341. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|
342. | - Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
- Jan 3, 2012
- This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
|
343. | - CCNA ICND2 Cert Guide: Variable Length Subnet Masks
- Dec 19, 2011
- This chapter introduces VLSM, including VLSM Concepts and Configuration, Finding VLSM Overlaps, Adding New Subnets to an Existing VLSM Design, and Designing a Subnetting Plan Using VLSM.
|
344. | - CCNP Security Firewall Cert Guide: Recording ASA Activity
- By
David Hucaby
- Dec 16, 2011
- To help you prepare for the CCNP Security Firewall 642-617 exam, this chapter covers System Time, Managing Event and Session Logging, Configuring Event and Session Logging, Verifying Event and Session Logging, and Troubleshooting Event and Session Logging.
|
345. | - CCIE Routing and Switching v4.0: Troubleshooting Lab 1 (The Warm-Up)
- Dec 12, 2011
- This troubleshooting lab has been timed to last for 2 hours and be representative of the format and difficulty of the tasks you are likely to encounter on your CCIE lab exam.
|
346. | - Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP)
- Dec 8, 2011
- This chapter examines a select number of topics on both advance IP addressing and design issues with Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF).
|
347. | - The AT&T / T-Mobile Merger: So What Happens Now?
- Dec 2, 2011
- Will the AT&T / T-Mobile merger end from "death by 1000 cuts" if opposition by the DOJ, FCC, competitors and consumer groups proves insurmountable? If so, what happens next?
|
348. | - Cloud Computing: Orchestrating and Automating Technical Building Blocks
- Nov 28, 2011
- This chapter provides a detailed overview of how an Infrastructure as a Service (IaaS) service is orchestrated and automated.
|
349. | - CCNP Security: Intrusion Prevention and Intrusion Detection Systems
- Nov 22, 2011
- This chapter covers evaluating and choosing approaches to intrusion prevention and detection.
|
350. | - The TCP/IP and OSI Networking Models
- Nov 21, 2011
- This chapter explains the terminology and concepts behind TCP/IP. It also explains the terminology behind the OSI networking model in comparison to TCP/IP.
|
351. | - CCNP: Troubleshooting OSPF
- Nov 14, 2011
- In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
|
352. | - CCNA Voice 640-461: Understanding the Cisco IP Phone Concepts and Registration
- Oct 27, 2011
- This chapter walks you through the key concepts and technologies used to build a Cisco VoIP network while working towards your CCNA Voice certification.
|
353. | - 31 Days Before Your CompTIA A+ Exams, Day 31: Storage
- Oct 22, 2011
- This chapter starts out your last month of A+ exam prep by describing names, purposes, and characteristics of storage devices.
|
354. | - CCDA DESGN 640-864: Designing Remote Connectivity
- Oct 6, 2011
- This chapter discusses wide-area network technologies and design and includes sections covering Identifying WAN Technology Considerations, Designing the Enterprise WAN, and Designing the Enterprise Branch.
|
355. | - Implementing Cisco Unified Communications Manager: Digit Manipulation (CCNP Voice)
- Oct 1, 2011
- This chapter describes digit manipulation tools that allow a CUCM administrator to implement flexibility and transparency in the dial plan of a company.
|
356. | - Connecting Non-802.1X Devices to an Enterprise Network
- Sep 27, 2011
- Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
|
357. | - Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
- Sep 20, 2011
- Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
|
358. | - AT&T/T-Mobile Merger: Let's Call It What It Is, Part II
- Sep 14, 2011
- As two of the largest wireless carriers in the U.S. prepare to join forces, Leo A. Wrobel and special guest author Eddie M. Pope, Esq. explain why the U.S. Department of Justice thinks of this collaboration as a threat - and why you should be equally alarmed.
|
359. | - CCNA SEC: Router Hardening
- Sep 14, 2011
- This article discusses various means of making sure your routers are set up with maximum security, including manually hardening the router and router hardening with Cisco SDM.
|
360. | - AT&T/T-Mobile Merger: Let’s Call It What It Is
- Sep 5, 2011
- Anyone who has ever taken a basic economics course knows that fewer players in an industry lead to higher prices and more limited choice, absent regulatory oversight. Noted author and technical futurist Leo Wrobel explains why the AT&T/ T-Mobile merger is a bad idea – for consumers, the market, and even the U.S. Constitution – and how the future of the Internet itself is at stake.
|