Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

128 Results Found

Results per page: 10 40 80

Configuring and Using PKI in Your Microsoft Network

White Paper | Dec. 09, 2014

Public Key Infrastructure (PKI) can become a fairly complex environment and deployment, as it involves multiple components that all need to work together smoothly. Understanding the theory of how it all works will help in building a solid foundation for this complex technology in your organization. Although there is always something new to learn in PKI, this white paper gives you a great overview of the core configuration of your Microsoft CAs.

Creating Various Services Within Microsoft Azure

Webinar – Recorded | July 16, 2020

This webinar will examine how to create various services in Azure. We will consider the different ways available to create resources in Azure. View the slide deck>>

Defining QOS (Quality of Service)

Video | March 15, 2012

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains QoS.

Detailed File Share Auditing allows you to monitor access to Windows 7 file shares

Article | May 04, 2010

Windows 7 can be a good file server on very small workgroup networks. Although Windows 7 is limited to only 10 concurrent client connections as a file server it can do a good job making files accessible over a network. Windows 7 shares a great deal of code with Windo...

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) Associate Level certifications

Webinar – Recorded | May 20, 2021

Join us for this exciting journey through Microsoft Security, Compliance, and Identity (SCI) new security-focused certifications. We will discover the complete portfolio of associate training and certification for Microsoft Security, designed to meet industry and market needs, with roles, skills and capabilities needed for the job, including specializations, hands-on experience and practice requirements. We will also discuss the skills gap in security professionals. View the slide deck>>

Enabling  the Active Directory Recycle Bin in Windows 2008 R2

Article | May 17, 2010

Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted  network access will be lost. Worker productivity will decline until the account...

Exchange 2010 Transport Fundamentals

Article | Aug. 17, 2009

Exchange 2010 builds upon the significant changes to the transport that were made in Exchange 2007. In this article, I'll review the transport pipeline and routing components and list some of the new architectural and administrative enhancements to the Exchange 2010...

Extending Role Security in Analysis Services for SQL Server

White Paper | Dec. 30, 2013

By using and implementing a many-to-many relationship in a cube, existing tables with user account information can be used directly to secure cube contents, rather than converting to role based security in the cube. You can also secure your analysis services more easily and access sensitive information contained within it.

Five Simple Symbols You Should Know to Unlock Your Powershell Potential

White Paper | May 06, 2015

Unless you know the meanings of the five symbols regularly used in PowerShell, they can obscure the purpose and actions of a PowerShell script. There will always be new cmdlets to decipher. Each new operating system release and application version will include new and useful cmdlets along with new parameters for existing cmdlets. You can't memorize them all, but with the basic knowledge of these particular symbols, you should be well equipped to follow the logic of many scripts.