Cisco Network Technology

All Cisco Network Technology Articles

Showing 61-80 of 367

Sort by Date | Title

Page: < Prev 2 3 4 5 6 Next >

61.
Cisco IP Telephony Security Framework
By Akhil Behl
Sep 21, 2012
This chapter examines the Cisco IP Telephony Security life cycle. It also shows how to develop an IP telephony security policy, evaluate cost versus risk, determine the level of security required for your IP Telephony network, and develop Cisco IP Telephony Security Framework.
62.
Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
By Akhil Behl
Sep 18, 2012
Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
63.
Cisco IronPort ESA Web User Interface
By Chris Porter
Apr 25, 2012
This chapter covers the layout and workflow of the web user interface used for the administration of the Email Security Appliance (ESA).
64.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
By Eric Geier
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
65.
Network Security First-Step: Firewalls
By Donald Stoddard, Thomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
66.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
67.
Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
By Rue Green
Jan 3, 2012
This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
68.
Connecting Non-802.1X Devices to an Enterprise Network
By Eric Geier
Sep 27, 2011
Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
69.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
By Eric Geier
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
70.
Cisco Unified Contact Center Enterprise Platform Deployment
By Gary Ford
Jul 27, 2011
71.
Set Up Multiple SSIDs and VLANs on a DD-WRT Router
By Eric Geier
Jul 19, 2011
DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
72.
Designing Voicemail Systems with Cisco Unity Connection
By David Schulz
Jul 14, 2011
This chapter focuses on the Cisco Unity Connection product design and capabilities as they pertain to its various systems, database, and networking.
73.
Cisco Firewall Configuration Fundamentals
By Alexandre M.S.P. Moraes
Jul 8, 2011
This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
74.
Crafting the Test Approach
By Andy Sholomon, Tom Kunath
May 11, 2011
This chapter will begin to fill in the practical details of what is necessary to build an effective approach toward different types of test requests. It begins with a suggested approach for assessing and scoping a test project, and offers guidance and best practices.
75.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
76.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
By Shannon McFarland
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
77.
Deploying IPv6 in WAN/Branch Networks
By Muninder Sambi, Sanjay Hooda, Shannon McFarland, Nikhil Sharma
Apr 13, 2011
This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
78.
PKI Processes and Procedures
By Andre Karamanian, Francois Dessart, Srinivas Tenneti
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
79.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
By Kevin Shatzkamer, Mark Grayson, Klaas Wierenga
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
80.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
By Mike Chapple
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.

Page: < Prev 2 3 4 5 6 Next >