| 101. | - An Ideal Programmer
- By
Ed Tittel
- Nov 24, 2010
- Ed Tittel, creator of the Exam Cram series, considers the qualifications that make for the best prospective programming candidates.
|
| 102. | - CCIE Routing & Switching v4.0 Quick Reference: Network Optimization
- By
Brad Ellis, Steven Means, Jacob Uecker
- Oct 27, 2010
- This quick reference for CCIE Routing and Switching exam-takers covers SLAs, NetFlow, SPAN, RSPAN, and RITE, and Cisco IOS EEM.
|
| 103. | - CCNA Voice: Everything’s Changing... Again!
- By
Jeremy Cioara
- Oct 21, 2010
- Jeremy Cioara discusses the new CCNA Voice certification, its role in your CCVP journey, and what to expect in your studies.
|
| 104. | - The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- By
Brad Bowers
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
| 105. | - Getting Owned: The USB Keystroke Injection Attack
- By
Seth Fogie
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
|
| 106. | - VoIP Deployment Models in Service Provider Networks
- By
Adeel Ahmed, Habib Madani, Talal Siddiqui
- Oct 5, 2010
- This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
|
| 107. | - Developing Network Security Strategies
- By
Priscilla Oppenheimer
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
| 108. | - Discovering the Upcoming Wi-Fi Direct Standard
- By
Eric Geier
- Aug 16, 2010
- See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.
|
| 109. | - Security in Tcl Scripts for Cisco IOS
- By
Arvind Durai, Raymond Blair, John Lautmann
- Aug 10, 2010
- This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
|
| 110. | - CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control
- By
Diane Teare
- Aug 5, 2010
- This chapter covers implementing path control, focusing on understanding and implementing path control as well as advanced path control tools.
|
| 111. | - WLAN Design: Range, Performance, and Roaming Considerations
- By
Jim Geier
- Aug 3, 2010
- This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
|
| 112. | - Configuration of Frame Mode MPLS
- By
David Hucaby, Steve McQuerry, Andrew Whitaker
- Jul 28, 2010
- This chapter covers the background and configuration of frame mode Multiprotocol Label Switching (MPLS).
|
| 113. | - Configuring the Cisco Unified Personal Communicator
- By
Brian Morgan, Shane Lisenbea, Michael Popovich
- Jul 27, 2010
- This chapter covers the client installation, configuration, basic and advanced features, and client-side troubleshooting of the Cisco Unified Personal Communicator.
|
| 114. | - CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
- By
William G. Daniel
- Jul 21, 2010
- William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
|
| 115. | - CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
- By
Jerome Henry
- Jul 20, 2010
- This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
|
| 116. | - Introduction to Cisco NX-OS
- By
David Jansen, Kevin Corbin, Ron Fuller
- Jul 19, 2010
- This chapter provides an introduction and overview of NX-OS and a comparison between traditional IOS and NX-OS configurations and terminology.
|
| 117. | - Analyzing the Cisco Enterprise Campus Architecture
- By
Balaji Sivasubramanian, Erum Frahim, Richard Froom
- Jul 15, 2010
- This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
|
| 118. | - CCIE Routing and Switching Practice Lab 3—The VPN Lab
- By
Martin J. Duggan
- Jul 14, 2010
- This chapter guides you through the equipment requirements and pre-lab tasks in preparation for taking the VPN practice lab.
|
| 119. | - Cisco Data Center Virtualization Server Architectures
- By
Roger Andersson, Silvano Gai, Tommi Salli
- Jul 1, 2010
- This chapter examines processor, memory, and I/O subsystems with particular reference to servers built according to the IA-32, often generically called x86 architecture.
|
| 120. | - Network Security Auditing Tools and Techniques
- By
Chris Jackson
- Jun 29, 2010
- This chapter discusses software tools and techniques auditors can use to test network security controls. Security testing as a process is covered, but the focus is on gathering the evidence useful for an audit.
|