Chapters & Articles

All Articles

Showing 101-120 of 544

Sort by Date | Title | Popularity

101.
An Ideal Programmer
By Ed Tittel
Nov 24, 2010
Ed Tittel, creator of the Exam Cram series, considers the qualifications that make for the best prospective programming candidates.
102.
CCIE Routing & Switching v4.0 Quick Reference: Network Optimization
By Brad Ellis, Steven Means, Jacob Uecker
Oct 27, 2010
This quick reference for CCIE Routing and Switching exam-takers covers SLAs, NetFlow, SPAN, RSPAN, and RITE, and Cisco IOS EEM.
103.
CCNA Voice: Everything’s Changing... Again!
By Jeremy Cioara
Oct 21, 2010
Jeremy Cioara discusses the new CCNA Voice certification, its role in your CCVP journey, and what to expect in your studies.
104.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
By Brad Bowers
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
105.
Getting Owned: The USB Keystroke Injection Attack
By Seth Fogie
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
106.
VoIP Deployment Models in Service Provider Networks
By Adeel Ahmed, Habib Madani, Talal Siddiqui
Oct 5, 2010
This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
107.
Developing Network Security Strategies
By Priscilla Oppenheimer
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
108.
Discovering the Upcoming Wi-Fi Direct Standard
By Eric Geier
Aug 16, 2010
See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.
109.
Security in Tcl Scripts for Cisco IOS
By Arvind Durai, Raymond Blair, John Lautmann
Aug 10, 2010
This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
110.
CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control
By Diane Teare
Aug 5, 2010
This chapter covers implementing path control, focusing on understanding and implementing path control as well as advanced path control tools.
111.
WLAN Design: Range, Performance, and Roaming Considerations
By Jim Geier
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
112.
Configuration of Frame Mode MPLS
By David Hucaby, Steve McQuerry, Andrew Whitaker
Jul 28, 2010
This chapter covers the background and configuration of frame mode Multiprotocol Label Switching (MPLS).
113.
Configuring the Cisco Unified Personal Communicator
By Brian Morgan, Shane Lisenbea, Michael Popovich
Jul 27, 2010
This chapter covers the client installation, configuration, basic and advanced features, and client-side troubleshooting of the Cisco Unified Personal Communicator.
114.
CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
By William G. Daniel
Jul 21, 2010
William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
115.
CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
By Jerome Henry
Jul 20, 2010
This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
116.
Introduction to Cisco NX-OS
By David Jansen, Kevin Corbin, Ron Fuller
Jul 19, 2010
This chapter provides an introduction and overview of NX-OS and a comparison between traditional IOS and NX-OS configurations and terminology.
117.
Analyzing the Cisco Enterprise Campus Architecture
By Balaji Sivasubramanian, Erum Frahim, Richard Froom
Jul 15, 2010
This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
118.
CCIE Routing and Switching Practice Lab 3—The VPN Lab
By Martin J. Duggan
Jul 14, 2010
This chapter guides you through the equipment requirements and pre-lab tasks in preparation for taking the VPN practice lab.
119.
Cisco Data Center Virtualization Server Architectures
By Roger Andersson, Silvano Gai, Tommi Salli
Jul 1, 2010
This chapter examines processor, memory, and I/O subsystems with particular reference to servers built according to the IA-32, often generically called x86 architecture.
120.
Network Security Auditing Tools and Techniques
By Chris Jackson
Jun 29, 2010
This chapter discusses software tools and techniques auditors can use to test network security controls. Security testing as a process is covered, but the focus is on gathering the evidence useful for an audit.