Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

249 Results Found

Results per page: 10 40 80

A Complete Guide: How to Become a Microsoft Certified Solutions Expert in Cloud Platform and Infrastructure

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current MCSE: Cloud Platform and Infrastructure certification and offers helpful tips that you can use when preparing for your MCSE certification exam.

A Complete Guide: How to Become an AWS Certified Architect

White Paper | May 14, 2021

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

A Complete Guide: How to Become Certified in CompTIA Cloud+ CVO-002

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.

A Guide for Maximizing your Training Dollars

Special Report | Jan. 01, 2014

You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.

A Practical View of NIST's Cloud Definition

White Paper | July 14, 2014

The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.

A Toolkit for Project Time Estimation

White Paper | Jan. 06, 2017

Resource management is always an issue in any project, especially when the stakeholders from whom we need time have operational duties to perform.  If our requirements team was at our disposal 100 percent, always completed activities on target, and worked a full eight hour day without distraction or a loss of productivity, then estimating time would be simple. In this paper, we explore standard approaches to time estimation, the dangers of multi-tasking, and estimation alternatives, which consider work habits and productivity norms.

A Beginner's Guide to Encryption

Article | March 05, 2021

Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing. 

Advantages of Using SonicWALL Route-Based VPN Instead of Site-to-Site VPN

Article | Nov. 19, 2020

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.

Agile and Business Analysts – Is There a Place For Us?

Webinar – Recorded | May 11, 2017

As organizations embark on agile initiatives, business analysts can serve a critical role in ensuring the success of those initiatives. This one-hour webinar will explore why business analysts embody core values and skills to thrive in an agile world. In this one-hour webinar, you will learn: Common myths about agile and business analysis, Agile roles for business analysts, BA skills for succeeding in an agile world, and Maximizing value – at the core of the BA role

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...