Vi ste ovdje
Overview/Description
The Lotus Notes calendar is a key application in the Lotus Notes 8 client that allows users to effectively manage their time and streamline the way they work. Using the Calendar, you can share your free and busy time with colleagues, as well as create and book meetings. This course discusses the calendar interface and how to book appointments and meetings with colleagues. This course also shows you how to set up Notes 8 applications to fulfill a variety of other user functions, and shows you how to create and format documents within those applications. Configuring and...
Overview/Description
The Outlook 2013 Calendar allows you to create appointments and events, as well as schedule meetings. The Calendar is fully integrated with the other components of Microsoft Outlook 2013 allowing you to easily incorporate your contacts and e-mail functionality with the Calendar. This course introduces the major components of the Calendar and discusses how to create appointments and events. Microsoft Outlook 2013 also provides the Tasks feature to help keep you organized and to assist you with the various tasks that you need to process on a daily basis. This course...
Overview/Description
The ability to search data is a crucial component of any enterprise application, and Microsoft Office SharePoint Server 2007 provides features to enable this ability. This course describes how to use the Search Service provided by MOSS 2007, including how to enhance the Search Service and how to customize search pages. It also examines how to display results using the Search Web Service and how to further enhance this service through customization.This course is one of a series in the SkillSoft learning path that covers the objectives for the Technology Specialist (TS):...
Overview/Description
The ability to properly secure, debug and deploy applications to variety of user environments is a necessity. This course examines how applications are tested ad secured as well as how they are deployed and managed after they are built. Specific areas covered include debugging and securing Applications, creating and configuring deployment options, and managing how updates are made. This course is one of a series in the SkillSoft learning path that covers the objectives for the Technology Specialist (TS): Windows Applications Development with Microsoft .NET Framework 4...
Overview/Description
The ability to properly secure, debug and deploy applications to a variety of user environments is a necessity. This course examines how applications are tested and secured as well as how they are deployed and managed after they are built. Specific areas covered include debugging and securing Applications, creating and configuring deployment options, and managing how updates are made. This course is one of a series in the SkillSoft learning path that covers the objectives for the Technology Specialist (TS): Windows Applications Development with Microsoft .NET Framework 4...
Overview/Description
This course shows how to implement security features such as transport and message-level security, and authentication, authorization and impersonation in a .NET Windows Communication Foundation (WCF) application. It demonstrates how to enable WCF applications to implement ASP.NET security features. It covers how to use features such as tracing, logging, and performance counters to monitor a WCF application. It also covers the different tools available for monitoring configuration. This course is one of a series in the SkillSoft learning path that covers the objectives for...
Overview/Description
This course shows how to implement security features such as transport and message-level security, and authentication, authorization and impersonation in a .NET Windows Communication Foundation (WCF) application. It demonstrates how to enable WCF applications to implement ASP.NET security features. It covers how to use features such as tracing, logging, and performance counters to monitor a WCF application. It also covers the different tools available for monitoring configuration. This course is one of a series in the SkillSoft learning path that covers the objectives for...
Overview/Description
To describe how to implement and maintain UNIX networking
Target Audience
IT professionals working in a UNIX environment for the first time
Prerequisites
A basic understanding of the UNIX operating system; familiarity with the history of UNIX and the reasons for its continued popularity; general comprehension of UNIX system architecture, and awareness of the user interfaces
Expected Duration (hours)
3.3
Lesson ObjectivesSecuring UNIX Systems
describe how UNIX file attributes relate to file ownership and access rights.
recognize how to protect the security of entire UNIX...
Overview/Description
One of the most important steps in the purchasing process is to select the supplier that best meets your organization's purchase needs. To help with this part of the process, organizations develop supplier evaluation criteria and use tools designed to conduct a comprehensive and objective evaluation of suppliers. Once the supplier is chosen, the next step is to formalize the deal through a contract that outlines the terms of the supplier-buyer relationship. Reaching agreement with suppliers over contract terms requires purchasers to be effective negotiators. This course...
Overview/Description
Enterprise Administrators must be knowledgeable about the features and benefits virtualization technologies have to offer and how these technologies can help them reduce costs and administrative resources. This course covers key virtualization techniques that can be implemented in the enterprise infrastructure, concentrating on server and application virtualization. This includes virtual server consolidation using Windows Server 2008 Hyper-V functionality, as well as the management products available to configure the virtual servers and centrally manage their performance...