Knowledge Network Tools Focus on Malware, Security

Patrick Avery

The following is a list of documents, tools and resources uploaded to the Knowledge Network during the week of Nov. 16 - 20.

 

"Practical Virtualization Solutions" Excerpt

This book is a complete, self-paced, hands-on guide to creating a virtualized environment and driving maximum value from it throughout its entire lifecycle. This chapter excerpt gives you a vendor-neutral, but technical overview of the types of virtualization available.

 

Definitions: SMBs

This definitions document looks at SMBs and some of the concerns of small and medium businesses.

 

ISO 9000 Implementation Tips and Techniques


This tip sheet, provided by The 9000 Store, gives readers tips and techniques, but also addresses common setbacks that might occur and how to avoid them.

 

"BlackBerry Development Fundamentals" Excerpt

This book is a single-source guide to all aspects of development for the BlackBerry platform. This chapter excerpt provides background information about the application data push capabilities provided by the BlackBerry platform.

 

Top 10 Sources of Firewall Blocks - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 countries with the highest daily averages of firewall blocks.

 

Top 10 Sources of Intrusions - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 countries with the highest daily averages of intrusions.

 

Top 10 Sources of Spam - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 countries with the highest daily averages of spam.

 

Top 10 Sources of Viruses - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 sources of viruses.

 

Top 10 Intrusions - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 sources of intrusions.

 

Top 10 Trojans - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 sources of trojans.

 

Top 10 Viruses - October 2009

This table is taken from Network Box's report on Globalization of Malware Production and lists 10 sources of viruses.

 

Definitions: Wireless Network Security

This definitions document addresses the terms and basics of securing a Wireless LAN.

 

BPM: "Band-Aids-Not a Cure for Corporate Ills"

This wiki is an excerpt from "The Insider's Guide to BPM: 7 Steps to Process Mastery," by Terry Schurter.

 

Malware Threats and Mitigation Strategies

The purpose of this guide is to inform organizations of this rapidly growing problem and provide best-practice defense tactics.

 

Change Control Plan Template

This template is what IT Business Edge uses to help guide the change-management process.



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.