Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

160 Results Found

Results per page: 10 40 80

The 5 Phases of Hacking: Gaining Access

Article | March 25, 2021

Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. 

8 Specializations that Define Successful Cybersecurity Organizations

Article | Jan. 15, 2021

Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.

A Complete Guide: How to Become a Google Certified Professional Cloud Architect

White Paper | April 05, 2021

This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.

A Complete Guide: How to Become a Google Certified Professional Cloud Architect Test

White Paper | April 05, 2021

This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.

A Complete Guide: How to Become an AWS Certified Architect

White Paper | May 14, 2021

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

A Guide to Simplifying InfoSphere DataStage Change Management

White Paper | Aug. 19, 2015

Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.

A Toolkit for Project Time Estimation

White Paper | Jan. 06, 2017

Resource management is always an issue in any project, especially when the stakeholders from whom we need time have operational duties to perform.  If our requirements team was at our disposal 100 percent, always completed activities on target, and worked a full eight hour day without distraction or a loss of productivity, then estimating time would be simple. In this paper, we explore standard approaches to time estimation, the dangers of multi-tasking, and estimation alternatives, which consider work habits and productivity norms.

A Beginner's Guide to Encryption

Article | March 05, 2021

Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing. 

Advantages of Using SonicWALL Route-Based VPN Instead of Site-to-Site VPN

Article | Nov. 19, 2020

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...