Chapters & Articles

All Articles

Showing 81-100 of 544

Sort by Date | Title | Popularity

Page: « Prev 3 4 5 6 7 Next »

81.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
82.
CCNP Voice Quick Reference: Centralized Call Processing Redundancy
By David Schulz
Apr 15, 2011
This chapter reviews the mechanisms for providing call survivability and device failover in remote sites. This includes the configuration of Cisco IOS routers as Survivable Remote Site Telephony (SRST) gateways with MGCP fallback, and the use of Cisco Unified Communications Manager Express in SRST mode.
83.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
By Shannon McFarland
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
84.
CCNP Security Quick Reference: Deploying Cisco ASA AnyConnect Remote-Access VPN Solutions
By Cristian Matei
Apr 14, 2011
In this chapter you learn to deploy and manage Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway with clients using AnyConnect SSL Client software.
85.
Deploying IPv6 in WAN/Branch Networks
By Muninder Sambi, Sanjay Hooda, Shannon McFarland, Nikhil Sharma
Apr 13, 2011
This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
86.
CCNP Voice Quick Reference: VoIP Call Legs
By Kevin Wallace, Toby Sauer
Apr 5, 2011
In this chapter from CCNP Voice CVoice 642-437 Quick Reference, you will learn about how VoIP traffic is created. Topics such as codecs and transport layers are examined in more detail.
87.
Cisco's PPDIOO Network Cycle
By Sean Wilkins
Apr 5, 2011
This article gives an overview of the PPDIOO lifecycle, what happens at each stage, and what potential deliverables would be expected at each stage.
88.
Basic Access List Configuration for Cisco Devices
By Sean Wilkins
Apr 4, 2011
This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
89.
CCIE Security v3.0 Quick Reference: Application Protocols
By Lancy Lobo, Umesh Lakshman
Apr 1, 2011
This sample from CCIE Security v3.0 Quick Reference includes definitions and explanations of HTTP, HTTPS, SMTP, FTP, and DNS.
90.
PKI Processes and Procedures
By Andre Karamanian, Francois Dessart, Srinivas Tenneti
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
91.
CCNP Security Secure 642-637 Quick Reference: Cisco Layer 2 Security
By Andrew Mason
Mar 15, 2011
This chapter describes the main types of Layer 2 attacks and how to defend against them.
92.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
By Kevin Shatzkamer, Mark Grayson, Klaas Wierenga
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
93.
CCNP Security Firewall 642-617 Quick Reference: Basic Connectivity and Device Management
By Andrew Mason
Mar 11, 2011
This chapter starts to look at the configuration of the Cisco ASA and covers the fundamentals for providing basic connectivity and device management.
94.
CCNP Voice CIPT1 642-447 Quick Reference: Single-Site On-Net Calling
By David Bateman
Mar 11, 2011
To aid in your CCNP 642-447 exam preparation, this chapter covers the configuration of CUCM for the support of on-cluster calling.
95.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
By Mike Chapple
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
96.
Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
By Premdeep Banga
Feb 14, 2011
This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
97.
Q&A with the Authors of "AAA Identity Management Security"
By Premdeep Banga, Brandon J. Carroll, Vivek Santuka
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
98.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
By Brandon J. Carroll, Premdeep Banga, Vivek Santuka
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
99.
Computer Incident Response and Product Security: Operating an Incident Response Team
By Damir Rajnovic
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
100.
Cisco Unified Wireless LAN Security Fundamentals
By Jake Woodhams, Robert Marg, Jeff Smith
Dec 3, 2010
This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).

Page: « Prev 3 4 5 6 7 Next »