Tài liệu miễn phí Công Nghệ Thông Tin
Download Tài liệu học tập miễn phí Công Nghệ Thông Tin:Tin học văn phòng, Đồ họa - Thiết kế - Flash, Quản trị Web, Cơ sở dữ liệu, Quản trị mạng, Kỹ thuật lập trình, Hệ điều hành, Phần cứng, An ninh - Bảo mật, Chứng chỉ quốc tế, Thủ thuật máy tính, Điện - Điện tử, Kinh tế học, Hoá học, Xã hội học, Môi trường
Critical thinking is the art of raising what is subconscious in our reasoning to the level of con-
scious recognition. It is the art of taking control of our thinking processes so as to understand
the pathway and inputs that our thinking employs.
Critical thinkers understand the mechanics of reasoning (thinking). They use this understand-
ing to manage the unconscious influences that contribute to their decision-making processes.
By taking charge of the thinking process, critical thinkers develop an understanding of what
they do not know about a particular subject, and make better decisions as a result....
8/29/2018 4:28:29 PM +00:00
CAPM®: Certified Associate Project Manager; certification offered by PMI; requires less experience than PMP®.
Capability: the functionality of the specified system.
Cause-and-effect diagram: combines brainstorming and concept mapping to identify and consider a range
of causes and impacts relative to a problem; also referred to as a fishbone diagram or an Ishikawa diagram.
8/29/2018 4:28:29 PM +00:00
Service-oriented architecture, or SOA, is a hot topic in business today. You may have read about service-oriented
architectures and are wondering how they can affect your business as well as how they can be of use to
you. By looking at it from both a real-world perspective as well as a technical perspective, you will forge a
solid understanding of service-oriented architecture from which you can jump off to implementing this technology
within your business.
8/29/2018 4:28:29 PM +00:00
The first thing most people hear about the CISSP examination is how difficult or unfair the questions are.
Although this may be a good warning, it does not begin to prepare you to do well on the exam itself. For some
of the CISSP exam questions, just knowing the facts is not enough. These questions are referred to as “hard
questions“. This paper examines seven types of hard questions you are likely to see on the CISSP examination
and the best approaches for solving them.
8/29/2018 4:28:29 PM +00:00
Are you looking for a quick and simple reference guide to help you navigate Red Hat® LinuxTM systems? Look no further. Global Knowledge and Red Hat have assembled a second set of Tips and Tricks written by Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems:
1. If a file has a link count greater than 1, is there a simpler way to find out what other file names are
hard-linked to it?
2. Which interface is eth0?
3. Quick-and-dirty automounts
4. How can I make dd give me a progress report?
5. Tar vs. Star—The battle of xattrs
6. New default...
8/29/2018 4:28:29 PM +00:00
Managing teams can be a challenge. When you try to manage teams across different geographical regions and perhaps time zones, you have a situation that can be difficult for even the best manager. Remote teams have become more common in the workplace. They satisfy the need for accessing specialized expertise at a cost savings. With advances in technology, there is now a broad array of communication methods
to enable remote teams to function more smoothly and cohesively.
8/29/2018 4:28:29 PM +00:00
Subnetting seems to be a battle of fighting bits, decimal numbers, and countless methods and processes to convert from one to the other. While the methods may be confusing, the mathematics behind them is the same for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions that you will find on the industry certification tests.
8/29/2018 4:28:29 PM +00:00
The protocol used on the Internet for reliable communication is the Transmission Control Protocol (TCP). In this paper, you will learn some of the essentials of TCP by looking at 10 of the top features that make it reliable. In-depth knowledge of protocols can help you in many ways. It enables more efficient troubleshooting. It allows you to understand how firewalls and routers limit the flow of dangerous information in and out of your
networks. Our discussion in this white paper is a good introduction, but it does not represent a full, detailed analysis of TCP....
8/29/2018 4:28:29 PM +00:00
Let’s consider a simple base 10 number, 1585. The number is structured in a very orderly way. To begin with,
note that the digits all come from the decimal symbol set (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) and that the symbol 5
appears twice in the number.
8/29/2018 4:28:29 PM +00:00
SIP’s popularity has grown enormously over the past few years. A big boost in support came in November
2000, with the acceptance of SIP by the 3rd Generation Partnership Project (3GPP). 3GPP is composed of standards
organizations in China, Europe, Japan, North America and South Korea, and is dedicated to the proliferation
of a third-generation wireless global standard. More specifically, this organization focuses on the development
of standards for the Universal Mobile Telecommunications System (UMTS). Furthermore, the 3GPP developed
the IMS (IP Multimedia Subsystem), which defines the way VoIP services will be implemented over
General Packet Radio Services (GPRS) and UMTS cellular networks....
8/29/2018 4:28:29 PM +00:00
Why have TV sitcoms used canned laugh tracks for years? Producers wouldn’t employ them unless they actually
are successful in eliciting audience laughter and, subsequently, higher ratings. Part of the reason you laugh
along anyway in spite of your annoyance lies in how you decide what is socially “correct” behavior. If you
don’t know exactly what to do, you rely on others around you (or the virtual TV audience) to help you find the
way to properly react. You think if others are engaging in a specific behavior, it must be the proper thing to do.
Hence, you laugh in spite of yourself, or if...
8/29/2018 4:28:29 PM +00:00
Gateway devices and Call Managers are not limited to geographical boundaries. A properly designed system
would easily provide the scalability, redundancy and fault tolerance that highly available networks require. The
unified communications approach relates very closely to the Internet model that the Department of Defense
designed. The Cisco Call Manager server clustering approach represents a highly available network model that
can meet disaster recovery requirements when aligned with the proper underlying quality of service (QoS)-
enabled infrastructure. QoS is the glue of the network that guarantees the quality level necessary for real-time
communications, such as voice and video....
8/29/2018 4:28:29 PM +00:00
SIP’s popularity has grown enormously over the past few years. A big boost in support came in November
2000, with the acceptance of SIP by the 3rd Generation Partnership Project (3GPP). 3GPP is composed of standards
organizations in China, Europe, Japan, North America and South Korea, and is dedicated to the proliferation
of a third-generation wireless global standard. More specifically, this organization focuses on the development
of standards for the Universal Mobile Telecommunications System (UMTS). Furthermore, the 3GPP developed
the IMS (IP Multimedia Subsystem), which defines the way VoIP services will be implemented over
General Packet Radio Services (GPRS) and UMTS cellular networks....
8/29/2018 4:28:29 PM +00:00
You just received another late evening page from the help desk. “I have a problem with my network access, it just doesn’t work!” What should you do next? Troubleshoot! Troubleshooting is a necessary part of supporting any network installation. Determining and repairing problems
can consume a lot of time, especially if you don’t know what to do or how to do it correctly and quickly. In this paper, I will explain how you might consider troubleshooting different problems that could exist in your network. These techniques can all be performed using some of the common tools available in modern operating systems....
8/29/2018 4:28:29 PM +00:00
In the history of Ethernet, the virtual LAN is a recent addition. The VLAN was introduced to solve a number of networking issues. In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used. You will also learn about the networking standards that address the VLAN implementation.
8/29/2018 4:28:29 PM +00:00
It seems we are always dragged kicking and screaming into the newest operating system, programs, or hardware systems. This case is no different. Office 2007 is quite an initial adjustment
and might scare many at their first encounter with the new interface. After using Office 2007 for the past year, there is nothing you could offer me to go back to the previous version. I hope to calm your fears, open new avenues, and even help you to have a smooth deployment.
8/29/2018 4:28:29 PM +00:00
It isn’t very often that we are fortunate enough to have free software that actually is useful. VM Systems and Microsoft both have free offerings in the virtual PC market. This paper will deal with one of Microsoft’s offerings, Virtual PC. This paper will give you a tour of the product, installation requirements, file structure, new enhancements, and possibilities. Only Virtual PC will be covered here. Virtual Server is another program made
for running server software and is quite different in its interface and scope. Look for a future paper on the Virtual Server product....
8/29/2018 4:28:29 PM +00:00
SharePoint is Microsoft’s document management technology, and has been in use under various product names for more than five years. Despite its longevity, many computer users are unaware of its existence and fewer still understand how the technology simplifies the network environment for end-users. But every organization that generates content can benefit from using SharePoint. Some smaller organizations will require only WSS 3.0, but most organizations will get maximum benefit by implementing MOSS 2007. Some examples of how existing organizations are using SharePoint include:...
8/29/2018 4:28:29 PM +00:00
PMI's guide to the project management body of knowledge (hereafter referred to as pmbok guide) provides an encyclopedic approach to best practice project management, serving as a critical reference in delivering seccessful projects. Due to its breadth of coverage, though, people who have studied the pmbok guide (including pmp's) are often unsure as to how to begin their projects, and how to structure them.
8/29/2018 4:28:29 PM +00:00
The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The
three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.
8/29/2018 4:28:29 PM +00:00
OpenSSH is an open-source implementation of the SSH (Secure SHell) protocols, originally developed in 1995 by Tatu Ylönen. SSH-based tools provide secure client/server connections and are usually designed to replace older remote-access tools like rsh and telnet. Unlike their predecessors, SSH-based tools encrypt their transmissions, making it difficult or impossible for intruders to “sniff” important information, such as passwords, from the data stream. SSH implementations exist for every major platform including Microsoft Windows. This paper will focus on the OpenSSH implementation....
8/29/2018 4:28:29 PM +00:00
The open source security position challenges the failing status quo. Increasing
security issues underline the fact that the proprietary hide-the-code approach is not
working.
8/29/2018 4:28:29 PM +00:00
Security is becoming more and more common in every environment, regardless how big or small the network happens to be. Anytime we think of security, the first thing that comes to our minds is the implementation of firewalls. What if firewalls are not available in your network? What if your firewalls are only meant for connectivity
from the outside world? Or, better yet, what if firewalls are controlled by different groups in your
organization, and you want to do something to protect your network internally between departments and/or maybe your budget doesn’t allow you to get firewalls. Can you get somewhat similar...
8/29/2018 4:28:29 PM +00:00
Every time we teach a class to get students started with Cisco and networking technologies, there are always some common things that bug and stop students from getting some basic topics.We, as instructors, are always asked if there is a basic to the basic course they are taking. That’s why we are putting this router training white paper out—to help students with some of those “basic of the basic concepts.” This paper won’t attempt to answer all your questions, but it will definitely help with some of those concepts to make your class experience
more enjoyable....
8/29/2018 4:28:29 PM +00:00
Subnetting is a complicated topic that has confused students for a very long time. However, subnetting is an important topic for many different certifications with various vendors, including Cisco. In the real world environment, people are used to just punching in the numbers in many of the free subnet calculators that are readily available on the internet. For exam purposes, you still have to do this in a very fast manner since many exams are time-based and you don’t have the luxury of spending those precious minutes on any single question. This whitepaper will solve some of those age-old and...
8/29/2018 4:28:29 PM +00:00
In every introductory class we teach we get students who are either puzzled about router essentials or switching essentials or both. This switching essentials white paper will give you the basics that will make learning about switching a little less painless when you sit in a course like ICND1, ICND2, CCNA Boot Camp or BCMSN.
Switching is an interesting topic. It could be an easy thing in your network, or it could be something that keeps you up nights. Switching can be simple, allowing us to connect our users from various systems (host systems and phones), or it can be a...
8/29/2018 4:28:29 PM +00:00
Can you remember the frustration you felt the last time you needed to work on a document but couldn’t connect to the network to use it? What about the last time you wanted to write an email or get some work done on the Internet, but you had to go to a different location where you could use a networked system? Multiply these problems and frustrations by every employee who has every experienced them and you will understand,
if you don’t already, why wireless networking is becoming a requirement in many offices....
8/29/2018 4:28:29 PM +00:00
Now that now that new Windows technology (in the dual garb of Windows Vista and the Windows 2008
Server) has arrived on the scene, many network planners are taking a closer look at some of the architectural changes that Microsoft has made to the Group Policy structure. The underlying concept of Group Policy hasn't changed – it's still fundamentally a Great Big Network Registry
Editor. Make a setting, and Group Policy enforces it for you from that point forward. (Of course, Group Policy goes beyond Registry settings to include a variety of security and software installation capabilities, too.)...
8/29/2018 4:28:29 PM +00:00
Back in the days of Windows 3.1, you could choose what Windows components you wanted to install. In fact, I remember doing the math at that time, and the number of possible component combinations was in the hundreds of thousands, if not more. If you didn't want a component, you could tell Windows that you didn't want it, and by George, you wouldn't get it.
8/29/2018 4:28:29 PM +00:00
When you take your first look at Windows Server 2008, you'll find that many of the traditional tools that graced Server 2003 are still around: the Computer Management console; the System Information utility; the Services console; and so forth. Administrative Tools are still in a Start menu folder named Administrative Tools, and you can start feeling fairly comfortable with the GUI if you have background with prior versions of Windows.
8/29/2018 4:28:29 PM +00:00