Oracle Server 10g or higher counters that can be monitored as part an SLA: Number of active connections Buffer Cache Hit Ratio CPU Usage Per Second CPU Usage Per Transaction Current Logons Count Current Open Cursors Count Current OS Load Cursor Cache Hit Ratio. Database CPU Time...

Img