| 81. | - 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- By
Brad Bowers
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
| 82. | - CCNP Voice Quick Reference: Centralized Call Processing Redundancy
- By
David Schulz
- Apr 15, 2011
- This chapter reviews the mechanisms for providing call survivability and device failover in remote sites. This includes the configuration of Cisco IOS routers as Survivable Remote Site Telephony (SRST) gateways with MGCP fallback, and the use of Cisco Unified Communications Manager Express in SRST mode.
|
| 83. | - Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
- By
Shannon McFarland
- Apr 15, 2011
- Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
|
| 84. | - CCNP Security Quick Reference: Deploying Cisco ASA AnyConnect Remote-Access VPN Solutions
- By
Cristian Matei
- Apr 14, 2011
- In this chapter you learn to deploy and manage Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway with clients using AnyConnect SSL Client software.
|
| 85. | - Deploying IPv6 in WAN/Branch Networks
- By
Muninder Sambi, Sanjay Hooda, Shannon McFarland, Nikhil Sharma
- Apr 13, 2011
- This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
|
| 86. | - CCNP Voice Quick Reference: VoIP Call Legs
- By
Kevin Wallace, Toby Sauer
- Apr 5, 2011
- In this chapter from CCNP Voice CVoice 642-437 Quick Reference, you will learn about how VoIP traffic is created. Topics such as codecs and transport layers are examined in more detail.
|
| 87. | - Cisco's PPDIOO Network Cycle
- By
Sean Wilkins
- Apr 5, 2011
- This article gives an overview of the PPDIOO lifecycle, what happens at each stage, and what potential deliverables would be expected at each stage.
|
| 88. | - Basic Access List Configuration for Cisco Devices
- By
Sean Wilkins
- Apr 4, 2011
- This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
|
| 89. | - CCIE Security v3.0 Quick Reference: Application Protocols
- By
Lancy Lobo, Umesh Lakshman
- Apr 1, 2011
- This sample from CCIE Security v3.0 Quick Reference includes definitions and explanations of HTTP, HTTPS, SMTP, FTP, and DNS.
|
| 90. | - PKI Processes and Procedures
- By
Andre Karamanian, Francois Dessart, Srinivas Tenneti
- Apr 1, 2011
- Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
|
| 91. | - CCNP Security Secure 642-637 Quick Reference: Cisco Layer 2 Security
- By
Andrew Mason
- Mar 15, 2011
- This chapter describes the main types of Layer 2 attacks and how to defend against them.
|
| 92. | - Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
- By
Kevin Shatzkamer, Mark Grayson, Klaas Wierenga
- Mar 11, 2011
- This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
|
| 93. | - CCNP Security Firewall 642-617 Quick Reference: Basic Connectivity and Device Management
- By
Andrew Mason
- Mar 11, 2011
- This chapter starts to look at the configuration of the Cisco ASA and covers the fundamentals for providing basic connectivity and device management.
|
| 94. | - CCNP Voice CIPT1 642-447 Quick Reference: Single-Site On-Net Calling
- By
David Bateman
- Mar 11, 2011
- To aid in your CCNP 642-447 exam preparation, this chapter covers the configuration of CUCM for the support of on-cluster calling.
|
| 95. | - Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
- By
Mike Chapple
- Feb 22, 2011
- Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
|
| 96. | - Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
- By
Premdeep Banga
- Feb 14, 2011
- This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
|
| 97. | - Q&A with the Authors of "AAA Identity Management Security"
- By
Premdeep Banga, Brandon J. Carroll, Vivek Santuka
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
| 98. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- By
Brandon J. Carroll, Premdeep Banga, Vivek Santuka
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
| 99. | - Computer Incident Response and Product Security: Operating an Incident Response Team
- By
Damir Rajnovic
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|
| 100. | - Cisco Unified Wireless LAN Security Fundamentals
- By
Jake Woodhams, Robert Marg, Jeff Smith
- Dec 3, 2010
- This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
|