| 1. | - Best Practices for Deploying Secure Cisco IP Telephony Solutions
- By
Akhil Behl
- Oct 31, 2012
- A brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
|
| 2. | - Creating Your Own VPN
- By
Eric Geier
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|
| 3. | - The Art of the Data Center: Bahnhof - Stockholm, Sweden
- By
Douglas Alger
- Oct 9, 2012
- Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
|
| 4. | - Eight Cool Things You Probably Don’t Know About Data Centers
- By
Douglas Alger
- Sep 27, 2012
- Doug Alger, author of The Art of the Data Center, discusses eight cool things most people don’t realize about Data Centers in this InformIT exclusive audio segment.
|
| 5. | - Cisco IP Telephony Security Framework
- By
Akhil Behl
- Sep 21, 2012
- This chapter examines the Cisco IP Telephony Security life cycle. It also shows how to develop an IP telephony security policy, evaluate cost versus risk, determine the level of security required for your IP Telephony network, and develop Cisco IP Telephony Security Framework.
|
| 6. | - Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
- By
Akhil Behl
- Sep 18, 2012
- Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
|
| 7. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- By
Eric Geier
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
| 8. | - Network Security First-Step: Firewalls
- By
Donald Stoddard, Thomas M. Thomas
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
| 9. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- By
Brad Bowers
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|
| 10. | - Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
- By
Rue Green
- Jan 3, 2012
- This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
|
| 11. | - Connecting Non-802.1X Devices to an Enterprise Network
- By
Eric Geier
- Sep 27, 2011
- Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
|
| 12. | - Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
- By
Eric Geier
- Sep 20, 2011
- Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
|
| 13. | - Cisco Unified Contact Center Enterprise Platform Deployment
- By
Gary Ford
- Jul 27, 2011
|
| 14. | - Set Up Multiple SSIDs and VLANs on a DD-WRT Router
- By
Eric Geier
- Jul 19, 2011
- DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
|
| 15. | - Designing Voicemail Systems with Cisco Unity Connection
- By
David Schulz
- Jul 14, 2011
- This chapter focuses on the Cisco Unity Connection product design and capabilities as they pertain to its various systems, database, and networking.
|
| 16. | - Cisco Firewall Configuration Fundamentals
- By
Alexandre M.S.P. Moraes
- Jul 8, 2011
- This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
|
| 17. | - Crafting the Test Approach
- By
Andy Sholomon, Tom Kunath
- May 11, 2011
- This chapter will begin to fill in the practical details of what is necessary to build an effective approach toward different types of test requests. It begins with a suggested approach for assessing and scoping a test project, and offers guidance and best practices.
|
| 18. | - 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- By
Brad Bowers
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
| 19. | - Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
- By
Shannon McFarland
- Apr 15, 2011
- Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
|
| 20. | - Deploying IPv6 in WAN/Branch Networks
- By
Muninder Sambi, Sanjay Hooda, Shannon McFarland, Nikhil Sharma
- Apr 13, 2011
- This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
|