Our documents are based on successfully executed projects which save you time and money.
application

System and Application Unit Testing

December 20, 2010

Testing must be an on-going activity throughout all phases of a project and should be an integral component of quality assurance efforts. A complete testing strategy cannot be developed until after vendor selection, so this section contains suggestions for possible activities that could be included in a testing strategy,...

Tags: , , , , Img
compliances

Sample Change Management Perspective

December 20, 2010

Any project with the scope of an IT implementation will introduce change into an organization, and you need to use this opportunity to review existing processes, and adopt best practices where they provide benefit and can be implemented with reasonable effort. These kinds of changes can impact both individuals...

Tags: , Img
projects

A Good Project Starting Point Considerations

December 19, 2010

Clearly define project deliverables Carefully contemplate the objectives of each deliverable Define what constitutes successful completion of the deliverable Provide an estimate of effort and / or duration needed to complete the deliverable Prepare appropriate documentation needed to complete the deliverable Communicate and / or implement any associated processes...

Tags: , Img
business

Sample Remedy / Heat Incident Tracking ID

December 17, 2010

  Remedy / Heat Tracking ID: Date / Time:  Item # Support Need Owner Notes / Description Status 1         2         3         4         5         6         7...

Tags: , Img
business

Autocad 2010 Print to Adobe

December 16, 2010

Excellent PDF download Sample:  Autocad 2010 Print to Adobe https://www.bestitdocuments.com/Samples

Tags: , Img
business , itil

ITIL – Change and Patch Management

December 15, 2010

A set of processes executed within the organization’s IT organization designed to manage the enhancements, updates, incremental fixes and patches to production systems, which include: · Infrastructure changes (routers, firewalls, proxies, cabling, etc) · System upgrades (servers, operating systems, , applications, databases) · Application code revisions (development and testing)...

Tags: , , Img
application

SDLC – Application System Definition Model

December 14, 2010

Audience: Application & System Services Communication & Collaboration Service: Database Administration Desktop Computer Services Disaster Recovery & Business Continuity Services Facilities A formal model of a complete system All information pertinent to deployment and operations Machine-readable, capturing intent of developers and administrators System topology Developer constraints IT policy Installation...

Tags: , , , , Img
application

Testing Approach and Strategy

December 13, 2010

Testing Approach and strategy helps you prepare the list of testing requirements and the testing strategy for supporting the new corporate procurement and application module. Included are descriptions of the target audience, delivery method, and objectives. In addition, the testing approach and strategy identify: The high level objectives and...

Tags: , , , , Img
application

Sample SDLC Development Project Deliverables

December 12, 2010

Deliverables and Combined Processes Discovery Project Roadmap Planning Customer & Stakeholder requirements prioritization & signoff Internal Services Catalog Project Risks Identified UI Models List of Alternative Solutions Selection of Best Solutions for further research Hardware Solutions Demos Financial Approval Potential Solutions Modeled in Test Lab  Initial Security Requirements Definition...

Tags: , , , , Img
compliances

Questions for: Configuration Management and change control

December 12, 2010

Does the configuration management plan address identification, status accounting and audit? Does the configuration management plan address the configuration of all system and configuration items? Is the configuration management integrated into the structure of an organization? Is there version control of all configuration items? Is configuration management and version...

Tags: , , Img
business

Evolve to support

December 11, 2010

The protection of privacy is one of the most important issues surrounding the Internet today. Today, priority must be placed on protection of new applications, current system infrastructure and data integrity in addition to the implementation of privacy practices. New reports on unauthorized access, interruption of service, privacy invasion...

Tags: , Img
application

Basic Oracle Hardening

December 11, 2010

Disable install and demo accounts: Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login...

Tags: , , , , Img
application

Datacenter – Application Lifecycle Considerations

December 10, 2010

Service Monitoring • Availability• Logging• Auditing• Performance Metrics• Debugging & Tracing• Synthetic Transactions Exception Management • Error Trapping• Root Cause Analysis• Notification Services Version Management • Data Contracts• Message & Operation Contracts• Endpoints (Addresses)• Policies• Internal Dependencies• Claims• Service Retirement• Dependency Analysis Service Delivery • Methodology• Standardized Service Delivery...

Tags: , , , , Img
application , web-services

Apache Webserver Diagnostics

December 7, 2010

Couple Options / utilities can help with debugging transient problems: o Curl o Dtrace Check the error_log when Apache misbehaves $ kill -SIGSEGV `pgrep httpd | tail -1` $ tail -100 error_log Curl · Versatile command line utility that can be used to debug web-based problems · Curl contains several advanced...

Tags: , Img
projects

Internet Service Provider (ISP) Communication / Constraints

December 7, 2010

    ISP Communication / Constraints           Gov’t Owned: Legal Other Area Remote Location Ctry Code ISP GateWay Allow Encryption Allow Satellite Mobile Data Svc Dial-up Mobil Phone E.Africa Ethiopia ET       S N N Y E.Africa Kenya KE        ...

Tags: , Img
security

Sample Word – VPN Configuration Documents

December 6, 2010

Free Word document download Sample VPN Configuration Worksheet.doc https://www.bestitdocuments.com/Samples

Tags: , , Img
projects

Generic Enterprise Workflow Requirements – Matrix

December 6, 2010

  Integrate with single sign-on solution roles as currently used   Generic  Enterprise Workflow Requirements – Matrix Description Employee review Online Availability Recruiting Workflow Core       Manage and support various Event types       Create, Update or Delete a token X   X Status Changes X...

Tags: , Img
information-rights-management

Sample Data Rights Management Matrix

December 6, 2010

A Sample protection matrix specifies the operations that are allowable on objects by a process executing in a domain Description Sharepoint access File-share1 File-share2 Database Access File1 Acccess (RW) File1 Acccess (RW) File1 Acccess (RW) File1 Acccess (RO) Printer1 Plotter2 Domain name              ...

Tags: , Img
projects

ISP Communication / Constraints

December 5, 2010

    ISP Communication / Constraints           Gov’t Owned: Legal Other Area Remote Location Ctry Code ISP GateWay Allow Encryption Allow Satellite Mobile Data Svc Dial-up Mobil Phone E.Africa Ethiopia ET       S N N Y E.Africa Kenya KE        ...

Tags: , Img
compliances , policies , sample-it-spreadsheets

Sample Excel – Comparison Between Old and Revised ISO 17799 Standards

December 4, 2010

Free – Excel document download An Excellent comparison excel matrix. www.bestitdocuments.com

Tags: , , , Img
business

What is an IT Service Request Catalog?

December 3, 2010

The IT Service Request Catalog is a web portal that contains information about all corporate IT Services. It offers many improvements over the current methods that corporate employees once used to request, assign, and fulfill IT service requests. The IT Service Request Catalog provides: · Central repository to document...

Tags: , Img
security

Sample Support System Security Plan

December 1, 2010

Sample Support System Security Plan System Identification · General Information · System Name / Title · Unique Identifier & Name Given to the System. Responsible Organization · List organization responsible for the application o Name: o Title: o Address: o Phone: o E-mail: Information Contact(s) · Name of person(s) knowledgeable about, or the owner of, the system. More than...

Tags: , , Img
o-s

NFS vs Coda

November 22, 2010

NFS vs Coda Considerations NFS Coda Design goals Access transparency High availability Communication RPC RPC Access model Remote Up/Download Mount granularity Directory File system Server groups No Yes Name space Per client Global Sharing sem Session Transactional Cache consist. write-back write-back Fault tolerance Reliable comm. Replication and caching Recovery...

Tags: , Img
security

Secure your servers

November 8, 2010

Review and implement my company’s security policies as they relate to web security. Implement a secure network infrastructure by controlling access to/from your web server by using: Firewalls, Routers and Switches. Implement a Network Intrusion Detection System to monitor attacks against the web server. Patched servers. Implement load-balancing /fail...

Tags: , , Img
security

Web Server Pieces

November 7, 2010

Server OS + Hardware •Web Server Database Server Web application framework or language Scripting language or Application Client & Browser Security •Authentication and Session Management Web Server •Apache and IIS 6 / 7 are not secure OTB •Configurations can become complex over time –Look for unused modules or paths...

Tags: , , Img
security

Web Security Attacks

November 5, 2010

•Abuse of Functionality •Brute Force •Buffer Overflow •Content Spoofing •Credential/Session Prediction •Cross-site Scripting •Denial of Service •Directory Indexing •Format String Attack •Information Leakage •Insufficient Anti-automation •Insufficient Authentication •Insufficient Authorization •Insufficient Process Validation •Insufficient Session Expiration •LDAP Injection •OS Commanding •Path Traversal •Predictable Resource Location •Session Fixation SQL Injection •SSL...

Tags: , , Img
security

Top 10 Web Security Vulnerabilities

November 4, 2010

1.      Poorly validated Input 2.      Broken Access Control 3.      Broken Authentication and Session Management 4.      Cross Site Scripting 5.      Buffer Overflow 6.      Injection Flaws 7.      Improper Error Handling 8.      Insecure Storage 9.      Application Denial of Service 10.  Insecure Configuration Management How to counteract these issues: Test existing web applications...

Tags: , , Img
business

Impact of the Internet

October 7, 2010

Impact on Business When the Internet first came to the workplace it was looked upon as though it was almost a toy.  People would talk about how fun it was and all the cool things they could find on the web.  It wasn’t long before browsing became far more...

Tags: , , Img
business

Business Requirements for Network Performance

October 4, 2010

Look for a complete picture of the network performance across both the WAN and the LAN regardless of network technology • Measure and verify key service level parameters including latency, availability, packet loss and jitter from an independent, third party point of view. • Monitor key performance indicators including...

Tags: , , Img
o-s

Linux System Administration Commands

October 1, 2010

Compression/decompression utilities (software installation): compress <file>                      compress -d <file>.Z (or uncompress <file>.Z) gzip <file>                                gzip -d <file>.gz (or gunzip <file>.gz) tar cvf <device> <files>         tar xvf <device>.tar System Shutdown: reboot halt shutdown [-h now] [-r now] User Management: 1.  To add a user  (a) adduser: add a new user...

Tags: , , Img
compliances

Sanctions for Regulatory Non-Compliance

August 21, 2010

There are penalties for stakeholders; CISO is liable. The first column indicates when the year when the regulation came into existence The next column shows the fine the maximum fine.  As you can see, there are some hefty fines associated with non-compliance. This is driving behaviour. The next column...

Tags: , , Img