Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security...
Payroll: A Guide to Running an Efficient Department is a guide to improving the payroll department through increasing its efficiency and compliance. It combines the tasks the payroll department must do with the most efficient ways available to do them. With the demands made upon today’s payroll department—to ...
This book is the officially endorsed Sakai guide. From setting up and running Sakai for the first time to creatively using its tools, this book delivers everything you need to know.
Written by Alan Berg, Senior developer at the IC and a Sakai fellow and Michael Korcuska, the executive director of the Sakai Foundation, and with...
Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...
You're busy—very busy. You need reliable, practical answers to your IT questions, and you need them now. The Vest Pocket Guide to Information Technology, Second Edition is a handy pocket problem-solver designed to provide you with the quickest route to a solution. Practical, reader-friendly, and thoroughly...
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...
How to plan your future strategy for efficient, cost-saving data management
Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the...
Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2013 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.
The industry shift that is currently happening toward ‘the cloud’ is not just...
The Sarbanes-Oxley Act is unquestionably important to corporate America. It can also be complex and confusing, for everyone from the employees who must be doubly aware of what they can—and cannot—do to the officers who must take legal responsibility for the actions, errors, and omissions of those employees.
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...