Asher Online Library
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Information Technology

None

Common Sense Guide to Mitigating Insider Threats, Fifth Edition

A comprehensive collection of best practices for controlling and addressing insider computer security threats based on the continued research and analysis of the Software Engineering Institute at Carnegie Mellon University. Recommendations are based on the analysis of more than 1,000 cases of insider threat.
View Online

Common Sense Guide to Mitigating Insider Threats, Sixth Edition

A comprehensive collection of best practices for controlling and addressing insider computer security threats based on the continued research and analysis of the Software Engineering Institute at Carnegie Mellon University. Recommendations are based on the analysis of more than 1,000 cases of insider threat.
View Online

Preparing for the MD-100 Windows 10 Exam (August 2020 Update0

Blog entry from Mark O’Shea, Microsoft MVP Windows and Devices and IT. Provides many helpful resources to review in preparing for the MD-100: Windows 10 exam.
View Online

National Institute of Standards and Technology

Collection of standards, guidelines, reccomendations and research on the security and privacy of information and information systems
View Online

Cybersecurity Supply Chain Risk Management

NIST approach to mitigating supply chain cybersecurity threats.
View Online

Hardware-enable Security: Policy-Based Governance in Trusted Container platforms

This report explains an approach on hardware-enabled security techniques and technologies for safeguarding container deploments in muti-tenant cloud environments. It also describes a prototype implementation of the apporach intended to be a blueprint or template for the general secuirty community.
View Online

Use a Troubleshooting Methodology for More Efficient IT Support

CompTIA’s 7 step process that frames the problem and guides IT professionals how on to identify and problem and execute a solution.
View Online

Omni Antenna vs. Directional Antenna

This document gives basic antenna definitions and discusses antenna concepts with a focus on the pros and cons of omni and directional antennas.
View Online

Network Toplogy: 6 Network Topolgies Explained & Compared

This guide discussed the advantages and disadvantages of each type of network topology, why a certain toplogy should be chosen, network topology mapping software, and topology mapping and diagram software.
View Online

IP Adressing and Subnetting for New Users

This document provides basic information needed in order to configure your router for routing IP, such as how addresses are broken down and how subnetting works. It also discusses how to assign each interfaceon the router of an IP address witha unique subnet.
View Online

Installing Ubuntu on a PC.

This is an installation guide for unbuntu on a PC. It will cover the recommended devices, downloading an ubuntu image, creating a bootable USB stick, booting froma flash drive, drive management, enabling encryption, choosing a location, and completing installation.
View Online

IP Address Management (IPAM) Best Practices for VM’s

An explanation of the management of IP addresses in virtualized environments and how to effectively plan the use of IP addresses.
View Online

How to Fix VirtualBox Error: Kernel Driver Not Installed (rc=-1908)

Virtual machines installation errors on MacOS’s are common and the this guide will show you how to resolve the most common error message.
View Online

How to Create a Linux Virtual Machine (VM)

This article will discuss what a virtual machine is and how to create a VM for a Linux environment
View Online

DHCP( Dynamic Host Configuration Protocol) Basics

DHCP is a standard protocol defined by RFC 1541 (which is superseeded by RFC 2131) that allows a server to dynamically distribute IP addressing and configuration information to clients. This reference will discuss the basics of DHCP and troubleshooting guidance.
View Online

8 Steps to Understanding IP Subnetting

This provides a breakdown of why subnets are important, how to understand binary numbers, subnetting and the subnet mask, public vs. private IP addresses, CIDR IP addressing, variable length subnet masking, and IPv6 addressing.
View Online

Linux Commands

This article provides a beginners guide to the basics of GNU/Linux command line. the tutorial will wlak through the basic Linnux commands related to navigation, file and directory administration, software installation, and basic system troubleshooting.
View Online

SANS Information Security White Papers

This resource provides the latest publications on insights related to cybersecurity, security awareness, and cyber defense as it pertains to IT essentials.
View Online