Ben Rothke

Ben
Rothke

Ben Rothke is a consultant with Ernst & Young’s Information Security Services Practice.

Articles
How to Implement Microsoft Windows NT Server 4
How to Implement Microsoft Windows NT Server 4

Perusing the latest Windows NT titles, I sense an unwritten requirement that technical books must be at least 3" thick. Many NT books that claim to cover numerous topics are well over 1200 pages long. Readers often have a hard time finding the answers they need in such books.

Looking into Windows NT
"Looking into Windows NT: A Before-You-Leap Guide to Microsoft's Network Solution" is the first book to address the NT purchase from a business standpoint.
Windows NT Server 4 Unleashed
Taming the beast and taking control of the NT network.
Windows NT Security Handbook
If you need a guide to NT system security and general information system security, get a copy of Tom Sheldon's "Window NT Security Handbook"
Token-Based Security Add-Ons 3
Two-factor authentication adds a level of security to ordinary password authentication.
The Case Against C2 4
C2 is outdated, military-based specification that does not address the security needs of today's corporate computing environment.
Additional Reading About Computer Security
A list of security books and ordering information.
Hyper-V Master Class

Hyper-V Master Class with John Savill
Live Online Training: Thursdays, April 27th to May 18th
Register by April 20th and Save 20%!

John Savill provides 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment covering both capabilities in Windows Server 2012 R2 and Windows Server 2016. John will walk attendees through resource allocation and architecture, storage, networking (including Network Virtualization), clustering, migration technologies, replication, private cloud, session virtualization, migration from other technologies, integration with Microsoft Azure, and more. At the end of this class, attendees will be able to architect and manage an enterprise-level Hyper-V environment.

 

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×