Best It Documents Collection

Best It Documents Collection
The price must be from $0.00 to $1,000.00


1 - 1-4-2013 WeeklyTimesheet.xlsx 15.98
2 - 2000v2005.xls 70.00
3 - 2003_Tuning_Spreadsheet.xls 90.50
4 - 2010_Cisco Icons_7_6_10.ppt 2375.50
5 - 2kx_Active_Directory_Schema.xls 423.50
6 - 2k_Permissions.xls 42.00
7 - 33cd1bb6-1f7a-4e3b-a92b-0a9ccb21cda8.swf 347.75
8 - 3850_Configuration.vsd 663.50
9 - 501502std.pdf 520.94
10 - 5_Phase.gif 31.22
11 - 5_Phase.vsd 120.50
12 - 6-3-13-index.htm 118.65
13 - 802_1x_Overview.vsd 57.50
14 - 802_EAP.vsd 44.50
15 - 907_Job_Descriptions.xls 286.50
16 - AA-Fingerprints.doc 292.00
17 - about.pdf 855.66
18 - Access_Controls.zip 25.87
19 - Access_Controls_Testing_Overview.doc 64.50
20 - Access_Control_Models.vsd 55.00
21 - Access_Gateway_Operation.ppt 1238.00
22 - Access_to_the_Operations_Workstation.vsd 60.50
23 - Accounts_Payable_Research.zip 27.05
24 - Account_Management.zip 30.17
25 - Acquire_New_Customers.zip 31.15
26 - Active-20Directory-20PPT.html 6.07
27 - Active_Directory_Access_Token.vsd 74.00
28 - Active_Directory_Cook_book_Code.zip 101.88
29 - Active_Directory_PPT.html 6.67
30 - Active_Directory_Properties.zip 239.86
31 - Adobe_Eval.xls 24.00
32 - adServer.htm 0.00
33 - adServer_2.htm 0.00
34 - Advanced Active Directory Design and Troubleshooting.ppt 1706.50
35 - AD_Architecture.vsd 61.50
36 - AD_Baseline_Test_Cases.xls 80.00
37 - AD_Deployment_Project_Plan.mpp 188.00
38 - AD_IO_Steps.vsd 59.00
39 - AD_Suggestions.xls 41.50
40 - AD_Windows_GPO_Settings.xls 3095.50
41 - AFlow.jpg 30.14
42 - Agility_Flexibility.zip 28.61
43 - AIX53_Initial_OS_Values.xls 51.50
44 - AIX61_Initial_OS_Values.xlsx 19.31
45 - Alarm_Response_Review.doc 70.50
46 - Allscripts_Charge_Flows.vsd 65.50
47 - Allscripts_Document_Transcription_Flows.vsd 69.50
48 - Allscripts_Outbound_Order_Flows.vsd 70.50
49 - Allscripts_Part1.vsd 66.00
50 - Allscripts_Part2.vsd 65.50
51 - Allscripts_Part3.vsd 68.50
52 - Allscripts_Part4.vsd 70.50
53 - Allscripts_Part5.vsd 67.00
54 - Allscripts_Part6.vsd 75.00
55 - Allscripts_Part7.vsd 69.50
56 - Allscripts_Registration_Flows.vsd 66.00
57 - Allscripts_Results_Flows.vsd 68.50
58 - Allscripts_Voice_Flows.vsd 75.00
59 - Allscript_New_Order_Flows.vsd 67.00
60 - All_Mindmaps.zip 438.22
61 - All_MMAP.zip 1693.10
62 - All_PPTs.zip 68866.49
63 - Alternatives_for_Managed_Print_Services.doc 81.50
64 - Alternative_Desktop_Functional_Comparisons.xls 45.50
65 - Analysis_and_Process_Map.doc 105.50
66 - Anatomy_of_an_Attack.zip 29.13
67 - ANM_Ports_Reference.pdf 122.63
68 - Answer_Questions.vsd 62.00
69 - Anti-Virus_Security_Stnds.doc 153.00
70 - AppleTalk_Reference.doc 345.00
71 - Apple_iPhone_Shape.vsd 135.00
72 - Application_assessment.JPG 168.20
73 - Application_Delivery_Framework_SharePoint_Security.doc 95.00
74 - Application_Development_Maintenance_Policy.doc 34.50
75 - Application_Flow_Tracking.xls 57.50
76 - Application_for_Employment.doc 143.50
77 - Application_Inventory_Tracking_List.xls 46.50
78 - Application_JAVA_Standard.doc 74.50
79 - Application_Mapping_Tracking.xls 35.50
80 - Application_Project_Lifecycle.vsd 77.50
81 - Application_Services.zip 24.83
82 - Application_Transformation.vsd 59.00
83 - Approach.jpg 39.79
84 - App_Review_Proprietary_Third_Party.xls 51.00
85 - ARI.xls 3948.00
86 - Armoring_Solaris.doc 55.50
87 - Arrow_Symbols.ppt 3030.00
88 - ASP_Model.vsd 52.50
89 - Assessing_Network_Defense.ppt 202.50
90 - Assessing_Processes.ppt 283.00
91 - Assessment.jpg 412.53
92 - Asset_Procurement.vsd 60.00
93 - Assigning_Responsibility_for_Compliance.zip 30.09
94 - Assumptions_Dependencies_Tracking.xls 40.50
95 - Astaro_Competitive_Analysis.xls 378.50
96 - Attacker_Profile_Actions.zip 34.06
97 - AudioVideo_Connectors.zip 357.35
98 - Audit-Reports.jpg 338.22
99 - Audit-Worries.gif 45.40
100 - Auditing Microsoft Active Directory.ppt 1451.00
101 - Auditing_and_Account_Standards.doc 36.50
102 - Audit_BC_DR.xls 82.50
103 - Authentication Strategies.pdf 277.13
104 - Authentication.jpg 443.77
105 - Authorization_Consent_Form.doc 122.00
106 - Autocad_Print_Adobe.doc 272.50
107 - Autosys_Agent_Flows.vsd 148.50
108 - Autosys_High_Level_Communiucations.vsd 126.00
109 - Autosys_High_Level_Workflow.vsd 186.50
110 - Autosys_R113_5x.html 4.09
111 - Autosys_R113_6x.html 0.74
112 - AWC_files.zip 262.23
113 - A_Guide_to_Wireless.ppt 1688.00
114 - A_Process.vsd 54.50
115 - b7c8fc84-49d8-4836-9081-28fcb4dc1e1f.flv 6090.36
116 - BA.vsd 333.00
117 - Background_Check_Form.doc 66.50
118 - BackupRestoreModel.vsd 1222.50
119 - Backup_Recovery.jpg 82.06
120 - Balanced_Scorecard.ppt 162.00
121 - Balanced_Strategy_Drives_Growth.vsd 253.50
122 - Bandwidth_Delay_Estimates.xls 55.00
123 - Bandwidth_Time_Calculator.xls 59.00
124 - Banking_and_Lending_Standard_RFP.doc 866.50
125 - Banking_Organization.vsd 59.50
126 - Baseline_IT_Security_Policy.zip 25.03
127 - Baseline_IT_Security_Policy_2.zip 26.84
128 - Basics_SNMP.ppt 785.50
129 - Basic_Assessment_Questions.xls 62.50
130 - Basic_Template_Technical_RFI.doc 93.50
131 - Basic_Transaction_Flow.vsd 52.50
132 - BCP_For_Financial_Operations.ppt 706.50
133 - BCS 8100_InstallGuide.pdf 2622.99
134 - BCS Application Delivery Network.pdf 611.65
135 - BCS Authentication Workshop.pdf 4310.38
136 - BCS Enabling NTLM Authentication.pdf 849.52
137 - BCS Enhanced Authentication Use Cases.pdf 2816.23
138 - BCS Reverseproxy.pdf 87.91
139 - BCS_case_submission.doc.pdf 359.11
140 - Beginning_Unix_2005.pdf 8476.16
141 - Behavior_Based_Safety.ppt 349.50
142 - Behind_the_Numbers.ppt 366.00
143 - Benefits_Compensation_Orientation.vsd 67.00
144 - Benefits_of_Using_ASP_NET.zip 27.55
145 - Best_Practices_for_Adopting_SOA.ppt 1048.50
146 - BES_1.jpg 69.36
147 - BES_1.vsd 234.50
148 - BES_Flows.jpg 104.35
149 - bh-us-02-poynter-sso.ppt 519.50
150 - big-IP-Edge-Layered-Security-dg.pdf 341.19
151 - BIG-IP_Fail-Over_Scenarios.doc 65.50
152 - BIG-IP_LB.doc 74.00
153 - BIG-IP_Network_and_System_Management_Guide.pdf 5255.85
154 - BIGIP_Admin_Guide.pdf 2395.72
155 - BigIP_Pool_Options.doc 60.00
156 - Bioterrorism.ppt 35799.00
157 - BITS.vsd 48.50
158 - BlackBerry BES Training.ppt 3845.50
159 - BlackBerry_BES_Training.ppt 3845.50
160 - BlackBerry_Enterprise_Server.ppt 3845.50
161 - BlackBerry_Enterprise_Server_Administration_Guide.pdf 1945.75
162 - Bluecoat_SGOS_Cheat_Sheet_v5.doc 86.50
163 - BMC_Atrium_Orchestrator_7.5.02_Installation_Guide.pdf 762.36
164 - BMC_Atrium_Orchestrator_7_6_00_System_Administrator_Guide.pdf 1120.72
165 - BMC_Continuous_Compliance_for_Network_Automation_Implementation_Guide.pdf 2049.47
166 - BMC_Patrol_Oracle_Database_Monitoring.doc 157.00
167 - Bomb_Threats.ppt 473.50
168 - Boxes.ppt 1638.50
169 - bp.jpg 39.37
170 - Brief_ITIL_Domain_Descriptions.xls 291.50
171 - Brocade_VCS_Fabric_Technology_NAS_with_NFS_Validation_Test.pdf 5119.16
172 - BS7799.doc 94.00
173 - BS7799.xls 177.50
174 - BudgetTemplate.xlsx 19.93
175 - Bunch_of_Visio.zip 5664.04
176 - Business-Strategies.jpg 250.08
177 - Business_Applications.vsd 41.50
178 - Business_Architecture.ppt 1170.50
179 - Business_Continuity_Disaster_Recovery_Planning.ppt 626.50
180 - Business_Continuity_Planning_Results.vsd 46.50
181 - Business_Control_Framework_building_blocks.vsd 48.00
182 - Business_Drivers.xls 62.50
183 - Business_Form_Flows.vsd 61.00
184 - Business_Goals.vsd 55.50
185 - Business_Impact_Analysis.vsd 50.50
186 - Business_Intelligence.vsd 1209.50
187 - Business_Messages.ppt 484.50
188 - Business_Object_Products.doc 296.50
189 - Business_Planning.zip 31.10
190 - Business_Process_Redesign.ppt 496.50
191 - Business_Reference_Model_Sample_Descriptions.xls 126.50
192 - Business_Relationship_Strengths.zip 31.71
193 - Business_Vision_Strategy.vsd 60.50
194 - c.gif 0.04
195 - Cable_Connectors.pdf 158.07
196 - Cabling_Basics.pdf 268.17
197 - Cabling_Installation_Standards.doc 107.00
198 - Call_Center_Scenario.vsd 1645.00
199 - Capability.docx 253.06
200 - Capacity_Patient_Care_Coordination.vsd 90.00
201 - Capturing_Requirments.ppt 462.00
202 - Capturing_Requirments.pptx 33.40
203 - Cash_Asset_Management.zip 27.75
204 - Catalyst_6000_CFG_span_ports.pdf 112.71
205 - CA_Ports_1.xls 27.00
206 - CA_Ports_Internal.xls 44.00
207 - CA_UNI_TNG_Ports_2.xls 78.50
208 - CA_Workload_Automation.vsd 54.50
209 - CA_Workload_Automation_Administrators_Guide.pdf 883.92
210 - Centralized_Directory_Integration_Services_View.vsd 58.50
211 - CEO_Perspective.ppt 4304.00
212 - Certificate_LifeCycle_Management.vsd 62.50
213 - CFG_AUX_port_Modem.pdf 45.32
214 - CFO_Ranking.xls 21.50
215 - Change-Management.JPG 232.51
216 - Change_Workflow.vsd 99.50
217 - Checkpoint.vsd 68.00
218 - CheckPoint_CLI_Reference_Card.pdf 146.76
219 - Chemistry_Documents.html 11.84
220 - Circle.jpg 18.65
221 - Circles.ppt 1152.00
222 - Cisco_4948_ROMMon.doc 68.00
223 - Cisco_ACL_Basic_Syntax.vsd 55.50
224 - Cisco_IOS_Commands.doc 64.50
225 - Cisco_Patch_Serious_Critical_Details.xls 74.00
226 - Cisco_Rtr_Cfg_Cmds.doc 206.50
227 - Cisco_Secure_Central_Policy_Processing.vsd 652.50
228 - Cisco_Security_Reference.doc 141.50
229 - Cisco_Switch_Port_Mirroring_and_Port_Spannings.doc 218.00
230 - Cisco_WCCP.doc 86.50
231 - Cisco_WCCP.docx 29.40
232 - CISO_Security_Structure.vsd 73.00
233 - CitrixDynamicDeliveryCenterStencils.zip 7412.67
234 - CitrixMetaFrame.zip 727.57
235 - CitrixMetaFrameComponents.zip 402.24
236 - Citrix_Access_Gateway.ppt 10633.00
237 - Citrix_Access_Gateway_4-5_Advanced_Edition_-_Technical_Presentation__englisch_.pptx 2086.76
238 - Citrix_Netscaler.vsd 3201.50
239 - Citrix_Networking.zip 4893.21
240 - Citrix_NS_HA_XD_Drawings.vsd 6578.50
241 - Citrix_Overview.ppt 1774.00
242 - Citrix_Ports-Ranges.doc 169.50
243 - Citrix_Production_Support_Document.xls 35.00
244 - Citrix_Sample1.vsd 3239.50
245 - Citrix_Sample2.vsd 3264.00
246 - Citrix_Security_Considerations.ppt 1513.00
247 - Citrix_Thin_Client_Networks_Process_Example.vsd 650.00
248 - Citrix_Thin_Networks_Process_Example.vsd 650.00
249 - Citrix_Virtual_Configuration.vsd 78.00
250 - Citrix_Visio_Templates.vsd 8575.50
251 - Citrix_XenServer.vsd 3521.50
252 - Clarity_Integration_Implementation_Questionnaire.doc 215.00
253 - Client_IP_Tracking.xls 32.00
254 - Clinical_Job_Desriptions_and_Permissions.xls 50.50
255 - Cloud_Summary.JPG 31.60
256 - CMMI.vsd 58.50
257 - CMS_InternetSite_FullPage.vsd 455.50
258 - CMS_OnlineNews_Full.vsd 391.50
259 - CoBIT.jpg 90.08
260 - COBIT.zip 1615.58
261 - COBIT_Asset_Security_Management.xls 86.00
262 - COBIT_COA.ppt 986.00
263 - COBIT_ISO17799_ITIL.ppt 1779.50
264 - COBIT_Network_Operating_System.xls 56.00
265 - COBIT_Security_Assets.xls 86.00
266 - Cobra_Procedures.vsd 73.00
267 - Collection_of_Data.zip 25.53
268 - Collect_Technology_Standards_Principles_Guidelines.xls 48.50
269 - Common_Business_Perspectives.vsd 47.50
270 - Common_Infrastructure.vsd 64.00
271 - Competitive_Firewall_Comparisons.xls 43.50
272 - Complete_Livelink_Research.xls 101.50
273 - Compliance_files.zip 2289.33
274 - Compliance_Issues_Tracking_Spreadsheet.xls 35.50
275 - Compliance_Issue_Tracking.xls 39.00
276 - Compliance_ppt1.zip 5300.47
277 - Compliance_ppt2.zip 3716.26
278 - Compliance_ppt3.zip 7502.32
279 - Computers_101.html 2.75
280 - Computer_Security_Policy.zip 29.29
281 - Computer_Security_Policy_2.zip 30.04
282 - Computer_Training.html 2.31
283 - Configuration_Guide_for_BIG-IP_Application_Security_Management.pdf 2773.21
284 - Configuring_Span_Ports.pdf 113.53
285 - consider-develop-it-disposal-policy-wp_225015.pdf 313.41
286 - Consideration_SDLC_Programming.vsd 54.50
287 - Content_Management_Rules.xls 24.00
288 - Cookies.xls 18.50
289 - Cool_Sample_Shapes.vsd 85.50
290 - Cordless_Communications_Testing.doc 54.00
291 - Corelating_Interface_Indexes_Interface_Names.doc 188.50
292 - Core_Directory_ Service_Agent.zip 26.23
293 - Core_Template_Blade_Configuration.vsd 59.00
294 - Corporate_Giving_Guideline.doc 69.00
295 - Corporate_Pandemic_Virus_Emergency_Response_Plan.doc 502.50
296 - Corporate_Physical_Security_Policy.doc 62.50
297 - Corporate_Purchase_Process.vsd 115.00
298 - Correlating_Interface_Indexes_Interface_Names.doc 72.00
299 - Correlating_Interface_Indexes_Interface_Names.doc.doc 72.00
300 - Cost_of_doing_nothing.jpg 41.96
301 - Cost_Research_PKI-Two_Factor_Authentication.xls 57.00
302 - CPE_Order_Entry.vsd 155.50
303 - CPU_Scheduling.ppt 2646.50
304 - CP_Flow.vsd 71.00
305 - Crisis_Management_Teams.vsd 61.50
306 - Critical_Skills_Assessment.doc 154.50
307 - Cross-Sell - Up-Sell.zip 31.40
308 - Cross_Sell_Up_Sell.zip 31.40
309 - Customers_CRM.vsd 43.50
310 - Customer_Evaluation_Form.doc 52.50
311 - Customer_Relationship_Management.ppt 415.50
312 - Customer_Relationship_Management.zip 27.52
313 - Customer_Service_Flow.vsd 72.00
314 - Customizing_SGS_Messages.doc 73.50
315 - Cyclades_ACS_Appliance.doc 877.50
316 - Cycle_Assessment_Activities.vsd 53.00
317 - DAFs_Client_Server.vsd 77.00
318 - Data-Center.jpg 166.57
319 - Data-Overview.JPG 353.95
320 - DataCenter_LAN_Subnets.xls 36.00
321 - DataCenter_Migration_Project_Team.vsd 78.50
322 - Datafort_E-Series_Admin_Guide_4.0.pdf 1306.11
323 - Data_Classificatio.doc 106.50
324 - Data_Classification.doc 106.50
325 - Data_Classification_Matrix.doc 98.50
326 - Data_Demographic_Deliverable.zip 25.32
327 - Data_Demographic_Deliverables.zip 27.36
328 - Data_Flow_Diagramming.zip 1039.94
329 - Data_ILM.zip 27.29
330 - Data_ILM_2.zip 28.73
331 - Data_Management_Overview.vsd 54.00
332 - Data_Metrics.bmp 916.07
333 - Data_Metrics.JPG 41.71
334 - Data_Reference_Model_Sample_Descriptions.xls 56.50
335 - Data_Spectrum.zip 26.89
336 - DDA.jpg 327.67
337 - DDoS.ppt 1049.50
338 - DDoS2.ppt 2205.50
339 - debug_ip_http.xls 55.50
340 - Decimal_to_Binary.doc 354.50
341 - Decision_Criteria_Illustration.vsd 58.00
342 - Decision_Tree.vsd 51.50
343 - Defense_In_Depth.doc 137.50
344 - Defining_Security_Requirements.vsd 48.00
345 - Delivering the Windows Server 2003 Security Guide.pdf 180.82
346 - Demand_Supply_Management.zip 30.35
347 - Dental_Digital_X-Ray.doc 395.50
348 - Dental_Imaging_Software_and_Databases.doc 211.00
349 - Dental_Office_Overview.doc 3096.50
350 - Dental_Vendors_and_Insurance_Companies.doc 3976.50
351 - Deploying_Office12_Server_Core_Flowchart.vsd 154.00
352 - Designing for Pervasive Network Security.ppt 309.00
353 - Design_Process_Template.vsd 174.00
354 - Desktop_Virtualization.doc 261.00
355 - Determining_Cost_of_Print_Device.doc 58.00
356 - Developing_Effective_Quality_ITSM_Solutions.vsd 516.50
357 - Developing_the_HIPAA_plan.ppt 518.00
358 - Develop_Digital_Rights_Management_Solution_Project_Summary.doc 886.00
359 - DHCP Server.zip 29.66
360 - Diagram_Types.zip 25.63
361 - DICOM_ISO_Mapping.vsd 56.50
362 - Digital_Asset_Service_Domains.xls 47.00
363 - Digital_Certificate_Tracking.xls 42.00
364 - Digital_Dentistry_Business_Drivers.doc 1582.00
365 - Digital_Forensics_Slides.pdf 322.75
366 - Digital_Imaging_Communication_in_Medicine_DICOM.vsd 60.00
367 - Directory.doc 112.00
368 - Directory_Search_Batch.EXE 1.20
369 - Disaster_Recovery_Issue_Tracking_Sample.xls 36.00
370 - Disaster_Recovery_Planing_Requirements.xls 30.50
371 - Disk_Layout.gif 56.09
372 - Disk_Storage.xls 47.50
373 - Disk_Subsystem.vsd 147.00
374 - Distribution_Network_Fireproof_Internet.vsd 473.50
375 - DLP_Security_Enterprise_Roadmap_Proposal.doc 95.50
376 - DMZ_PCI_Scope.doc 97.50
377 - DMZ_Sharepoint.vsd 116.00
378 - DNS_Hostname_Resolution_Order.zip 27.91
379 - DNS_Large_Corporate_Profile.vsd 68.00
380 - DNS_Security_Standard.doc 67.50
381 - Documentum.vsd 272.50
382 - Document_Flow_Diagram.ppt 543.50
383 - Document_LifeCycle_Management.ppt 815.00
384 - Document_Management_Selection.xls 41.00
385 - Dodaf_Zachman.xls 51.00
386 - Domain_Controller_Locator_Service.vsd 58.50
387 - Done.html 0.73
388 - Drill_Down_SharePoint.vsd 81.50
389 - Driving_The_IT_Processes.ppt 244.00
390 - DRM_ Statement_of_Work.doc 217.50
391 - DRM_Magic_Quadrant_2007.pdf 97.94
392 - DRM_Vendor_Research.xls 90.50
393 - DSL_Connectivity.vsd 59.50
394 - e-Mail_Flow.vsd 74.00
395 - ECM 4.x AD Test Cases.doc 28.50
396 - ECM_Active_Directed_QA_Test_Plan.doc 200.00
397 - ECM_DocumentManagement.vsd 1651.50
398 - ECM_Documentum_Evaluation_Summary.doc 99.00
399 - ECM_Research.xls 41.50
400 - Education_Bindview.mpp 318.50
401 - Effective_Communications.zip 71.43
402 - Effective_Meetings.zip 214.48
403 - Efficient_Deployment_of_Oracle_RAC_in_a_Virtual_Environment.pdf 2180.96
404 - eHealth_Overview.vsd 84.50
405 - Electronic Nurse Documentation System.doc 262.00
406 - Electronic_Evidence.ppt 173.00
407 - Electronic_Media_Disposal_Policy.doc 62.50
408 - Electronic_Medical_Record_Glossary.doc 82.50
409 - Electronic_Nurse_Documentation_System.doc 262.00
410 - Email_Encryption.doc 992.50
411 - Email_Encryption_Standard.doc 151.50
412 - eMail_Information_Security_Policy.doc 70.50
413 - EMC _IRM.pptx 651.93
414 - EMC_Evaluation_Summary.doc 159.00
415 - EMC_IRM_Architecture.ppt 1677.00
416 - EMC_Smarts_IP7x_Patch17_Certification_Matrix.xls 4202.50
417 - Employeer_Evaluation.doc 84.50
418 - Employee_Asset_Recovery.vsd 49.00
419 - Employee_Benefits_Orientation_Process.vsd 55.50
420 - Employee_Educational_Assistance_Program.doc 61.50
421 - Employee_Eval_Form.doc 106.00
422 - Employee_Handbook.doc 82.00
423 - Employee_Handbook_Sample.mpp 182.50
424 - Employee_Over-time_Labor.vsd 72.00
425 - Employee_Physical_Relocation_Checklist.xls 41.50
426 - Employee_Referrals.vsd 60.00
427 - Employee_Relocation.doc 63.50
428 - Employee_Separation.vsd 65.50
429 - Employee_Terminating_Processed.doc 71.50
430 - Employee_Termination_Process.vsd 66.00
431 - Employee_Time_and_Expense_Tracking.xls 63.00
432 - Encryption_Considerations.xls 39.50
433 - Encryption_Matrix.doc 117.50
434 - Engineering_Checklist.doc 276.00
435 - Engineering_Essential_Characteristics.ppt 492.50
436 - Enterprise_Application_Development_Architecture_Standard.doc 77.00
437 - Enterprise_Architecture.vsd 51.00
438 - Enterprise_Businesss_Objectives.vsd 75.50
439 - Enterprise_Catalogue_Technical_Service_Template.xls 108.00
440 - Enterprise_Content_Management.vsd 1818.00
441 - Enterprise_Data_Strategy.ppt 1337.50
442 - Enterprise_Design_Distributed_Architecture_Site_Topology_Tracking.xls 45.50
443 - Enterprise_Directory_Service_Analysis_Considerations.doc 83.00
444 - Enterprise_Infrastructure.ppt 1368.00
445 - Enterprise_IT_Management_Functions.vsd 108.50
446 - Enterprise_Manager_Grid_Control_Server.doc 124.00
447 - Enterprise_Metadirectory_RFI_Solution_Analysis.doc 113.00
448 - Enterprise_Organizational_Model.vsd 48.50
449 - Enterprise_Policies_Standards_Tracking.xls 24.50
450 - Enterprise_Risk_Tracking_and_management.xls 22.50
451 - Enterprise_Storage_Stencils.zip 10551.64
452 - Enterprise_Transition_Strategy_Information_Model.vsd 64.50
453 - Enterprise_Web_Service_Recommendations.doc 273.50
454 - Environment_Review_Considerations.doc 73.50
455 - EPICore.jpg 103.50
456 - Epicor_Vantage_Application_Project_Lifecycle.vsd 77.50
457 - eProvisioning _POC_Use_Cases.doc 143.00
458 - Equipment_Systems_Business_Requirements.zip 29.28
459 - Equities_Research.vsd 478.50
460 - ERP_Epicor_Strategic_High_Level_Roadmap.vsd 70.00
461 - ERP_Portal_Flows.vsd 241.00
462 - ERP_Servivce_Portal.vsd 219.00
463 - Establishing_Service_Desk.ppt 520.00
464 - EstimatedInternetUsers00-09.xls 130.00
465 - Evolution_of_IT_Management.vsd 185.00
466 - eXactACCESS 0207.pdf 462.44
467 - Exchange1.zip 1775.46
468 - Exchange2.zip 1506.70
469 - Exchange3.zip 2842.44
470 - Exchange_Debug_Maintenance.zip 30.19
471 - Exchange_Roles_and_Permissions.vsd 57.50
472 - Executive_Management.zip 30.03
473 - Expenses.xls 63.50
474 - External_Assessment_Methodology.doc 137.00
475 - External_Seminar_Approvals.vsd 68.50
476 - External_Seminar_Approval_Process.vsd 64.00
477 - External_Unix_Security.doc 186.00
478 - External_Vulnerability_Assessment.doc 79.00
479 - Extranet_Incident_Management_Flow.vsd 71.00
480 - Ex_hsdic_msp.mpp 170.00
481 - Ex_sdic_msp.mpp 156.00
482 - F5_LoadBalancing_Flows.vsd 564.00
483 - F5_Load_Balancer_Application_Flow_Tracking.xls 62.50
484 - Facilities_Services_Building_Standard.doc 96.50
485 - Fair_Credit_Reporting_Act _FCRA.doc 90.00
486 - FAT_Windows_File_System.doc 208.50
487 - FileNet.vsd 48.00
488 - Filenet_Content_Engine.vsd 121.50
489 - FileSystem Hierarchy Standard.pdf 97.67
490 - File_System_Guide_UNIX_File_System.doc 230.00
491 - Finance_Administration.zip 28.14
492 - Financial_Roles_Permissions_Worksheet.xls 179.50
493 - Finished_Goods.zip 30.10
494 - FIPS199_System_Security_Plan_Template.doc 94.50
495 - FIPS_140_2_Cryptographic_Validation.ppt 644.00
496 - Fireproof_Internet_DMZ.vsd 463.50
497 - Firewall Basics 1.ppt 586.50
498 - Firewall Basics 2.ppt 262.00
499 - Firewall-edge.jpg 223.29
500 - Firewalls.doc 85.50
501 - Firewalls.xls 187.00
502 - Firewall_Basics.ppt 245.50
503 - Firewall_Confguration_Rules.ppt 1293.50
504 - Firewall_Integration.ppt 1004.00
505 - Firewall_Log_Management.xls 44.50
506 - Firewall_Management_and_Troubleshooting.ppt 578.00
507 - Firewall_Network_Sample.vsd 482.00
508 - Firewall_Planning.vsd 51.50
509 - Firewall_Request_Form.xls 41.50
510 - Firewall_Rule_Base_Best_Practices.doc 123.50
511 - Firewall_VLAN_Flows_1.vsd 554.00
512 - Firewall_VLAN_Flows_2.vsd 804.00
513 - Firewall_VPN_Standards.doc 85.00
514 - Firewall_Websense_System_Components.vsd 188.00
515 - FISMA.jpg 55.92
516 - FISMA.ppt 561.00
517 - FISMA_Risk_Management_Framework.vsd 52.00
518 - folder.jpg 26.03
519 - Fonts.zip 16108.92
520 - Forensics_database.zip 123.76
521 - Forensic_Techniques_Investigating_Network_Traffic.ppt 530.00
522 - Foundstone_Dashboard_1of5.vsd 55.50
523 - Four_factors_Critical_to_Successful_IT_project.zip 25.48
524 - Framework.jpg 97.94
525 - Framework.vsd 48.00
526 - Free_Sample_Document_Templates.zip 602.03
527 - FSMO_Operations_Master.zip 25.17
528 - FSMO_Operations_Master_2.zip 26.59
529 - Gartner - Burton - Forrestor.zip 1550.78
530 - Gartner_Identity_and_Access_Management.html 0.84
531 - General_Governance_View.vsd 46.50
532 - General_XP_Troubleshooting_Advice.doc 316.00
533 - Generic_Authentication_Standard.doc 77.00
534 - Generic_Vision_Health_Care_Delivery_System.vsd 59.50
535 - Gen_Auth.GIF 33.10
536 - Geoffs_Citrix_AS4_Shapes.zip 367.35
537 - GEO_Science_Dependencies_Standards_Interoperability.gif 48.36
538 - GEO_Standards.vsd 61.50
539 - Gold_Image_Standard.doc 63.50
540 - Good_Products_Arent_Enough.ppt 220.00
541 - Group_Policy_Object_Settings.xls 140.50
542 - Guide_to_Wireless_Communications.ppt 1566.00
543 - Hadrian.xlsx 20.20
544 - Handy_Cisco_Commands.doc 215.50
545 - Hardening Solaris.pdf 80.08
546 - Hardware_Asset_Financial_Information_Overview.vsd 70.00
547 - Hardware_Staging_Checklist.doc 245.50
548 - Hardware_vs_Software_RAID.pdf 40.17
549 - Harvest_and_Service Desk_Integration_with_Clarity.xls 51.50
550 - Harvest_Service_Desk_Integration_with_Clarity.doc 216.00
551 - Healthcare_Conceptual_Model.vsd 197.50
552 - Healthcare_Imaging_IT_Market.vsd 56.00
553 - Healthcare_Industry_Segmentation_and_Overview.xls 69.00
554 - Healthcare_Provider_Drivers.doc 120.00
555 - Healthcare_Provider_Organization.xls 75.00
556 - Health_Careers_and_Occupations.doc 75.50
557 - Health_Care_Information.vsd 49.50
558 - Health_Fair.vsd 57.00
559 - Help-Desk-v1.jpg 136.64
560 - Help.pdf 135.29
561 - Help_Desk_Catalogue.xls 45.00
562 - Help_Desk_Reports_Suggested_Product_Features.doc 54.00
563 - HI-TRUST-2010.ppt 2787.50
564 - HIE.vsd 69.00
565 - HIE_Authentication_Services_Framework.vsd 45.00
566 - High_Level_Business_Objectives.vsd 51.00
567 - High_Level_Comparison_EHR_HIT_Healthcare.vsd 58.00
568 - High_Level_Firewal_Policy.doc 70.50
569 - High_Level_JBOD.vsd 69.00
570 - High_Level_SAP_Overview.vsd 70.00
571 - High_Level_SBOD.vsd 59.00
572 - HIPAA Tech Safeguards.pdf 277.26
573 - HIPAASec&BreachCrosswalkFINAL.xls 297.50
574 - HIPAA_Administrative_Specification.ppt 2119.00
575 - HIPAA_Compliances.zip 6140.02
576 - HIPAA_Directory_Services_RFP_Requirements.xls 74.50
577 - HIPAA_Health_Fair.vsd 57.00
578 - HIPAA_Pharmacy.vsd 196.00
579 - HIRS_to_UserID_Creation_Process.vsd 54.00
580 - HITECH_HITRUST_HIPAA.doc 94.50
581 - HITRUST_eHealth_Overview.vsd 52.50
582 - HITRUST_HIE_Managed_Services.vsd 53.50
583 - HITRUST_HIE_Single_Sign_On_Spectrum.vsd 73.50
584 - HITRUST_HIPAA_Artifacts.vsd 82.50
585 - HITRUST_HIPAA_Collaboration_Services.vsd 70.50
586 - HITRUST_Maturity.xls 45.50
587 - HITRUST_Meaningful_Use.vsd 47.50
588 - HL7 ccow 2001.ppt 994.00
589 - HL_Checkpoint.vsd 56.50
590 - HL_Firewall_Flow_1.vsd 55.50
591 - HL_Integration_Framework.vsd 223.00
592 - HL_ITIL_SLM.vsd 49.00
593 - HL_LiveLink.vsd 56.00
594 - HL_PCI_Domains.zip 27.38
595 - Holding_Business_Meetings.vsd 70.50
596 - Home_Theater_Calculator.xls 81.00
597 - Host_Monitor_Application_Design.vsd 56.00
598 - How_Does_Email_Flow.doc 444.50
599 - How_to_detect_proxy_server_automatically.doc 351.50
600 - How_to_Secure_Solaris_FAQ.doc 107.50
601 - HPUX_baseline_Build.doc 87.50
602 - HP_Business_Availability_Center.pdf 3499.95
603 - HP_Business_Process_Monitor_Administration.pdf 1360.20
604 - HP_Converged_Infrastructure.ppt 8699.00
605 - HP_Database_Guide.pdf 1515.44
606 - HP_Hardening_Guide.pdf 963.64
607 - HP_Openview.ppt 165.50
608 - HP_Site_Scope_Deployment.pdf 3869.62
609 - HP_System_Insight_Port_Usage.doc 278.50
610 - HP_UX_Operating_System_Security_Standard.doc 133.50
611 - HR_Employee_Counseling_Form.doc 85.00
612 - HR_Employee_Filling_Process.vsd 57.00
613 - HR_Investigations.vsd 74.00
614 - HR_New_Hire_Orientation.vsd 76.00
615 - HR_New_Hire_Paperwork.vsd 54.00
616 - HR_Processes.vsd 131.50
617 - HR_Self_Evaluation.doc 67.00
618 - HR_Supervisor_Feedback.doc 133.00
619 - HR_Total_Compensation_Statement.vsd 59.00
620 - HR_Tuition_Assistance.vsd 68.00
621 - HTTP_status_codes.doc 56.50
622 - Human_Resources.zip 27.14
623 - Human_Resources_Business_Requriements.zip 33.17
624 - Human_Resources_Environmental_Assessment_Review.doc 73.00
625 - IAM_Slide.ppt 234.00
626 - IBM_FileNet_Evaluation_Summary.doc 97.00
627 - IBM_Guardium_Inventory.xls 43.00
628 - ICA_Debugging.doc 61.50
629 - Identifying_Worst_Information_Technology_Practices.ppt 341.50
630 - IdentityMinder.JPG 36.20
631 - Identity_Access_Management_Timeline.vsd 297.00
632 - IdM_Template.JPG 27.17
633 - IDS-Services.jpg 167.37
634 - IDS_Planning.vsd 51.00
635 - ID_Role_Flow.vsd 72.50
636 - IE7_Security_Settings.xls 36.50
637 - IE8_Security_Settings.xls 36.50
638 - IEEE829.pdf 585.95
639 - IIS6_Web_Services.ppt 1942.50
640 - IIS_Apache_SiteMinder_Policy_Architecture.vsd 56.00
641 - IIS_Security_Standards.doc 80.00
642 - ILM.vsd 51.00
643 - Imperva.html 1.08
644 - Imperva_Database_Security.ppt 1448.00
645 - Imperva_SecureSphere_IDC.ppt 1344.00
646 - Implementing ACLs in Linux.ppt 161.50
647 - Improvement_model.xls 44.00
648 - Incident-Response.JPG 284.82
649 - Incident_Handling_Procedures.doc 85.00
650 - Incident_Management.xls 38.50
651 - Incident_Managmenet_Project_Tracking.xls 38.50
652 - Incident_Response.zip 472.41
653 - Incident_Response_Slide.ppt 672.50
654 - Incident_Threat_Map.zip 29.78
655 - Industry_Specific.zip 30.19
656 - Information_Process_Improvement.vsd 52.50
657 - Information_Rights_Management.ppt 2731.50
658 - Information_Rights_Management_Product_Considerations.doc 218.50
659 - Information_Security_Encryption_Standard.doc 76.50
660 - Information_Security_Threat_Assessment.ppt 322.00
661 - Information_System_Security_Plan_Steps.ppt 370.00
662 - Info_ISO IEC9798-5.pdf 139.09
663 - Infrastructure Planning and Design - Windows Deployment Services version 2.1.docx 398.36
664 - Infrastructure_and_Applications.zip 30.53
665 - Infrastructure_Information_Systems_Planning.doc 73.00
666 - Infrastructure_Network_Support.doc 77.00
667 - Infrastructure_Vendor_Relationships.doc 79.00
668 - Ingrian_Security_Configuration_Guide.doc 434.50
669 - Inside_Active_Directory_Samples.zip 72.99
670 - Inside_Out.vsd 48.50
671 - Installing_Citrix_Secure_Gateway.ppt 1614.50
672 - Installing_Microsoft_Windows_200x_Server.vsd 100.00
673 - Install_IP_KVM_Software.doc 63.50
674 - Install_Solaris_Install.doc 69.50
675 - Instrument_Flow_Through_OR.vsd 112.50
676 - Integrated_Planning_Execution.vsd 49.50
677 - Integrated_Services_Management.zip 27.52
678 - Integrating_Troubleshooting_Citrix_Access_Gateway.ppt 1699.00
679 - Internal_IRST.zip 29.03
680 - Internal_Security_Assessment_Methodology.doc 107.00
681 - Internal_Vulnerability_Assessment_Penetration_Test.doc 102.50
682 - Internet_Catalogue.xls 41.50
683 - Internet_Firewall_Policy.doc 109.50
684 - Internet_Marketing_Readiness.xls 64.50
685 - Introduction_to_BSi.ppt 526.00
686 - Introduction_to_Security_Assessments.ppt 364.50
687 - Intro_ITIL.vsd 517.00
688 - Intro_to_Network_Security_Firewalls.doc 159.00
689 - Inventory_Assessment_Process.vsd 69.00
690 - Inventory_Matrix_Personal_Health_Records.xls 197.50
691 - Investigations.JPG 125.49
692 - Iomega.vss 864.00
693 - IPChains.vsd 55.50
694 - IPC_What_is_Inter_Process_Communications.doc 156.50
695 - IPD - Active Directory Certificate Services diagram version 1.1.vsd 326.50
696 - IPD - Active Directory Certificate Services version 1.1.docx 391.34
697 - IPD - Active Directory Certificate Services version 1.1.pptx 1501.45
698 - IPD - Active Directory Domain Services version 2.2.docx 800.40
699 - IPD - Active Directory Domain Services version 2.2.pptx 1558.69
700 - IPD - DirectAccess diagram version 1.3.vsd 388.00
701 - IPD - DirectAccess version 1.3.docx 388.62
702 - IPD - DirectAccess version 1.3.pptx 1559.40
703 - IPD - Dynamic Datacenter diagrams version 1.2.vsd 1030.00
704 - IPD - Dynamic Datacenter version 1.2.docx 1097.34
705 - IPD - Dynamic Datacenter version 1.2.pptx 1539.43
706 - IPD - Exchange Online - Evaluating Software-plus-Services Tally Sheet.xlsx 13.18
707 - IPD - Exchange Online - Evaluating Software-plus-Services version 1.6.docx 273.15
708 - IPD - Exchange Online - Evaluating Software-plus-Services version 1.6.pptx 1497.57
709 - IPD - Exchange Server 2010 version 1.1 diagrams.vsd 643.50
710 - IPD - Exchange Server 2010 version 1.1.docx 1250.88
711 - IPD - Exchange Server 2010 version 1.1.pptx 1731.42
712 - IPD - File Services version 2.1.docx 305.72
713 - IPD - File Services version 2.1.pptx 1463.37
714 - IPD - Forefront Identity Manager diagram version 1.1.vsd 172.00
715 - IPD - Forefront Identity Manager version 1.1.docx 486.62
716 - IPD - Forefront Identity Manager version 1.1.pptx 1557.58
717 - IPD - Forefront Unified Access Gateway diagram version 1.1.vsd 255.50
718 - IPD - Forefront Unified Access Gateway version 1.1.docx 378.38
719 - IPD - Forefront Unified Access Gateway version 1.1.pptx 1512.74
720 - IPD - Internet Information Services version 2.2.docx 242.66
721 - IPD - Internet Information Services version 2.2.pptx 1362.13
722 - IPD - Malware Response version 1.1.docx 623.60
723 - IPD - Malware Response version 1.1.pptx 1875.73
724 - IPD - MED-V diagram version 1.2.vsd 304.00
725 - IPD - MED-V version 1.2.docx 427.25
726 - IPD - MED-V version 1.2.pptx 1588.63
727 - IPD - Microsoft Application Virtualization 4.6 diagram version 2.1.vsd 1086.00
728 - IPD - Microsoft Application Virtualization 4.6 version 2.1.docx 551.46
729 - IPD - Microsoft Application Virtualization 4.6 version 2.1.pptx 1909.82
730 - IPD - Print Services version 2.1.docx 244.23
731 - IPD - Print Services version 2.1.pptx 1443.62
732 - IPD - Remote Desktop Services version 2.2 diagram.vsd 569.50
733 - IPD - Remote Desktop Services version 2.2.docx 586.52
734 - IPD - Remote Desktop Services version 2.2.pptx 1633.65
735 - IPD - Selecting the Right NAP Architecture diagram version 1.1.vsd 469.00
736 - IPD - Selecting the Right NAP Architecture version 1.1.docx 1216.88
737 - IPD - Selecting the Right NAP Architecture version 1.1.pptx 1678.49
738 - IPD - Selecting the Right Virtualization Technology version 2.3.docx 218.06
739 - IPD - Selecting the Right Virtualization Technology version 2.3.pptx 1410.40
740 - IPD - Series Introduction version 2.1.docx 180.12
741 - IPD - SharePoint Online - Evaluating Software-plus-Services Tally Sheet.xlsx 15.63
742 - IPD - SharePoint Online - Evaluating Software-plus-Services version 1.3.docx 464.64
743 - IPD - SharePoint Online - Evaluating Software-plus-Services version 1.3.pptx 2030.38
744 - IPD - SharePoint Server 2010 diagrams.vsd 576.00
745 - IPD - SharePoint Server 2010.docx 661.48
746 - IPD - SharePoint Server 2010.pptx 1483.77
747 - IPD - SQL Server diagram.vsd 197.00
748 - IPD - SQL Server.pptx 1672.87
749 - IPD - System Center Configuration Manager 2007 R3 and Forefront Endpoint Protection diagram version 2.0.vsd 198.00
750 - IPD - System Center Configuration Manager 2007 R3 and Forefront Endpoint Protection version 2.0.docx 469.36
751 - IPD - System Center Configuration Manager 2007 R3 and Forefront Endpoint Protection version 2.0.pptx 1552.76
752 - IPD - System Center Data Protection Manager 2007 diagram version 1.1.vsd 279.00
753 - IPD - System Center Data Protection Manager 2007 version 1.1.docx 653.87
754 - IPD - System Center Data Protection Manager 2007 version 1.1.pptx 1530.56
755 - IPD - System Center Operations Manager 2007 diagram version 2.1.vsd 601.00
756 - IPD - System Center Operations Manager 2007 version 2.1.docx 538.29
757 - IPD - System Center Operations Manager 2007 version 2.1.pptx 1679.70
758 - IPD - System Center Service Manager 2010 diagrams.vsd 1262.50
759 - IPD - System Center Service Manager 2010.docx 434.19
760 - IPD - System Center Service Manager 2010.pptx 1553.32
761 - IPD - System Center Virtual Machine Manager 2008 version 2.0 diagram.vsd 625.50
762 - IPD - System Center Virtual Machine Manager 2008 version 2.0.docx 497.33
763 - IPD - Terminal Services.docx 609.96
764 - IPD - Terminal Services.pptx 942.59
765 - IPD - Windows Deployment Services version 2.1.docx 398.36
766 - IPD - Windows Server Virtualization version 2.2 diagram.vsd 88.00
767 - IPD - Windows Server Virtualization version 2.2.docx 399.73
768 - IPD - Windows Server Virtualization version 2.2.pptx 1566.34
769 - IPD - Windows User State Virtualization.docx 443.45
770 - IPD - Windows User State Virtualization.pptx 1416.06
771 - IPFSScenario_CustomerInteractionForm_large_v02.vsd 860.00
772 - IPFSScenario_ExpenseReporting_large_v03.vsd 1594.50
773 - IPFSScenario_InsuranceClaimsProcessing_large_v03.vsd 1081.50
774 - IPFSScenario_Permits_large_v02.vsd 706.00
775 - IPFSScenario_Supplier_Survey_large.vsd 191.50
776 - IPSEC_flows.vsd 59.50
777 - Ipsilon_Routing_Deamon.pdf 719.43
778 - IP_Classes.xls 45.00
779 - IP_Filter_Configuration.xls 149.50
780 - IP_Filter_Flow.jpg 35.19
781 - IP_Route_Cheat_Sheet.xls 45.00
782 - IP_Stack_Detailed.gif 32.18
783 - Iris Recognition.pdf 344.76
784 - IRIS_Recognition.pdf 283.43
785 - ISO17799_Maturity.ppt 1321.00
786 - ISO9000_Project_Management_Approach.doc 108.00
787 - ISO_17799_Compliance_Coverage.ppt 66.00
788 - ISO_9000-2000_Details.vsd 54.50
789 - ISO_9001-2000_Document_Requirements.doc 243.00
790 - ISP_Data_Security_Guidelines.doc 81.00
791 - IS_Assessment_Charter.doc 120.50
792 - IS_HW_SW_guide.pdf 317.26
793 - IT Governance Model.ppt 291.50
794 - IT-Audit_Methodologies.ppt 471.00
795 - ITIL-101.jpg 202.48
796 - ITIL_4_Processes.vsd 91.00
797 - ITIL_COBIT_Global_Asset_Utilization_Linkages.vsd 58.00
798 - ITIL_CR_New_Project_Request.vsd 77.50
799 - ITIL_Driving_Processed.ppt 243.50
800 - ITIL_Enterprise_Change_Management_Process.mpp 157.00
801 - ITIL_Enterprise_Collaboration.vsd 109.00
802 - ITIL_FEA_DRM.vsd 58.00
803 - ITIL_Framework.vsd 69.50
804 - ITIL_Improvements.vsd 514.50
805 - ITIL_Inter_Relationships.vsd 278.00
806 - ITIL_ISO_200xx_Processes.vsd 310.50
807 - ITIL_IT_Requirements_Management.ppt 261.00
808 - ITIL_Operational_risk.zip 29.81
809 - ITIL_Operations.vsd 267.00
810 - ITIL_Overview.ppt 519.00
811 - ITIL_Path.vsd 514.00
812 - ITIL_Processes-Function.vsd 77.50
813 - ITIL_Processes.vsd 77.00
814 - ITIL_Processes_Function.vsd 77.00
815 - ITIL_Processes_Functions.vsd 77.00
816 - ITIL_Process_maturity.ppt 318.50
817 - ITIL_Process_Model_Sample.vsd 56.00
818 - ITIL_Production_Checklist.xls 44.50
819 - ITIL_Relationship.vsd 301.00
820 - ITIL_SDLC_Context.ppt 1142.50
821 - ITIL_SDLC_Framework.jpg 121.09
822 - ITIL_SDLC_Framework.vsd 60.00
823 - ITIL_SDLC_SOP_Workflow.vsd 63.50
824 - ITIL_Server_Application_Administration_CMAC.vsd 67.50
825 - ITIL_Service_Delivery.vsd 51.00
826 - ITIL_Service_Delivery_Grouped_Processes.vsd 298.50
827 - ITIL_Service_Delivery_Processes.vsd 298.00
828 - ITIL_Service_Design_Management_Processes.vsd 304.50
829 - ITIL_Service_Oriented_Architecture.vsd 55.50
830 - ITIL_Service_Project_Lifecycle_Flow.vsd 56.50
831 - ITIL_Service_Support_Processes_Functions.vsd 295.00
832 - ITIL_SLA_Based_Performance_Management.vsd 45.00
833 - ITIL_Solution_Design_Principles.vsd 50.00
834 - ITIL_The_Four_Ps.vsd 91.00
835 - ITIL_V3-CobiT_V4-2_Mapping.xls 251.50
836 - ITIL_Workflow.vsd 59.00
837 - IT_Architecture-v1.jpg 181.45
838 - IT_Business_Continuity_Planning.doc 71.00
839 - IT_Business_Coordination.zip 27.41
840 - IT_Business_Outline.JPG 78.69
841 - IT_Disaster_Recovery_Balances.vsd 55.50
842 - IT_Governance.zip 30.75
843 - IT_Hardware_Support_Policy.doc 64.50
844 - IT_Infrastructure_Questionnaire_Template.doc 121.00
845 - IT_Innovation_Framework.vsd 69.00
846 - IT_Operations_Support.html 0.56
847 - IT_Operations_Support_Policy.doc 72.50
848 - IT_Outsourcing.ppt 730.50
849 - IT_Outsourcing_Security_Policy.doc 55.50
850 - IT_Process_Automation.vsd 52.00
851 - IT_Product_Service_Innovation.zip 30.49
852 - IT_Project_Analysis.xls 18.50
853 - IT_Project_Meeting_Agenda_Minutes_Tracking.doc 141.50
854 - IT_Real_Estate_Infrastructure.zip 28.23
855 - IT_Remediation_Resolution_Template.doc 47.50
856 - IT_Requirements_Capture_Process.ppt 579.50
857 - IT_Requirements_Management.ppt 260.00
858 - IT_Security_Project_Tracking_Analysis.xls 36.50
859 - IT_Services_Side_by_Side.xls 70.00
860 - IT_Service_Analysis.xls 35.50
861 - IT_Service_Architecture.zip 84.63
862 - IT_Service_Continuity_Management.zip 31.41
863 - IT_Service_Continuity_Management_2.zip 32.83
864 - IT_Service_Continuity_Management_Spectrum.zip 35.42
865 - IT_Skills_Matrix.xls 69.00
866 - IT_Status_Amplification.doc 62.00
867 - IT_Support_Communications_Plan.xls 47.50
868 - IT_System_Inventory_Template.doc 176.50
869 - IT_Team_Services.vsd 57.50
870 - IT_Telecom_Networking.zip 30.26
871 - Java_Components.vsd 174.50
872 - Java_Virtual_Machine.vsd 50.50
873 - Job_Roles_SAP_Sample_output.xls 494.00
874 - Job_Search_Skill_Approach.ppt 535.00
875 - Job_Summary_Process.vsd 67.00
876 - Juniper_Patch_Sets.xls 27.50
877 - K2_Blackpearl.doc 594.00
878 - Kerberos_Authentication_Process.vsd 57.00
879 - Key_Management_Best_Practices_V20_Technical_Report.pdf 1706.24
880 - KMS_Flow.vsd 53.50
881 - Knot.JPG 43.90
882 - KVM_Console_Cable_Tracking.xls 36.00
883 - L-Directory.JPG 40.62
884 - L1_Visa_Process.vsd 65.50
885 - Labor_Category_Descriptions_Software_Development_Descriptions.doc 85.50
886 - Labor_Category_Engineering_Descriptions.doc 81.50
887 - Labor_Category_Help_Desk_Support_Descriptions.doc 76.00
888 - Labor_Category_Software_Development_Descriptions.doc 85.50
889 - Landesk_Port_Flows.jpg 100.58
890 - LAN_Network_Interactions.ppt 691.00
891 - LAN_Support_Standard_Desktop_Configuration.doc 119.50
892 - Layer_Structure_Unix_Stack.vsd 53.00
893 - LDAP Authentication flyer.pdf 154.87
894 - LDAP Implementation Cookbook.pdf 2471.91
895 - LDAP_Directory_Infomation_Tree_DIT.pdf 75.00
896 - Leadership.zip 509.44
897 - Learn.jpg 17.54
898 - Legacy_Blackberry_Comparisons.pdf 423.56
899 - Legacy_Comparison_Magnetic_Cartridge_Technologies.doc 120.50
900 - Legato_Networker_Requirements.xls 44.00
901 - Linux-Filesystem-Hierarchy.pdf 600.78
902 - Linux_Filesystem_Hierarchy.pdf 600.78
903 - Linux_Internals.pdf 1060.73
904 - Linux_Internals.ppt 253.50
905 - Liquid_Machines_Evaluation_Summary.doc 97.00
906 - Live Meeting LMSBS3.pdf 3045.55
907 - Livelink_Evaluation_Summary.doc 98.50
908 - Load_Balance_FailOver_Best_Practices.doc 86.00
909 - Load_Balancing.html 1.40
910 - Load_Balancing_IBM_WebSphere_Servers.pdf 1034.26
911 - Load_Balancing_Request_Form.xls 41.00
912 - Local_Machine_Site_Domain_Org_Unit.zip 28.19
913 - Local_Machine_Site_Domain_Org_Unit_2.zip 29.57
914 - Local_Proxy_Architecture.vsd 57.00
915 - Location_Review_Considerations.doc 72.00
916 - Logistics_Distribution.zip 31.68
917 - LogLogic_Project_Estimates.xls 73.00
918 - Logo.jpg 11.04
919 - Log_Analysis_RFP.doc 243.00
920 - Log_Analysis_to_LogLogic.doc 123.00
921 - Long_Links.doc 52.00
922 - LSASS.zip 26.97
923 - Mac OS X for Unix Geeks.pdf 3896.10
924 - Macintosh.zip 1171.21
925 - Mainframe_Architecture.vsd 47.50
926 - Mainframe_High_Level_Architecture.vsd 52.50
927 - Mainframe_Virtualization_Architecture.vsd 48.00
928 - Maintain_Data_Connections.vsd 195.00
929 - Managed_Service_Lifecycle_Process.vsd 53.00
930 - Manage_Meetings.zip 52.33
931 - Managing_Change.zip 685.39
932 - Managing_Monitoring_Troubleshooting_Exchange_Org.pdf 1493.76
933 - Mappings.pdf 121.58
934 - Marketing_Advertising.zip 33.89
935 - MasterCard_SiteData_Protection.ppt 740.00
936 - Master_Password_List.xls 734.50
937 - Master_Unix_Linus_Commands.xls 82.50
938 - Master_Unix_Linux_Commands.xls 82.50
939 - Master_VI_Commands.xls 50.50
940 - Materials_Management_Requirements.zip 31.36
941 - McAfee.html 4.52
942 - McAfee_ePO_Firewall_Architecture.vsd 219.50
943 - McAfee_Firewall.zip 3926.82
944 - Medical_Application_Software_Systems.xls 48.00
945 - Medical_Service_Tracking.xls 3889.00
946 - Meditech.html 1.36
947 - Meditech_Clinical_Application_Inventory_Tracking.xls 26.00
948 - Meditech_Enterprise_Directory_Application_Questionnaire.doc 165.00
949 - Methodology.JPG 359.09
950 - Metrics.gif 157.62
951 - Micosoft_Patchsets_Serious_Critical_Urgent_Details.xls 462.00
952 - Microsoft_SharePoint_Evaluation.doc 179.50
953 - Microsoft_Windows_Office2007_and_IE8-9_Compatability.xls 70.00
954 - Middleware_ID_Provisioning_Approval_Template.doc 92.00
955 - Mid_Range_Server_Tracking.xls 89.00
956 - Migration_Scenarios.vsd 214.50
957 - MIL-STD100_Sample.vsd 182.00
958 - Mindmap_of_Alevel_Physical_Chemistry.pdf 4601.95
959 - Miscellanious_Stencils_Borders.zip 4433.63
960 - MMC_Snapin.vsd 192.00
961 - MM_Examples.zip 493.81
962 - Mobile_Services_Update.mpp 465.50
963 - MOSS_Documents.zip 1365.86
964 - MPLS_Tiers.xls 73.00
965 - MSSP_Hardware_Asset_Tracking_Spectrum.vsd 74.00
966 - MSS_IDS_Standard.doc 57.00
967 - MS_Application_Compatibility_List.xls 1188.50
968 - MS_Windows_200x_PKI.vsd 56.50
969 - Multiprotocol-NFS_Data_Filers.pdf 952.22
970 - Multistore_and_Snapmover.pdf 1153.83
971 - Musical_Notation.zip 235.55
972 - Nand.html 0.94
973 - NAS.vsd 190.50
974 - NAS_DataFort.vsd 687.50
975 - NBU_MSCS.gif 60.97
976 - NBU_SAN.vsd 3058.00
977 - NBU_with_MSCS.vsd 6944.00
978 - NDFS.vsd 75.50
979 - NEC_VOIP_Phone_Instructions.xls 27.00
980 - NERC_CIP_Requirements_Detailed.xls 111.50
981 - NERC_Critical_Assessments.pdf 169.26
982 - NetApp-NFS.pdf 284.87
983 - NetApp.pptx 1670.27
984 - NETApp_Active_Directory.pdf 100.40
985 - NetApp_NFSV4.pdf 516.71
986 - NetBackup_SAN_Schematic.gif 57.81
987 - Netbios_Resolution_Order.zip 28.47
988 - Netegrity IAM Overview .ppt 1668.00
989 - Netscreen IDP Buyer's Guide.pdf 696.32
990 - Netscreen IDP Datasheet.pdf 326.71
991 - NetScreen IDP ver3.3.11.03.pdf 573.16
992 - Netscreen IDP White Paper.pdf 326.71
993 - Netscreen.html 5.96
994 - Netstat_Broken_Down.xls 29.00
995 - Netstat_Host_Resolution.xls 49.50
996 - Netware.zip 500.91
997 - Networking.jpg 272.83
998 - Network_and_Protocol_Reference.pdf 962.85
999 - Network_Appliance_Using_Network_Appliance_Filers_with_Rational_ClearCase.pdf 201.46
1000 - Network_Attached_Storage_Vendors.xls 60.50
1001 - Network_Behavior_Anomaly_Detection.doc 109.50
1002 - Network_Communication_Speeds.xls 44.50
1003 - Network_Communication_Speed_Comparison_Table.xls 54.00
1004 - Network_Corporate_Sample.zip 723.03
1005 - Network_Data_Collection.xls 36.00
1006 - Network_Data_Collection_Tracking.xls 35.00
1007 - Network_Design_Best_Practices.doc 132.00
1008 - Network_Design_Flow.vsd 64.50
1009 - Network_Enterprise_Web_Server_Configuration.vsd 3052.50
1010 - Network_HW_Inventory.xls 69.50
1011 - Network_Layer_And_Forwarding.ppt 2406.50
1012 - Network_Logical_Firewall.vsd 139.50
1013 - Network_Log_Management.xls 45.00
1014 - Network_Management.vsd 52.00
1015 - Network_Management_Systems.doc 619.50
1016 - Network_MPLS_Profiles.xls 77.50
1017 - Network_Oversubscription_Considerations.doc 2760.00
1018 - Network_Performance_Management_Considerations.zip 27.21
1019 - Network_Protocol_Decodes.xls 400.00
1020 - Network_Sample.vsd 281.00
1021 - Network_SANs.vsd 52.00
1022 - Network_Service_Access_Policy.doc 70.00
1023 - Network_Service_Delivery_Workflow.vsd 134.50
1024 - Network_Speeds.xls 54.00
1025 - Network_Training.html 3.41
1026 - Net_Masks.xls 42.50
1027 - New_Hire_Orientation.vsd 68.50
1028 - New_Hire_Processing_Flowchart.vsd 79.50
1029 - New_or_Modified_Windows_2000_2003_Tweaks.xls 99.00
1030 - New_Project_Request_Flows.vsd 78.00
1031 - NFS_Security_Architecture.vsd 66.50
1032 - NFS_VFS.vsd 52.50
1033 - NIH_Data_Architecture_Framework.vsd 53.00
1034 - NIH_IT_Enterprise_Architecture.vsd 55.00
1035 - NIST800_Series_Summarization.doc 93.50
1036 - NIST_References.xls 48.50
1037 - NIST_Risk_Framework.vsd 824.50
1038 - NIST_Security_Test_Evaluation_Report.xls 843.00
1039 - NIST_SP800-26_Questionnaire.doc 495.50
1040 - Nokia_Horizon_Manager.vsd 44.00
1041 - NT4_Checks.doc 164.50
1042 - Office_12_Server_Topologies.vsd 253.50
1043 - Office_SharePiont_DatabaseModel.vsd 181.00
1044 - Office_SharePiont_IT_Deployment.vsd 160.50
1045 - Office_SharePoint_Planning_AppAdmin.vsd 238.00
1046 - Office_SharePoint_Server_Customization.vsd 430.50
1047 - Old_School_Attack.zip 27.70
1048 - Open-Source CIMOM Implementation.ppt 614.00
1049 - OPENView_Vendor_MIBs.doc 123.00
1050 - Open_Enrollment_Re-Enrollment.vsd 54.00
1051 - Open_Text_Evaluation_Summary.doc 178.00
1052 - Open_VMS_Security_Standards.doc 304.00
1053 - Operational_Risk_Management.ppt 351.00
1054 - Operational_Risk_Vendor_Analysis_Report_Fom.doc 60.50
1055 - Operational_Support_Activities.zip 28.92
1056 - Oracle Hardening.xls 172.50
1057 - Oracle.zip 1568.27
1058 - Oracle_Business_Intelligence_Suite_Enterprise_Edition.xls 192.00
1059 - Oracle_OMS.vsd 62.50
1060 - Oracle_Ports_Ranges.doc 169.50
1061 - Oracle_Vendor_Patchsets_Serious_Critical_Details.xls 322.50
1062 - Order_Fulfillment_Billing.zip 34.65
1063 - Organized_Java_Layers.vsd 64.00
1064 - Org_Chart.doc 57.50
1065 - OS - DBA Service Packs.xls 21.50
1066 - OS Versions and Links.xls 74.00
1067 - os.html 2.34
1068 - OSPF.pdf 22.65
1069 - OS_Security.jpg 151.44
1070 - Outlook_200x.jpg 40.06
1071 - Outlook_200x_Overview.vsd 51.50
1072 - Outlook_Web_Access.vsd 120.00
1073 - OWASP_Application_Firewall.ppt 796.00
1074 - Package_Software_Support.zip 31.76
1075 - PACs_Picture_Archiving_Communication_System.vsd 334.00
1076 - Parametric_Estimations.vsd 53.00
1077 - Part2_of_Demistifying_HIPAA.ppt 647.00
1078 - Partnership_&_Collaboration.zip 28.98
1079 - Partner_Business_Network_Fireproof_Internet.vsd 467.50
1080 - Past_Performance_Vendor_Questionnaire.doc 155.50
1081 - Patch_Management_in_Linux_and_Solaris.doc 78.00
1082 - Patch_Management_Standard_2.doc 66.00
1083 - paypal.jpg 4.25
1084 - PBR.xls 39.50
1085 - PBX_Firewalls.ppt 1479.50
1086 - PCAP_Utility_Cheat_Sheet.doc 69.50
1087 - PCI-VAL1.jpg 99.05
1088 - PCI-VAL2.jpg 108.10
1089 - PCI_Readiness_Assessment.doc 70.50
1090 - PCI_Security_Best_Practices.ppt 3811.50
1091 - Penetration_Test_Consulting_Overview.doc 70.50
1092 - Pension_Process.vsd 62.00
1093 - Pen_Testing.ppt 1038.00
1094 - PeopleSoft_Application_Architecture.vsd 53.50
1095 - PerformanceTuningInternalTechNote.pdf 165.02
1096 - Performance_Appraisal_Sales.xls 37.00
1097 - Performance_Evaluation_Peer_Input_Form.doc 240.00
1098 - Performance_Reference_Model_Sample_Descriptions.xls 50.00
1099 - Perform_Review_Template.doc 240.00
1100 - Perimeter_Review_Considerations.doc 62.50
1101 - Perimeter_Security.doc 688.50
1102 - Personality_Assessment.doc 64.00
1103 - Personal_Development_Plan.vsd 61.50
1104 - Physical_Monitoring_Review_Considerations.doc 66.00
1105 - Physical_Security_Room_Access.xls 52.50
1106 - PIX_Logging_Command_Reference .xls 49.50
1107 - PM.JPG 34.50
1108 - Policy_Firewall_Implementation.doc 56.50
1109 - Portal_Simple.vsd 454.50
1110 - Port_Number_Quick_Reference.xls 245.50
1111 - Port_Requirements_for_Microsoft_Windows_Server_System.xls 58.50
1112 - Port_Requirements_Microsoft_Windows_Server_Systems.xls 67.50
1113 - Port_Scanning_Programs_Report_Considerations.zip 24.41
1114 - Port_Scanning_Programs_Report_Considerations_2.zip 25.78
1115 - Power_Mac_Emergency_Handbook.pdf 519.02
1116 - PPT_Samples1.zip 3703.42
1117 - Practical_Approach_to_Risk.vsd 57.00
1118 - Practice_Management_Systems_Web_Reviews.doc 406.00
1119 - PreDamage_Assessment_Report.doc 87.50
1120 - Preventia Content Analyzer Guide.pdf 515.23
1121 - Price_Optimization.zip 30.06
1122 - Printer_Managed_Services_Lifecycle.vsd 57.00
1123 - Printer_Security_Suggestions.xls 38.50
1124 - Privacy_and_Protection.ppt 388.50
1125 - Privacy_Review.doc 70.50
1126 - Problem_Management_Process_Diagram.vsd 75.00
1127 - Process_Maturity_Self_Assessment.doc 260.50
1128 - Process_Model_Overview.doc 108.00
1129 - Process_Swimlane_Example.xls 51.50
1130 - Procurement.jpg 192.79
1131 - Procurement.zip 31.22
1132 - Procurement_2.zip 26.26
1133 - Procurement_Cycle_Outline.zip 33.20
1134 - Production_Incident_Tracking.xls 75.50
1135 - Product_Selection_Strategy.vsd 54.50
1136 - Product_Support_Flow_Chart.vsd 64.00
1137 - Product_Vendor_Technical_Roles.xls 38.50
1138 - Program_Delivery.zip 32.82
1139 - Project.html 7.00
1140 - Project_Architecture_Migration.vsd 67.00
1141 - Project_Communications_Plan.xls 122.50
1142 - Project_Control_Tracking.xls 38.00
1143 - Project_Flowchart.vsd 101.00
1144 - Project_Issues_Tracking.xls 142.00
1145 - Project_Lifecycle.vsd 114.50
1146 - Project_Management.ppt 146.00
1147 - Project_Management_Approach.doc 163.00
1148 - Project_Management_Controls.doc 103.50
1149 - Project_Management_Core_Competencies.doc 304.50
1150 - Project_Management_Process.doc 206.00
1151 - Project_Management_Workflow.vsd 75.00
1152 - Project_Manager_Job_Description.doc 112.00
1153 - Project_Pitfalls.zip 25.80
1154 - Project_Retrospective_Procedure.doc 214.50
1155 - Project_Risk_Assessment.zip 45.37
1156 - Project_Risk_Factors_Checklist.doc 134.50
1157 - Project_Risk_Tracking.xls 142.00
1158 - Project_Roles_Responsibilties.xls 40.00
1159 - Project_Role_Resource_Request.vsd 55.00
1160 - Project_Scope_Template.doc 40.00
1161 - Project_Support_Turnover_Outline.doc 59.50
1162 - Project_Team_Role_Descriptions.doc 149.00
1163 - Project_Training.zip 276.15
1164 - Project_Turnover_Actions.xls 36.00
1165 - Protecting_Sensitive_Information.vsd 52.50
1166 - Protecting_Sun_Solaris_Systems.doc 45.50
1167 - ProxySG native.doc 75.50
1168 - ProxySG_CPL_Guide_3.1.3.pdf 1368.07
1169 - PSTN.PPT 2281.50
1170 - PSTN_DSL.vsd 130.50
1171 - PTO_Template.doc 52.50
1172 - Public_Healthcare_to_Healthcare_Systems_Overlap.vsd 53.00
1173 - Puppies_Life_IS.ppt 16338.50
1174 - PVM_Edge_Network_Firewall.xls 111.00
1175 - QA_Testing_Character_List.doc 81.50
1176 - Quality_System_Assessment.doc 442.50
1177 - QualysGuard Best Practices.ppt 394.50
1178 - QualysGuard_PCI_Known_Assets.xls 44.00
1179 - QualysGuard_Stencil.vss 242.50
1180 - Qualys_Asset_Groups.xls 39.50
1181 - Qualys_Detected_OSs.doc 63.00
1182 - Qualys_Report_Details.xls 40.50
1183 - Quantum.vss 662.00
1184 - RACF intro.pdf 1051.00
1185 - Rack1.vsd 732.00
1186 - Rack2.vsd 1747.00
1187 - Rack3.vsd 1685.50
1188 - Radiology_Ordering_Process.vsd 113.50
1189 - RAID_1_Mirroring.pdf 44.34
1190 - RAID_3_Parallel_Array_with_Parity.pdf 42.13
1191 - RAID_5.pdf 28.72
1192 - RAID_Level_0_Striping_Mirroring.pdf 36.02
1193 - RAID_Level_4.pdf 42.40
1194 - RAID_Technology_Overview.pdf 115.22
1195 - Rainbow_Books_Series.zip 3576.05
1196 - RAIT_and_Tape_Virtualization.pdf 58.19
1197 - Rapid7.html 1.63
1198 - Real_Estate.zip 32.13
1199 - Records_Management.vsd 389.50
1200 - Record_Retention_Initiative_Strategy_Document.doc 53.50
1201 - Red Hat Linux_Getting Started Guide.pdf 6442.30
1202 - Redhat High Availability.ppt 54.00
1203 - RedHat_Enterprise_Linux_5.xls 100.50
1204 - RedHat_Enterprise_Server_Standard.doc 82.00
1205 - Redhat_Patch_Sets.xls 21.00
1206 - Red_Hat_Satellite-5.6-Installation_Guide-en-US.pdf 861.33
1207 - Regulations_Compliances_Best_Practice.vsd 57.50
1208 - Relationship_Between_PACs_and_Medical_Imaging_Informatics.vsd 57.00
1209 - Relocation_Process.vsd 79.00
1210 - Remediation.xls 26.50
1211 - Remedy.vsd 64.00
1212 - Remedy_Ticket_Tracking.xls 38.00
1213 - Remedy_Ticket_Tracking_Sample.xls 37.50
1214 - Remedy_Vulnerability_Assessment_Tracking_List_Processes.vsd 157.50
1215 - Remote_Access_and_Authentication.vsd 1671.00
1216 - Remote_Desktop_Protocol_Standard.doc 60.50
1217 - Removed Procurement - Target Service.vsd 92.50
1218 - Reporting_Services_Business_Objects.vsd 122.00
1219 - rep_net_traf.pdf 270.14
1220 - Request_for_Time_Off.xls 26.50
1221 - Requirements_Management_Process.doc 74.50
1222 - Research_and_Visualization_Tools.doc 2631.00
1223 - Retain_an_Employee.zip 356.74
1224 - RFC_Change_Process_Flow.vsd 60.00
1225 - RFC_Descriptions.doc 331.00
1226 - RFI.JPG 90.68
1227 - RH5-0_Deployment_Guide.pdf 7796.71
1228 - Risk-Management.jpg 339.44
1229 - Risk_Acronyms.doc 78.50
1230 - Risk_Analysis_vs_Security_Controls.ppt 336.00
1231 - Risk_Assessment.doc 231.50
1232 - Risk_Assessment_Planning.ppt 270.00
1233 - Risk_Contractor_Requirements.doc 75.50
1234 - Risk_Glossary.doc 117.00
1235 - Risk_List_Template.doc 146.50
1236 - Risk_Management_Department.doc 78.50
1237 - Risk_Management_Frameworks.zip 28.88
1238 - Risk_Management_Process.ppt 99.00
1239 - RMD-Policy-Procedure.jpg 293.77
1240 - Road_to_Business_Success.ppt 2066.50
1241 - ROI_Calculator.xls 213.00
1242 - Role-Responsibilities.jpg 215.26
1243 - Router_Configuration_Backup_Scripts.doc 72.50
1244 - Router_Modes.vsd 60.00
1245 - Router_Switch_Password_defaults.pdf 242.85
1246 - Routing_Basics.pdf 30.21
1247 - Routing_Protocols.doc 52.50
1248 - RPC_Security_Architecture.vsd 62.50
1249 - RUP_Network.zip 102.42
1250 - Safety_Requirements.vsd 50.00
1251 - Salary_Administration_Process.vsd 75.00
1252 - Salary_Administration_Processes.vsd 59.00
1253 - Salary_Processing.vsd 72.00
1254 - Sales_Automation_Workforce_ERP_CRM.zip 271.76
1255 - Sales_Business_Requirements.zip 29.47
1256 - Sales_Management.ppt 783.50
1257 - Sales_Management_Process.ppt 240.50
1258 - Sales_Rep_Agreement.doc 91.50
1259 - Sales_UML_Portal_Page1.vsd 111.50
1260 - Sales_UML_Portal_Page2.vsd 105.00
1261 - SAML1.vsd 60.00
1262 - SAML2.vsd 62.50
1263 - SAML_2.vsd 62.50
1264 - SAML_Standards.html 1.23
1265 - Sample Lending Corporation.ppt 541.00
1266 - Sample Network.jpg 84.40
1267 - Sample Windows User Rights Assignments.doc 173.00
1268 - Samples.html 295.89
1269 - Samples_2.html 295.89
1270 - Samples_3.html 321.35
1271 - Samples_4.html 295.89
1272 - Samples_5.html 321.35
1273 - SampleVisio1.zip 1570.27
1274 - SampleVisio2.zip 3424.13
1275 - SampleVisio3.zip 361.69
1276 - Sample_AD_OU_Structure.vsd 178.50
1277 - Sample_AD_Unit_Testing.xls 48.00
1278 - Sample_Application_flows.vsd 191.00
1279 - Sample_Application_Tracking_Spreadsheet.xls 35.50
1280 - Sample_Architecture_Mapping.ppt 173.00
1281 - Sample_Asset_Group.xls 42.50
1282 - Sample_Asset_Management_Policy.doc 86.50
1283 - Sample_ATM_Links.vsd 88.00
1284 - Sample_Backbone_Network.vsd 256.50
1285 - Sample_Backup_Exec_Strategy.doc 46.00
1286 - Sample_Basic_Questions_RFP.doc 138.00
1287 - Sample_BI_Business_Intellegent_Platform.vsd 64.50
1288 - Sample_Business_Model_Dashboard.xls 47.50
1289 - Sample_Catagorized_Risk_Findings.doc 49.00
1290 - Sample_Catalog_Services_Schema_Layout.vsd 465.50
1291 - Sample_Change_Control_Process.doc 102.00
1292 - Sample_Checklist_General_WorkFlow.doc 1039.50
1293 - Sample_Clinical_Laboratory_Data_Flow_Diagram.vsd 61.00
1294 - Sample_Clinical_Radiology_Data_Flow_Diagram.vsd 67.00
1295 - Sample_Confidentiality_Agreement.doc 64.50
1296 - Sample_Consulting_Invoice.xls 46.50
1297 - Sample_Copier_Comparison.xls 39.50
1298 - Sample_Cross_functional_Visios.zip 142.45
1299 - Sample_Dataflow_Visios.zip 223.40
1300 - Sample_Data_Rights_Management_Vendor_Analysis.xls 46.50
1301 - Sample_Deployment_Process_Model.doc 90.50
1302 - Sample_Desktop_Service_Catalog.xls 52.50
1303 - Sample_Development_Process_Model.doc 79.50
1304 - Sample_Device_Usage_Alarm_Tracking.xls 35.50
1305 - Sample_DHCP_Request_Form.xls 42.50
1306 - Sample_Digital_Asset_Support_Assessment.xls 45.50
1307 - Sample_DMZ.vsd 249.50
1308 - Sample_DMZ_Authentication_Architecture.vsd 263.00
1309 - Sample_DMZ_DNS_Flows.vsd 182.00
1310 - Sample_DNS_Flow.vsd 156.00
1311 - Sample_Domain_PW_Policy_Tracking.xls 35.50
1312 - Sample_Drug_Free_Workplace_Policy.doc 96.00
1313 - Sample_Employee_Relations_Issues.vsd 74.00
1314 - Sample_Enterprise_Directory.jpg 66.38
1315 - Sample_Enterprise_Network_DMZ.vsd 127.00
1316 - Sample_Enterprise_Patch_Management_RFP.doc 241.00
1317 - Sample_ERP_Core_Requirements.xls 1876.50
1318 - Sample_Expense_Form.xls 47.00
1319 - Sample_FEMA_Emergency_Response_Plan_Classifications.doc 238.00
1320 - Sample_FMEA_Risk_Matrix.xls 56.00
1321 - Sample_Glossary_of_Terms.doc 171.00
1322 - Sample_HelpDesk_Ticket_WorkFlow.vsd 55.50
1323 - Sample_Help_Desk_Flow.vsd 87.50
1324 - Sample_Hierarchical_Diagnostic_Biomedical_Images.vsd 56.00
1325 - Sample_HR_Express_Process_New_User.vsd 51.50
1326 - Sample_Hyperion_Topology.vsd 62.50
1327 - Sample_Information_Security_Project_Plan.xls 43.50
1328 - Sample_Intrusion_Detection.doc 170.50
1329 - Sample_IP_Tracking.xls 32.00
1330 - Sample_IRM_IO.vsd 66.00
1331 - Sample_IT_No_Label_Tape_Standard.doc 59.50
1332 - Sample_Low_Office_Patch_Sets.xls 76.50
1333 - Sample_Medical_Drs_Office_Floorplan.vsd 645.00
1334 - Sample_Meditech_Eclipsys_and_Exchange_200x_Single_Sign_SOW.doc 85.00
1335 - Sample_Meditech_Radiology_Data_Flow_Diagram.vsd 67.00
1336 - Sample_Monthly_Scan_Tracking.xls 48.00
1337 - Sample_Nagios_High_Level_Test_Plan.doc 79.00
1338 - Sample_NCUA_RFP.doc 938.50
1339 - Sample_netstat_output.xls 54.00
1340 - Sample_Network.vsd 400.00
1341 - Sample_Networking_Infrastructure_Assessment_Tracking.xls 69.00
1342 - Sample_Network_Reliability_Tracking.xls 83.00
1343 - Sample_Network_Statistics_Tracking.xls 80.50
1344 - Sample_Off_Boarding_Tracking.xls 18.00
1345 - Sample_Personal_Computer_LAN_Security_Guidelines.doc 50.00
1346 - Sample_PKI-RSA_Deployment.vsd 652.00
1347 - Sample_PKI_Project_Plan.xls 27.50
1348 - Sample_PKI_RSA_Deployment.mpp 144.50
1349 - Sample_Priority_Swimlanes.vsd 754.00
1350 - Sample_Privacy_Policy.doc 93.00
1351 - Sample_Process_Mapping.doc 82.50
1352 - Sample_Process_Overview.doc 187.50
1353 - Sample_Process_Tracking.doc 187.50
1354 - Sample_Procurement_Processes.vsd 273.50
1355 - Sample_Product_Sales_Workflow.vsd 58.00
1356 - Sample_Project.mpp 158.00
1357 - Sample_Project_Approach.doc 469.50
1358 - Sample_Project_Charter.doc 114.50
1359 - Sample_Project_Delivery.vsd 58.50
1360 - Sample_Project_Requirements_Checklist.doc 123.00
1361 - Sample_Project_Resource_Coordinator.vsd 45.50
1362 - Sample_Qualys_Scanning_Process.vsd 77.50
1363 - Sample_Redudant_Systems.vsd 207.00
1364 - Sample_Remedy_Ticket_Flow.vsd 83.50
1365 - Sample_Requested_Form_Sheet1_of5.xls 45.50
1366 - Sample_Request_New_Contractor.doc 192.00
1367 - Sample_Risk_Assessment_Matrix.doc 178.50
1368 - Sample_Risk_Management_Security_Deployment.mpp 200.50
1369 - Sample_RSA_Server_Architecture.vsd 129.50
1370 - Sample_Run_State_Contact_List.xls 262.50
1371 - Sample_Sales_Call_Plan.doc 31.50
1372 - Sample_SAP_Role_Tracking.xls 32.50
1373 - Sample_Security_Model.ppt 582.00
1374 - Sample_Security_Relatied_Questions.doc 94.00
1375 - Sample_Security_Tracking.xls 111.00
1376 - Sample_SEM_Event_Data_Executive_Dashboard.vsd 66.50
1377 - Sample_Server_Architecture.vsd 899.00
1378 - Sample_Server_Deployments.xls 73.50
1379 - Sample_Server_Lab_Configurations.xls 61.50
1380 - Sample_Service_Specific_Policies.doc 154.50
1381 - Sample_Shared_Web_Tiers.vsd 205.50
1382 - Sample_SIMS_Device_Projections.xls 42.00
1383 - Sample_SIM_Metrics_from_NIST_Special_Publication_800-55.doc 186.00
1384 - Sample_Single_Sign-On_Implementation_Worksheet.doc 246.50
1385 - Sample_SMS2_Configuration.vsd 214.00
1386 - Sample_SMS_Configuration.vsd 207.00
1387 - Sample_Softgrid_Environment_Overview.vsd 243.00
1388 - Sample_Strategic_IT_Plan_Structure.vsd 95.00
1389 - Sample_Syslog_Components.vsd 134.50
1390 - Sample_System_Tracking.xls 39.50
1391 - Sample_TACACs_Design.vsd 100.00
1392 - Sample_Target_Service.vsd 92.50
1393 - Sample_Template_Organization_Chart.xls 48.50
1394 - Sample_TestingRoles.xls 38.00
1395 - Sample_Virtual_VMWareCenter_Design.vsd 480.50
1396 - Sample_VLAN_Tracking.xls 69.50
1397 - Sample_VPN_Configuration_Worksheet.doc 264.00
1398 - Sample_Website_Audit.doc 180.50
1399 - Sample_WebSite_Map_Template.xls 126.00
1400 - Sample_Web_Development_Standards.doc 87.50
1401 - Sample_Windows_User_Rights_Assignments.doc 173.00
1402 - Sample_Workflow_Symbols.vsd 493.00
1403 - Sample_Workflow_Timeline.vsd 403.50
1404 - SANS Two Factor authentication choose one.pdf 1309.05
1405 - SANs_Sample.vsd 207.50
1406 - SAN_Fabric.vsd 383.00
1407 - SAP_Business_Process_Architecture.vsd 63.50
1408 - SAP_Preparation_for_Salary_Administration.vsd 64.00
1409 - SAS_ITIL.vsd 56.50
1410 - Satellite_Internet_ISA_Sample.vsd 202.50
1411 - SCADA_Compliance_Zones.vsd 651.00
1412 - SCADA_Defence_In_Depth.vsd 718.00
1413 - SCCM_Patching_Tutorial.doc 1609.50
1414 - Scheduling.ppt 341.50
1415 - Scheduling_Interviews.vsd 73.00
1416 - SCL_Blocked_List_Example.xls 29.00
1417 - SDLC_PBR.mpp 178.00
1418 - SDLC_QA_Testing.zip 29.83
1419 - SDLC_Technology_Risk_Assessment_Worksheet.doc 277.50
1420 - SDTesting1.vsd 72.00
1421 - Search_Administration_Model.vsd 143.50
1422 - Secure Solaris.pdf 75.94
1423 - Secure_Data_Sharing.ppt 484.00
1424 - Secure_Infrastructure.ppt 310.00
1425 - Secure_Java_Coding_Standard.doc 102.50
1426 - Secure_Media_Destruction_Standards.doc 90.50
1427 - Secure_NetworkGroup_Access.vsd 550.50
1428 - Secure_Password_Storage_Standard.doc 59.00
1429 - Secure_Solaris_Standard.doc 71.00
1430 - Secure_Web_Server.html 1.53
1431 - Securing NT Step by Step.PDF 405.29
1432 - Securing_Solaris.doc 96.50
1433 - Securing_Your_E_Business_Assets.ppt 1040.50
1434 - Security Operations Center.ppt 329.50
1435 - Security Specific - Decision Criteria Illustration.vsd 57.50
1436 - Security_Application_Security.vsd 854.50
1437 - Security_Breach.vsd 56.00
1438 - Security_CIA.zip 31.51
1439 - Security_Configuration_Standards_Checklist_for_Open_VMS_Systems.doc 454.50
1440 - Security_Configuration_Tool_Set.vsd 108.00
1441 - Security_Considerations_HIPAA.ppt 1460.00
1442 - Security_Control_Cycle.zip 30.07
1443 - Security_Descriptor.vsd 48.50
1444 - Security_Development_Strategy.ppt 818.50
1445 - Security_Discovery.vsd 54.00
1446 - Security_Environment_Assessment.ppt 140.00
1447 - Security_Firewall_Policy.doc 66.00
1448 - Security_for_Wireless_Lan.doc 228.00
1449 - Security_Glossary.doc 171.50
1450 - Security_Goals_IT.vsd 53.00
1451 - Security_Governance.zip 26.29
1452 - Security_Guidelines_for_Wireless_LAN.doc 231.00
1453 - Security_ID_Administration.doc 329.50
1454 - Security_Information_Management_Making_a_Business_Case.doc 195.00
1455 - Security_Management_Practices.ppt 228.00
1456 - Security_Monitoring_Standard.doc 78.00
1457 - Security_Operations_Work_Flows.vsd 133.50
1458 - Security_Overview.ppt 1724.50
1459 - Security_Policy.doc 84.00
1460 - Security_Policy_Format_Tracking_Table.doc 114.50
1461 - Security_Practitioners_Study_Recommendations.xls 43.00
1462 - Security_Risk_Management.vsd 55.00
1463 - Security_Sendmail_Standards.doc 69.50
1464 - Security_services.jpg 281.46
1465 - Security_Standards_Threat_Evaluation.ppt 278.00
1466 - Security_Test_Scope.vsd 54.00
1467 - Security_Test_Types.vsd 54.00
1468 - Security_Threat_Tree.doc 69.00
1469 - Security_Tracking.xls 111.00
1470 - Security_Vendor_Sales_Coordination.zip 28.45
1471 - Semantic_Model_Enterprise_Architecture.vsd 56.50
1472 - Servers1.vsd 505.00
1473 - Servers_Tracking_SpreadSheet.xls 33.50
1474 - Server_Monitoring_Template.xls 37.00
1475 - Server_Patch_Status_Tracking.vsd 278.00
1476 - Server_Patch_Tracking.xls 33.50
1477 - Service_Assessment_Security_SOW.doc 118.50
1478 - Service_Catalogue.zip 31.99
1479 - Service_Delivery_Flows.vsd 98.00
1480 - Service_Desk_Reports_Suggested_Product_Features.doc 54.00
1481 - Service_Reference_Model.vsd 65.50
1482 - Service_Reference_Model_Sample_Descriptions.xls 103.50
1483 - SGOS_CLI_4.2.5.pdf 1202.33
1484 - SGOS_CMG_5.1.1_10.pdf 1308.41
1485 - SGOS_CMG_5.1.4_10.pdf 1304.94
1486 - SGOS_CMG_5.1.4_9.pdf 847.52
1487 - SGOS_CPL_Guide_2-1-10.pdf 1032.30
1488 - SG_CIFS.jpg 75.00
1489 - SG_Sample_Client_Acceleration_Techniques.vsd 54.50
1490 - SharedServicesModel.vsd 549.00
1491 - SharedServicesModel_InterFarm.vsd 338.00
1492 - SharePoint_patch_considerations.xls 43.50
1493 - SharePoint_Publish.vsd 62.50
1494 - SharePoint_Services_2x_Installation.doc 131.00
1495 - SharePoint_User_Roles_and_Permissions.xls 64.00
1496 - SharePoint_User_Role_Permissions.xls 46.00
1497 - SharePoint_WorkSheet_Forms.zip 1009.60
1498 - show_netstat_interface.xls 22.50
1499 - show_netstat_interface.xlsx 9.70
1500 - SideWinder.html 1.20
1501 - Sidewinder_7x_Overview.pdf 666.54
1502 - Sidewinder_G2_vs_Netscreen.xls 55.50
1503 - SideWinder_Reports_Overview.xls 47.50
1504 - SIG_v31.xls 3779.00
1505 - SIM.jpg 49.15
1506 - SIM.ppt 474.00
1507 - SIM2.jpg 33.79
1508 - Simple_Citrix_Flow_Connection.vsd 95.00
1509 - Simple_Identity_Management_Flow1.vsd 78.00
1510 - Simple_ITIL_Framework.vsd 69.00
1511 - Simple_IT_Infrastructure.vsd 94.00
1512 - Simple_Network.vsd 202.00
1513 - Simple_Web_Application_Architecture.vsd 387.00
1514 - SIM_SEM_Estimate_Calculations_Events_Per_Second.xls 97.50
1515 - Single Sign-on Capability - Presentation on How to Do Clinical Workflow Analysis.pdf 2824.16
1516 - Single Sign-on White Paper.pdf 122.96
1517 - Single_Sign-On_Project_Services_POC.xls 22.50
1518 - SiteHierarchyModel.vsd 653.50
1519 - sitemap.xml 173.40
1520 - Site_Redesign_Considerations.zip 32.85
1521 - Six_Candidate_ECM_Solution_Evaluation_Scores.doc 198.00
1522 - Six_types_of_Windows _Browsers.zip 30.43
1523 - Skills_Level_Assessment.xls 59.50
1524 - Skills_Matrix.xls 69.00
1525 - SmartPlant_Foundation_Evaluation_Summary.doc 88.50
1526 - Smart_Plant_Evaluation_Summary.doc 188.50
1527 - SMTP.vsd 54.00
1528 - SNMP.vsd 51.50
1529 - SNMP_Configurations.doc 80.00
1530 - SNMP_Indepth.ppt 197.00
1531 - SOA_Maturity_Roadmap.xls 46.00
1532 - SOA_Quality_Assurance.ppt 405.00
1533 - Software_Catalogue.xls 41.50
1534 - Software_Proccess_Assessment_Baseline.zip 478.12
1535 - Solaris Hardening Guide V1.pdf 802.90
1536 - Solaris10-11_Security_Settings.xls 58.00
1537 - Solaris7_Install_Guide.pdf 95.29
1538 - Solaris_2x_Tuning_Your_TCPIP Stack_and_More.doc 153.50
1539 - Solaris_Disk_Diagnostics.vsd 632.00
1540 - Solaris_Disk_States.vsd 59.00
1541 - Solaris_Operating_System_Security_Standard.doc 260.50
1542 - Solaris_Patch_Management_Recommended_Strategy.pdf 200.20
1543 - Solaris_Recover_Password.doc 34.50
1544 - Solaris_Security_Diags_2x.doc 76.00
1545 - Solaris_Security_FAQ.doc 157.50
1546 - Solaris_Services_FMRI.xls 76.00
1547 - Solaris_SPARC_Boot_Sequence.doc 105.00
1548 - Solaris_Tunning_and_Troubleshooting.doc 456.50
1549 - Solaris_Vendor_Patchsets_Serious_Critical_Details.xls 187.50
1550 - Solution_Architecture_Overview.doc 131.50
1551 - sp800-103-draft.pdf 698.74
1552 - SP800-115.pdf 605.48
1553 - sp800-53-rev3-final_updated-errata_05-01-2010.pdf 3239.30
1554 - SP800-63-Rev1-Draft3_June2011.pdf 1138.82
1555 - SP800-63-Rev1_Dec2008.pdf 923.49
1556 - SP800-63V1_0_2.pdf 396.37
1557 - SP800-95.pdf 784.22
1558 - Spam-PPTs.zip 3970.67
1559 - SpamPricing_Features.xls 58.50
1560 - Spam_Bills.xls 501.00
1561 - Spam_Calculator1.xls 97.50
1562 - Spam_Edge.vsd 156.00
1563 - Spam_Product_Testing.xls 256.00
1564 - Spam_ROI.xls 45.50
1565 - Spectrum_eHealth_Resource_Tracking.xls 33.50
1566 - Spectrum_Polling_Collection.xls 34.00
1567 - Speed_Comparison.xls 52.00
1568 - Spoofing.ppt 222.50
1569 - SPS_CorpPortal_Scenario.vsd 183.00
1570 - SPS_Departmental_Scenario.vsd 188.00
1571 - SPS_Hosting_Scenario.vsd 221.50
1572 - SPS_InfoPortal_Scenario.vsd 271.50
1573 - Spyware_Management.xls 38.50
1574 - SQL200x_Security_Standard.doc 79.50
1575 - SQL_Patchsets_Serious_Critical_Urgent_Details.xls 187.50
1576 - SQL_Server_Performance.pdf 2490.06
1577 - SQL_Service_Response_Times.doc 46.00
1578 - SQL_Standard_Security_Standard.doc 92.50
1579 - SSH Sentinel 14 Linksys.pdf 42.49
1580 - sso sheet.pdf 1763.29
1581 - SSO_Researched_Vendors.xls 98.50
1582 - Staff_Training_Overview.vsd 58.00
1583 - Stakeholders_Issues_Tracking.xls 47.50
1584 - Stateful_Packet_Flow.vsd 75.00
1585 - StateSt-VMSVendorUserGuide.pdf 16.15
1586 - State_Data_PII_Destruction_Laws.doc 62.50
1587 - Storage_Management_Mainframe_Tape_Matrix.doc 265.00
1588 - Storage_Migrator_Process_Flow.vsd 62.00
1589 - Storage_Stencils.zip 8211.86
1590 - Strategic_Planning_For_Procurement.doc 81.00
1591 - Striping_and_Mirroring.pdf 23.10
1592 - Sub-UpgradeScenario_SPS.vsd 369.50
1593 - Sub-UpgradeScenario_SPS_2of2.vsd 311.00
1594 - Submitting_Project_Proposal.doc 103.50
1595 - Successful_Solaris_Performance_Tuning.doc 105.50
1596 - Suggested_Censored_Keywords.xls 63.50
1597 - SUNSparc_Privileg_Elevation.doc 138.50
1598 - Supplier_Security_Standard.doc 57.50
1599 - Supply_Chain_Management.zip 31.60
1600 - Supply_Chain_Sample.vsd 56.00
1601 - Sybase_Adaptive_Server_Enterprise_11-9-x12-0_Quick_Reference.doc 730.37
1602 - Symantec_Control_Compliance_Suite.doc 131.50
1603 - Symantec_VMWARE+NetBackup.pdf 766.58
1604 - System Vulnerability Tracking.xls 37.00
1605 - Systems.ppt 2855.50
1606 - Systems_software_indexes.xls 82.50
1607 - System_Design_Specification.vsd 83.50
1608 - System_Development_Life_Cycle.doc 112.50
1609 - System_Event_Management_Collections_Process.vsd 531.50
1610 - System_Tracking.xls 38.50
1611 - S_PSTN.PPT 773.00
1612 - TADDM_Database_Maintenance_Tips.doc 77.50
1613 - TADDM_Guide.pdf 10558.64
1614 - TCP_IP_Latency.jpg 46.71
1615 - Technical_Reference_Model_Sample_Descriptions.xls 69.00
1616 - Technical_Specifications_for_Information_Rights_Management.doc 278.00
1617 - Technical_Writing_Style.doc 452.00
1618 - Technology_Refresh_Responsibility.vsd 112.50
1619 - Technology_Risk_Assessment.zip 28.69
1620 - Technology_Services_Infrastructure.vsd 54.00
1621 - Tech_SILOs.vsd 49.00
1622 - Template_Background_Black_White_PowerPoints.zip 2394.11
1623 - Template_Blue_Background_PowerPoints.zip 10095.87
1624 - Template_Green_Background_PowerPoints.zip 2534.83
1625 - Template_Healthcare_Provider_Functions.doc 189.50
1626 - Template_Icons1.vsd 8404.50
1627 - Template_Icons2.vsd 8206.50
1628 - Termination_Procedure.vsd 58.50
1629 - Testing the Windows Server 2003 Security Guide.pdf 346.48
1630 - Testing-v1.bmp 2294.35
1631 - Testing-v1.JPG 127.41
1632 - The Federated Identity Primer.pdf 663.33
1633 - The Natural Weaknesses of a Security Policy.doc 68.50
1634 - The Real Threats.doc 62.50
1635 - The_Cost_of_SPAM.doc 186.00
1636 - The_Identity_Conundrum.ppt 559.00
1637 - The_Need_for_Security_Awareness_Programs.ppt 982.00
1638 - The_World_and_Timezones.vsd 871.00
1639 - The_Worst_IT_Practices.ppt 411.50
1640 - Third_Party_Connectivity.doc 77.50
1641 - Thousand_Mibs.zip 6812.99
1642 - Threat Types.zip 28.08
1643 - Three_Types_of_Attacks.zip 27.60
1644 - Timeline Major Provisions Hlth Care Reform Pat Prot Afford Act 2010 to 2014.pdf 567.02
1645 - Todays_IT_Business_Needs.vsd 47.50
1646 - Tracking_Project_Changes.xls 44.00
1647 - Tracking_VPN_Remote_Access_List.xls 37.00
1648 - Traditional_X_400.vsd 171.00
1649 - Transaction_Processing_Controls.vsd 50.00
1650 - Transaction_Professional_Services.zip 29.16
1651 - Travel_Request_Processing.vsd 73.00
1652 - Troubleshooting_the_Router.pdf 40.05
1653 - TrueCrypt_File_Encryption_Standard.doc 66.50
1654 - tsiem20_trouble.pdf 1330.00
1655 - TS_2503_Router.pdf 291.49
1656 - TS_Frame_Relay.pdf 229.42
1657 - Tuition_Assistance.vsd 68.00
1658 - Two_Phase_Assessment.doc 352.50
1659 - Typical_Healthcare_Payer_Organization.doc 169.50
1660 - UAT_Test_Plan.doc 107.00
1661 - UDP_Known_Trojan_Ports.xls 136.50
1662 - UML_Sales_Process_Flowsl.vsd 171.50
1663 - UML_Sales_Process_Flows_Part2.vsd 186.00
1664 - Un-sorted_ITIL_ISO_Cobit_Indexes.xls 58.00
1665 - Understanding_Clinical_Workers.vsd 77.50
1666 - Understanding_ITIL.ppt 950.50
1667 - Unicenter_Conceptual_Diagram_TMEIM.vsd 56.50
1668 - Unified_Storage_Value.vsd 118.00
1669 - Unix.html 3.49
1670 - UnixCrossReferenceCommandSummary.zip 984.20
1671 - Unix_Disk_Storage_Tracking.xls 38.00
1672 - Unix_File_System.vsd 84.00
1673 - Unix_File_System.xls 42.50
1674 - Unix_File_System_Options.vsd 71.50
1675 - Unix_Inode.vsd 84.50
1676 - Unix_Kernal.vsd 57.00
1677 - Unix_Login.vsd 70.50
1678 - Unix_Security_Suggestions.xls 42.50
1679 - Unix_System_Security_Audit_Report.doc 94.00
1680 - UpgradeScenarios.vsd 198.50
1681 - Upgrade_Juniper_IOS.doc 188.50
1682 - urllist.txt 65.22
1683 - Usefull_Project_Documents.zip 545.77
1684 - Useful_Citrix.xls 60.00
1685 - Useful_SQL_queries.doc 53.00
1686 - Userful_Citrix.xls 60.00
1687 - UserID_Account_Management_System_Guide.vsd 56.00
1688 - Vaccine.vsd 86.00
1689 - VA_Identity_Flow.vsd 70.50
1690 - VA_Scan_Categories.doc 235.00
1691 - Venafi_PCI Compliance_Whitepaper.pdf 2009.90
1692 - Vendor_Antivirus_POC_Questionnaire.doc 225.00
1693 - Vendor_Application_Tracking.xls 47.00
1694 - Vendor_Inventory_Matrix_PII_Research.xls 170.00
1695 - Vendor_Merchandising.zip 29.88
1696 - Vendor_Security_Event_Correlation_Engine_Evaluation.xls 96.00
1697 - Vendor_Selection_Steps.vsd 126.50
1698 - Vendor_Technology_Organizations_Descriptions.xls 382.50
1699 - Verisign_TokenBasics.pdf 138.44
1700 - Veritas_Volume_Replicator.vsd 4630.50
1701 - VI.PDF 66.40
1702 - VIO_Architecture.vsd 94.00
1703 - Virtual_Infrastructure_Tracking_Sheet.xls 42.50
1704 - Virtual_Networking_Concepts.pdf 607.63
1705 - Virtual_Server_High_Level_Overview.vsd 60.00
1706 - Virtual_Template_1.vss 408.50
1707 - Virtual_Temples.zip 490.38
1708 - Virus_Managmenet_Project_Tracking.xls 38.50
1709 - Visio_1.zip 4273.65
1710 - Visio_2.zip 4291.49
1711 - Visio_3.zip 1759.00
1712 - Visio_Roemer_Model_High_level_System.vsd 51.00
1713 - Visio_Sample_Patient_Transfer_Process.vsd 65.50
1714 - Visio_Unix_Privileges_Sudo.vsd 53.00
1715 - Vista_Compatibility_Software_List.pdf 84.07
1716 - Vista_Compatibility_Software_List.xls 157.00
1717 - Vista_Diagnostics_Cheat_Sheet.doc 202.50
1718 - Vista_Features_Matrix.xls 98.00
1719 - VMS_Commands.doc 251.00
1720 - VMS_Level_Certification_Checklist.doc 134.00
1721 - VMWare View On NetApp Deployment Guide.pdf 2454.27
1722 - VMWare.html 1.52
1723 - VMWare_Architecture.jpg 108.80
1724 - VMware_Architecture.vsd 50.50
1725 - VMWare_DMZ_Storage.vsd 650.50
1726 - VMWare_ESX_Backup_VVendor_Comparisons.xls 59.00
1727 - VMWare_Infrastructure_Design.vsd 1085.50
1728 - VMWare_Monitoring.vsd 57.00
1729 - VMWare_OVR.GIF 30.50
1730 - VMWare_Templates.vsd 674.00
1731 - VMware_Virtual_Centers_Tracking.xls 36.50
1732 - VOIP_Segregation_of_Duties.doc 109.50
1733 - VPM5_Provisioning_Guide.pdf 1731.39
1734 - VPM5_Sys_Admin_Guide.pdf 4241.60
1735 - VPM5_Troubleshooting.pdf 5074.97
1736 - VPN-Common.jpg 80.71
1737 - VSDfx-Apple-3D.vss 664.00
1738 - VSDfx-Cisco-3D.vss 269.00
1739 - VSDfx-Generic-IO-Cards.vss 597.00
1740 - VSDfx-Generic-Racks.vss 368.00
1741 - VSDfx-Network-Symbols-Blue.vss 1652.00
1742 - VSDfx-Network-Symbols-Green.vss 1605.50
1743 - VSDfx-Network-Symbols-Grey.vss 1493.00
1744 - Vulnerability_Management.xls 38.00
1745 - Vulnerability_Management_System_RFP.doc 83.00
1746 - VVR_Open_Sys_v1.gif 68.98
1747 - W7.xls 52.50
1748 - Wage_Traking_Key_Stakeholder_User_Needs.xls 37.00
1749 - WAN_Overview.PPT 326.50
1750 - War_Dialing.xls 54.50
1751 - Waterfall_Service_Reference_Model.vsd 46.50
1752 - WEBM.vsd 54.50
1753 - WebSense.html 2.64
1754 - Websense_Enterprise_to_Blue_Coat_WebFilter_Migration_Notes_and_Recommendations.e.pdf 204.66
1755 - WebService_Security_Architecture.vsd 54.00
1756 - Website_Testing.xls 58.50
1757 - WebSphere.vsd 61.00
1758 - WebSphere_Application_Server.vsd 77.00
1759 - Web_Application_Business_Technical_Proposal.vsd 82.50
1760 - Web_Application_Security.ppt 1010.00
1761 - Web_App_Security_Standard.doc 147.50
1762 - Web_Commerce_Logical_Portal_View.vsd 52.50
1763 - Web_content_filtering_considerations.doc 195.50
1764 - Web_DMZ1.vsd 100.00
1765 - Web_Hire_Advertising.vsd 70.50
1766 - Web_Related Vulnerabilities.xls 19.00
1767 - Web_Server_JSPFLows.vsd 49.50
1768 - Web_Server_Migration_Tracking.xls 81.50
1769 - Web_services.jpg 212.41
1770 - Web_Services_Management.vsd 54.00
1771 - Web_Services_SiteMinder.vsd 431.00
1772 - Weekly_Timesheet.xls 62.00
1773 - Well Known OSs.doc 71.00
1774 - Well-Known Ports.doc 94.50
1775 - Well_Known_OSs.doc 71.00
1776 - WFO_Ports_and_protocols_wfo_ports_and_protocols.pdf 451.30
1777 - What_Can_Go_Wrong_During_a_Pen_Test.ppt 646.50
1778 - What_is_an_Application_Audit.doc 69.00
1779 - What_RAID_Provides.pdf 32.56
1780 - When_to_Use_a_Consultant.ppt 156.50
1781 - While_You_Were_Out.doc 6048.50
1782 - white-paper-introduction-to-storage-security.pdf 354.53
1783 - Why Policies Fail.doc 61.00
1784 - Window 2000 Training.zip 8361.68
1785 - Windows 2003 Security Guide.zip 326.62
1786 - Windows 2003 Delivery Guide.zip 40.23
1787 - Windows Optimized Desktop Scenario SelectionTool v1.1.xls 278.50
1788 - Windows Optimized Desktop Scenarios Assessment v1.1.docx 332.03
1789 - Windows Server 2003 Security Guide.pdf 1576.75
1790 - Windows7_Security_Standard.doc 158.50
1791 - Windows_2000_Professional_Security_Standard.doc 111.50
1792 - Windows_2000_Server_Standards.doc 101.00
1793 - Windows_2003_2008_Active_directory_Audit_Export.xls 2755.00
1794 - Windows_2003_Default_Security_Services_Configuration.xls 198.00
1795 - Windows_2003_High_Security_Standard.doc 95.50
1796 - Windows_2003_Server_Standard.doc 98.50
1797 - Windows_2003_Wireless.ppt 777.00
1798 - Windows_2008_Server_Security_Standard.doc 110.50
1799 - Windows_200x_Encrypting_File_System.vsd 56.00
1800 - Windows_200x_Services.doc 362.50
1801 - Windows_2k3_Active_Directory_Property_Methods.xls 271.00
1802 - Windows_Audio_Architecture.ppt 174.00
1803 - Windows_Auditing_and_Account_Policies_Standards.doc 103.50
1804 - Windows_DACL_File_Access.vsd 58.50
1805 - Windows_Diagnostic_Cheat_Sheet.doc 102.50
1806 - Windows_docs.html 5.30
1807 - Windows_Interoperability.ppt 136.50
1808 - Windows_Interoperability_Automated_Test_Cases.xls 85.50
1809 - Windows_IT_Domains.zip 24.41
1810 - Windows_IT_Domains_2.zip 25.84
1811 - Windows_LAN_Manager_Password_Encryption.vsd 49.50
1812 - Windows_Linux_File_Print_Sharing.doc 81.50
1813 - Windows_Logon_Components.vsd 64.50
1814 - Windows_Migration_Planning.xls 146.50
1815 - Windows_NT_Logon_and_Security_Subsystems.doc 104.00
1816 - Windows_NT_Printing_Process.vsd 86.50
1817 - Windows_NT_Workstation_Terms.doc 111.50
1818 - Windows_Services_Suggestions.doc 348.50
1819 - Windows_UNIX_Introduction.ppt 165.50
1820 - Windows_Version_Side_by_Side.xls 63.50
1821 - Windows_XP_Default_Security_Services_Configuration.xls 161.50
1822 - Windows_XP_Vista_7_Settings_Comparison.xls 151.50
1823 - Window_2000_Training.html 5.11
1824 - WINS_Server_Mindmap.zip 29.71
1825 - WINXML_Query_Interface_Standards.doc 44.00
1826 - Wireless_Vendor_Patch_Serious_Critical_Details.xls 36.00
1827 - Wireless_Wan.PPT 1309.00
1828 - WoodShop_01_2_Visio2000.vss 276.00
1829 - WoodShop_01_2_Visio5.vss 262.50
1830 - Word_Art.html 7.53
1831 - Working_A_Project_To_Completion.ppt 198.00
1832 - Workplace_Violence_Employee_Security_Survey.doc 177.50
1833 - Workstation Operating System Security Guidelines.doc 101.00
1834 - Work_in_Process_Raw_Materials.zip 28.97
1835 - www_bestitdocuments_default.html 21.28
1836 - XML_Data_Exchange_Standard.doc 62.00
1837 - XP_Flavors_Spreadsheet.pdf 35.48
1838 - X_Windows.doc 72.50
1839 - zOS_Security_Reporting_Tool_Functional_Requirements.doc 122.50
1840 - Active Directory and NT Kerberos.ppt 254.00
1841 - Active Directory Configuration.doc 117.00
1842 - Active Directory Directory Services.ppt 291.50
1843 - Active Directory DN Collection.doc 123.00
1844 - Active Directory Functions.doc 123.00
1845 - Active Directory Group Policy.ppt 283.00
1846 - Active Directory LDP.ppt 826.00
1847 - Active Directory Object Naming.doc 109.50
1848 - Active Directory Objects.doc 112.00
1849 - Active Directory Performance.doc 121.00
1850 - Active Directory Replication.doc 147.50
1851 - Active Directory Schema.doc 120.50
1852 - Active Directory Security.doc 120.50
1853 - Active Directory Sites.doc 132.00
1854 - Active Directory Tools.doc 136.50
1855 - Active Directory.ppt 176.00
1856 - AD Disaster Recovery.ppt 1136.00
1857 - AD Migrating to Windows 2000.ppt 327.50
1858 - AD OU.ppt 1324.50
1859 - AD-disaster-recovery.ppt 306.00
1860 - Advanced Active Directory Design and Troubleshooting_2.ppt 1706.50
1861 - Attributes to Collect.doc 38.50
1862 - Configuring Windows Using Group Policy.ppt 1498.00
1863 - Directory Service Security.ppt 243.00
1864 - Distributed File System (DFS).doc 114.00
1865 - LDAP Directory Services.ppt 268.00
1866 - LDAP- Protocol and Applications.ppt 73.50
1867 - Server and Clusters.ppt 834.00
1868 - Windows 2008 Domains.doc 133.50
1869 - Windows 2008 File Attributes.doc 114.50
1870 - Windows 2008 Shares.doc 117.00
1871 - 101 Security.ppt 1614.00
1872 - 2000 Accounts.ppt 537.50
1873 - 8021x simplified.ppt 1128.00
1874 - Administration of a Windows 2000 Network.ppt 1228.50
1875 - Advanced Windows NT Security.ppt 62.00
1876 - Application Support with MSI.ppt 861.50
1877 - Business Data Communications and Networking.ppt 713.50
1878 - Communications Decency Act.doc 73.50
1879 - COPPA.ppt 189.50
1880 - Distributed File System.ppt 782.00
1881 - Distributed Firewall Architecture.ppt 292.50
1882 - Download Windows 2000 Performance Tuning & Optimization Part 1.ppt 355.50
1883 - DSL and Cable Users Need To Know.doc 39.00
1884 - E-appliance & VPNs.ppt 210.00
1885 - E-Gov Privacy.ppt 96.00
1886 - Education.ppt 127.50
1887 - Email Behind The Scenes.doc 178.50
1888 - Email Security Issues.doc 70.50
1889 - General Security Threats.ppt 152.50
1890 - Group Policy in Windows Server 2003.ppt 2468.00
1891 - Information Security Defense Strategy.ppt 1127.00
1892 - IntroComputerNetwork.ppt 1835.50
1893 - IPSec VPNs The Real World.ppt 720.50
1894 - M4 Osi-lyrs.ppt 479.50
1895 - Malicious Information gathering.ppt 305.50
1896 - MSVista_Overview.ppt 2642.50
1897 - Net Sec.ppt 595.50
1898 - NT Management.ppt 86.00
1899 - NT Security Infastructure.PPT 91.00
1900 - NT Security.ppt 103.50
1901 - Operating System.ppt 449.50
1902 - Overview Of Active Directory.ppt 817.00
1903 - Password Choices.doc 58.00
1904 - Policies - Procedures.ppt 122.00
1905 - Secure Framework.doc 56.50
1906 - SecureWebServer.ppt 183.50
1907 - Securing Active Directory.ppt 747.50
1908 - Securing NT - 1.ppt 762.50
1909 - Security Audit - Concepts and practice.ppt 327.00
1910 - The Architecture of Computer Hardware and Systems Software.ppt 300.00
1911 - The Sources Of Threat.doc 58.00
1912 - Towards Standards.ppt 268.50
1913 - Troubleshooting with the Sysinternals Tools.ppt 1007.50
1914 - Understanding Users - Groups.ppt 537.50
1915 - Vendor Management Program - Training.ppt 58.50
1916 - Virtual Private Networks GOOD.ppt 441.00
1917 - VPN 100.ppt 503.50
1918 - Vulnerabilsity Assessment.doc 56.00
1919 - W2K Domain Controllers.ppt 591.00
1920 - What is a policy.doc 61.00
1921 - What is the Safety of your privacy.doc 56.00
1922 - Why Education and Awareness.ppt 671.50
1923 - Windows 2000 Directory Services Overview.ppt 1557.50
1924 - Windows 2000 Internals 3.ppt 2393.50
1925 - Windows 2003 Server presentation.ppt 177.50
1926 - Windows NT 2k.ppt 51.50
1927 - Windows Operating System.ppt 318.00
1928 - WinSecurity.ppt 450.50
1929 - Wireless Security.ppt 169.00
1930 - Wizard Windows 2K.ppt 49.00
1931 - xDSL.ppt 466.50
1932 - Chap01.PPT 1172.50
1933 - Chap02.PPT 1048.50
1934 - Chap03.PPT 1250.00
1935 - Chap04.PPT 725.50
1936 - Chap05.PPT 1306.50
1937 - Chap06.PPT 774.50
1938 - Chap07.PPT 1203.50
1939 - Chap08.PPT 1059.50
1940 - Chap09.PPT 676.50
1941 - Chap10.PPT 474.50
1942 - Chap11.PPT 297.50
1943 - Chap12.PPT 1201.50
1944 - Chap13.PPT 1009.00
1945 - Chap14.PPT 1819.50
1946 - Chap15.PPT 590.00
1947 - Chap16.PPT 2661.50
1948 - Chap17.PPT 1019.00
1949 - Chap18.PPT 840.50
1950 - Chap19.PPT 989.00
1951 - Chap20.PPT 1288.50
1952 - Chap22.PPT 2223.00
1953 - Chap25.PPT 906.50
1954 - Exchange Topologies.ppt 938.50
1955 - Intro.ppt 67.50
1956 - Chap01.PPT 1098.00
1957 - Chap02.PPT 984.00
1958 - Chap03.PPT 1099.50
1959 - Chap04.PPT 792.00
1960 - Chap05.PPT 1358.50
1961 - Chap06.PPT 854.00
1962 - Chap07.PPT 1194.50
1963 - Chap08.PPT 1179.50
1964 - Chap09.PPT 679.00
1965 - Chap10.PPT 548.50
1966 - Chap11.PPT 191.00
1967 - Chap12.PPT 1114.00
1968 - Chap13.PPT 1107.50
1969 - Chap15.PPT 568.50
1970 - Chap16.PPT 1589.50
1971 - Chap17.PPT 671.00
1972 - Chap18.PPT 681.00
1973 - Chap19.PPT 809.50
1974 - Chap20.PPT 1851.00
1975 - Chap22.PPT 1165.50
1976 - Chap25.PPT 576.50
1977 - Intro.ppt 48.00
1978 - Data Communications.ppt 419.50
1979 - dns.ppt 159.00
1980 - EIA Wiring.doc 491.50
1981 - Fast Ethernet Training.ppt 114.00
1982 - Interconnecting Your Hubs.doc 66.50
1983 - Internetworking.ppt 118.00
1984 - Media Access Control and Physical Layer.ppt 317.00
1985 - OSI 1.ppt 251.00
1986 - Topology Raw Frames L-1-1.ppt 165.50
1987 - Unit1-kn.ppt 1347.00
1988 - Unit2-kn.ppt 2601.50
1989 - Unit3-kn.ppt 1079.00
1990 - Unit4-kn.ppt 1805.50
1991 - Unit5-kn.ppt 2169.00
1992 - Unit6-kn.ppt 1634.00
1993 - Unit7-kn.ppt 1143.50
1994 - Unit8-kn.ppt 1697.50
1995 - M1 Comintro.ppt 207.50
1996 - M10 Lan-tokn.ppt 168.00
1997 - M11 Lan-noso 8 bw.ppt 362.50
1998 - M12 bw Lan-impl.ppt 164.50
1999 - M12 Lan-prod.ppt 70.50
2000 - M13 10 bw Lan-mgmt.ppt 56.50
2001 - M14 Lan-wprl.ppt 29.50
2002 - M16 Lan-dsgn.ppt 359.50
2003 - M17 14 bw Fddi-1.ppt 268.50
2004 - M18 Lan-link.ppt 1108.50
2005 - M19 16 bw Dig-nets.ppt 996.50
2006 - M2 Com-stds.ppt 47.00
2007 - M20 Mod-dod.ppt 306.00
2008 - M21 Contplng.ppt 49.00
2009 - M22 Sec1.ppt 130.50
2010 - M23 Sec-netw.ppt 325.00
2011 - M24 Virus.ppt 89.50
2012 - M25 Mod-futr.ppt 620.00
2013 - M3 Osi-over.ppt 83.50
2014 - M5 Lan-over.ppt 150.00
2015 - M6 Lan-alts.ppt 731.00
2016 - M7 Lan-act.ppt 596.50
2017 - M8 Lan-stds.ppt 46.50
2018 - M9 Lan-8023.ppt 364.50
2019 - Mod23p.ppt 46.50
2020 - Application_Project_Lifecycle_2.vsd 77.50
2021 - DataCenter_Migration_Project_Team_2.vsd 78.50
2022 - Four_factors_Critical_to_Successful_IT_project.zip 25.48
2023 - Incident_Managmenet_Project_Tracking_2.xls 38.50
2024 - ISO9000_Project_Management_Approach_2.doc 108.00
2025 - ITIL_Service_Project_Lifecycle_Flow_2.vsd 56.50
2026 - IT_Project_Analysis_2.xls 18.50
2027 - IT_Security_Project_Tracking_Analysis_2.xls 36.50
2028 - New_Project_Request_Flows_2.vsd 78.00
2029 - PMBOK - Project Management Concepts.pdf 10508.83
2030 - Printer_Research.xls 50.00
2031 - Project_2.html 6.42
2032 - Project_2_2.html 6.95
2033 - Project_3.html 6.42
2034 - Project_4.html 6.42
2035 - Project_5.html 6.42
2036 - Project_Architecture_Migration_2.vsd 67.00
2037 - Project_Communications_Plan_2.xls 122.50
2038 - Project_Control_Tracking_2.xls 38.00
2039 - Project_Flowchart_2.vsd 101.00
2040 - Project_Lifecycle_2.vsd 114.50
2041 - Project_Management_2.ppt 146.00
2042 - Project_Management_Approach_2.doc 158.00
2043 - Project_Management_Controls_2.doc 103.50
2044 - Project_Management_Core_Competencies_2.doc 304.50
2045 - Project_Management_Process_2.doc 206.00
2046 - Project_Management_Workflow_2.vsd 75.00
2047 - Project_Retrospective_Procedure_2.doc 214.50
2048 - Project_Risk_Assessment.zip 45.37
2049 - Project_Risk_Tracking_2.xls 142.00
2050 - Project_Roles_Responsibilties_2.xls 40.00
2051 - Project_Scope_Template_2.doc 40.00
2052 - Project_Team_Role_Descriptions_2.doc 149.00
2053 - Project_Training.zip 276.15
2054 - Project_Turnover_Actions_2.xls 36.00
2055 - Samples_6.html 294.06
2056 - Sample_Information_Security_Project_Plan_2.xls 43.50
2057 - Sample_PKI_Project_Plan_2.xls 27.50
2058 - Sample_Project_2.mpp 158.00
2059 - Sample_Project_Approach_2.doc 469.50
2060 - Sample_Project_Charter_2.doc 114.50
2061 - Sample_Project_Requirements_Checklist_2.doc 123.00
2062 - Sample_Project_Resource_Coordinator_2.vsd 45.50
2063 - Counter to SurfControl Claims on their Channel Site.doc 21.00
2064 - Deployment_Guide.pdf 3218.96
2065 - Samples.html 319.52
2066 - SmartFilter PDF.pdf 5669.54
2067 - SmartFilter_vs_SurfControl.pdf 361.39
2068 - SmartFilter_vs_Websense.pdf 378.29
2069 - websense product overview.pdf 620.00
2070 - Websense v5.0 Launch Bulletin.pdf 378.70
2071 - Websense vs SurfControl.pdf 187.43
2072 - WebSense.html 2.42
2073 - websenseoverview.pdf 354.65
2074 - WebSense_2.html 2.61
2075 - WebSense_3.html 2.61
2076 - WebSense_4.html 2.42
2077 - Websense_ClientPolicyManager.pdf 308.46
2078 - Websense_IMAttachmentMgr.pdf 337.81
2079 - Websense_PremiumGroups.pdf 317.66