Chapters & Articles

All Articles

Showing 21-40 of 544

Sort by Date | Title | Popularity

21.
Cisco IronPort ESA Web User Interface
By Chris Porter
Apr 25, 2012
This chapter covers the layout and workflow of the web user interface used for the administration of the Email Security Appliance (ESA).
22.
(Video) Exam Profile: Cisco CCNP Security IPS
By Keith Barker
Apr 24, 2012
The Cisco Certified Network Professional Security IPS exam is one of the four exams that must be passed to obtain the Cisco CCNP Security certification. Find out what you can expect to see on this exam and how you can better prepare for it.
23.
Data Center Architecture and Technologies in the Cloud
By Venkata Josyula, Malcolm Orr, Greg Page
Mar 20, 2012
This chapter provides an overview of the architectural principles and infrastructure designs needed to support a new generation of real-time-managed IT service use cases in the data center.
24.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
By Eric Geier
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
25.
Network Security First-Step: Firewalls
By Donald Stoddard, Thomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
26.
Network Verification Commands Review
By Sean Wilkins
Jan 25, 2012
This article takes a look at some of the most basic network verification commands that can be used on Cisco equipment and discusses the information that can be obtained from these commands.
27.
CCIE Voice v3.0 Quick Reference: Cisco Unified Communications Manager
By Mark Lewis
Jan 17, 2012
This quick reference covers best practices for the deployment of Cisco Unified Communications Manager as well as an overview of compatible codecs and regions.
28.
What the Failed AT&T / T-Mobile Merger Means for You
By Leo Wrobel, Eddie Pope, Sharon Wrobel
Jan 12, 2012
The AT&T / T-Mobile deal is dead and buried. What does this mean for the telecom industry, and more importantly, what does it mean for you, the consumer?
29.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
30.
Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
By Rue Green
Jan 3, 2012
This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
31.
CCNA ICND2 Cert Guide: Variable Length Subnet Masks
By Wendell Odom
Dec 19, 2011
This chapter introduces VLSM, including VLSM Concepts and Configuration, Finding VLSM Overlaps, Adding New Subnets to an Existing VLSM Design, and Designing a Subnetting Plan Using VLSM.
32.
CCNP Security Firewall Cert Guide: Recording ASA Activity
By Anthony Sequeira, Dave Garneau, David Hucaby
Dec 16, 2011
To help you prepare for the CCNP Security Firewall 642-617 exam, this chapter covers System Time, Managing Event and Session Logging, Configuring Event and Session Logging, Verifying Event and Session Logging, and Troubleshooting Event and Session Logging.
33.
CCIE Routing and Switching v4.0: Troubleshooting Lab 1 (The Warm-Up)
By Martin Duggan
Dec 12, 2011
This troubleshooting lab has been timed to last for 2 hours and be representative of the format and difficulty of the tasks you are likely to encounter on your CCIE lab exam.
34.
Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP)
By John Tiso
Dec 8, 2011
This chapter examines a select number of topics on both advance IP addressing and design issues with Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF).
35.
The AT&T / T-Mobile Merger: So What Happens Now?
By Eddie Pope, Leo Wrobel, Sharon Wrobel
Dec 2, 2011
Will the AT&T / T-Mobile merger end from "death by 1000 cuts" if opposition by the DOJ, FCC, competitors and consumer groups proves insurmountable? If so, what happens next?
36.
Cloud Computing: Orchestrating and Automating Technical Building Blocks
By Venkata Josyula, Malcolm Orr, Greg Page
Nov 28, 2011
This chapter provides a detailed overview of how an Infrastructure as a Service (IaaS) service is orchestrated and automated.
37.
CCNP Security: Intrusion Prevention and Intrusion Detection Systems
By David Burns, Odunayo Adesina, Keith Barker
Nov 22, 2011
This chapter covers evaluating and choosing approaches to intrusion prevention and detection.
38.
The TCP/IP and OSI Networking Models
By Wendell Odom
Nov 21, 2011
This chapter explains the terminology and concepts behind TCP/IP. It also explains the terminology behind the OSI networking model in comparison to TCP/IP.
39.
CCNP: Troubleshooting OSPF
By Anthony Sequeira
Nov 14, 2011
In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
40.
CCNA Voice 640-461: Understanding the Cisco IP Phone Concepts and Registration
By Jeremy Cioara, Michael Valentine
Oct 27, 2011
This chapter walks you through the key concepts and technologies used to build a Cisco VoIP network while working towards your CCNA Voice certification.