Having heard some good things about Applications Manager 11 , I decided to take it for a test drive.
This article continues the discussion of BYOD policies by discussing some additional aspects of BYOD security planning.
In this part of the article series we'll discuss boundaries, boundary groups and AD discovery.
In this article the author explores a couple of security vulnerabilities in consumer and small business-class routers and explains how to prevent your network against these threats.
The fourth and final article in this series demonstrates how to provision iSCSI volumes using Windows Server 2012.