Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

51 Results Found

Results per page: 10 40 80

Five Simple Symbols You Should Know to Unlock Your Powershell Potential

White Paper | May 06, 2015

Unless you know the meanings of the five symbols regularly used in PowerShell, they can obscure the purpose and actions of a PowerShell script. There will always be new cmdlets to decipher. Each new operating system release and application version will include new and useful cmdlets along with new parameters for existing cmdlets. You can't memorize them all, but with the basic knowledge of these particular symbols, you should be well equipped to follow the logic of many scripts.

Microsoft Service Manager Simplified

White Paper | March 11, 2015

Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF). Service Manager also has built-in processes for Incident and Problem management, Change and Configuration management as well as Asset Lifecycle Management.

Hyper-V Replicas in Windows Server 2012

White Paper | Feb. 27, 2015

One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.

Microsoft Assessment and Planning (MAP) Toolkit Version 9.x

White Paper | Dec. 16, 2014

The Microsoft Assessment and Planning (MAP) Toolkit is an free inventory, assessment, and reporting tool from that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs.

Configuring and Using PKI in Your Microsoft Network

White Paper | Dec. 09, 2014

Public Key Infrastructure (PKI) can become a fairly complex environment and deployment, as it involves multiple components that all need to work together smoothly. Understanding the theory of how it all works will help in building a solid foundation for this complex technology in your organization. Although there is always something new to learn in PKI, this white paper gives you a great overview of the core configuration of your Microsoft CAs.

Unlock the Power of Microsoft SQL Server 2014

Webinar – Recorded | April 24, 2014

Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.

Top 10 Mistakes Deploying and Upgrading Lync Server 2013

White Paper | Feb. 25, 2014

Microsoft Lync Server 2013 requires a proactive approach during deployment. This white paper provides valuable recommendations as well as the technical links that help you avoid common mistakes during a Microsoft Lync Server 2013 deployment.

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

Extending Role Security in Analysis Services for SQL Server

White Paper | Dec. 30, 2013

By using and implementing a many-to-many relationship in a cube, existing tables with user account information can be used directly to secure cube contents, rather than converting to role based security in the cube. You can also secure your analysis services more easily and access sensitive information contained within it.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.