dcsimg
 

IT Downloads Results for Topic : Infrastructure Management - Page 2

All
All
 
 
Showing 11-20 of 214 Results    
 
 
DataM5

Building the Agile Database

  ITDownload  
  |   BOOK EXCERPTS   |   Feb 04, 2015
 

This excerpt explains the importance of taking a business-focused, stakeholder-oriented view of application development, summarizes the economies of application development, and explains the importance of data to the enterprise.

...  More >>

 
DataCtr1

BIOS Protection Guidelines for Servers

  ITDownload  
  |   TUTORIALS   |   Oct 21, 2014
 

The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS code.

...  More >>

 
Misc43

Guidelines for Smart Grid Cybersecurity

  ITDownload  
  |   RESEARCH   |   Oct 06, 2014
 

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities.

...  More >>

 
Infrastructure

Buying, Supporting, Maintaining Software and Equipment

  ITDownload  
  |   BOOK EXCERPTS   |   Sep 09, 2014
 

This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial negotiation.

...  More >>

 
HealthCare01

Wi-Fi Enabled Healthcare

  ITDownload  
  |   BOOK EXCERPTS   |   May 27, 2014
 

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...  More >>

 
Security32

The Ghost in the Machine: Don’t Let It Haunt Your Software Performance Measurement

  ITDownload  
  |   TUTORIALS   |   May 19, 2014
 

This paper describes pitfalls, issues, and methodology for measuring software performance, and urges the reader to measure the right performance the right way.

...  More >>

 
Security3TN

Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

  ITDownload  
  |   TUTORIALS   |   Apr 30, 2014
 

Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across networks.

...  More >>

 
Security5TN

A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

  ITDownload  
  |   POLICIES   |   Mar 19, 2014
 

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.

...  More >>

 
ProjectMgmt2TN

Creative, Efficient, and Effective Project Management

  ITDownload  
  |   BOOK EXCERPTS   |   Mar 04, 2014
 

Chapter 7, excerpted here, focuses on creativity life cycle models. Contrary to popular belief, creativity requires having some type of discipline in place to allow it to be further exercised and result in something that is understandable and meaningful to others.

...  More >>

 
network02

Evolutionary Dynamics of Complex Communications Networks

  ITDownload  
  |   BOOK EXCERPTS   |   Feb 06, 2014
 

Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples.

...  More >>

 
 
 
Pages:   « Prev1 | 2 34Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.