Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

66 Results Found for "azure"

Results per page: 10 40 80

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

Data Center Basics: the Differences Between IOS and NX-OS

Article | Sep. 04, 2012

As we discussed previously, Cisco created the Nexus Operating System (NX-OS) to power its next-generation data-center switching platform. While this new OS shares many similarities to the original IOS, there are some definite differences that you need to be aware of as you begin using it.

Military Orders Process vs. Project Management Methodology, Part 1

Article | Aug. 13, 2013

For a project manager (PM) who has served as a military officer on a battalion or higher staff, the parallels between the military decision-making process (MDMP), the orders production process, and project management doctrine prescribed by the Project Management Institute (PMI) are difficult to ignore. Both the MDMP and the processes outlined in A Guide to the Project Management Body of Knowledge—Fifth Edition (PMBOK® Guide) are iterative in nature, allow for the introduction of changes to the original plan, assign tasks and responsibilities, and involve the concept of managing the scope of the operation or project.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

How to Execute the Perfect Business Analysis Interview

White Paper | Feb. 13, 2017

When designing a structured business analyst interview, it’s crucial to have a goal in mind, a clear set of questions planned, and an understanding of how those questions may deviate from the intended goal.

Global Knowledge Releases Resources and Big-Name Webinars For Cybersecurity Awareness Month, October 2020

News | Oct. 06, 2020

Read the article about Global Knowledge realeasing Resources and Big-Name Webinars For Cybersecurity Awareness Month, October 2020. | Learn more here.

Communicate, Communicate, Communicate

White Paper | Oct. 10, 2020

In this excerpt from his new book, Accelerating Leadership Development, Jocelyn Bérard, Vice President, Leadership and Business Solutions, Global Knowledge, examines the importance of communication in an organization and present practical concepts for leaders to apply easily.

You’ve Completed ITIL® Foundation: Now How to Implement It

White Paper | Nov. 30, 2016

ITIL implementation initiatives fail when all three enablers aren’t factored in: people, process, and technology. The most important enabler is people.

The Role of Critical Thinking in Problem Analysis

White Paper | Oct. 13, 2020

Learn how to develop a questioning outlook and quality standards that will help you make more effective decisions.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Free websites and apps track your personal data; find tips to protect yourself online.