General Networking

All General Networking Articles

Showing 61-80 of 329

Sort by Date | Title

Page: < Prev 2 3 4 5 6 Next >

61.
Network Security First-Step: Firewalls
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
62.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
63.
Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
Jan 3, 2012
This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
64.
Connecting Non-802.1X Devices to an Enterprise Network
Sep 27, 2011
Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
65.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
66.
Cisco Unified Contact Center Enterprise Platform Deployment
Jul 27, 2011
67.
Set Up Multiple SSIDs and VLANs on a DD-WRT Router
Jul 19, 2011
DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
68.
Designing Voicemail Systems with Cisco Unity Connection
Jul 14, 2011
This chapter focuses on the Cisco Unity Connection product design and capabilities as they pertain to its various systems, database, and networking.
69.
Cisco Firewall Configuration Fundamentals
Jul 8, 2011
This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
70.
Crafting the Test Approach
May 11, 2011
This chapter will begin to fill in the practical details of what is necessary to build an effective approach toward different types of test requests. It begins with a suggested approach for assessing and scoping a test project, and offers guidance and best practices.
71.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
72.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
73.
Deploying IPv6 in WAN/Branch Networks
Apr 13, 2011
This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
74.
PKI Processes and Procedures
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
75.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
76.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
77.
Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
Feb 14, 2011
This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
78.
Q&A with the Authors of "AAA Identity Management Security"
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
79.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
80.
Computer Incident Response and Product Security: Operating an Incident Response Team
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.

Page: < Prev 2 3 4 5 6 Next >