Chapters & Articles

All Articles

Showing 381-400 of 854

Sort by Date | Title

381.
Getting Started with the Cisco PIX Firewall
Apr 11, 2003
382.
Green Data Center Design and Build Strategies
Aug 12, 2009
This chapter discusses methods for limiting the environmental impact that occurs during the construction of a Data Center.
383.
Hacking AI Systems
Apr 17, 2024
384.
Haven't We Been Here Before? A Case for IP Telephony
Feb 13, 2004
In this sample chapter, Kevin Brown explains why a PBX, despite its high reliability, is not a solution for convergence.
385.
High Availability Commands for CCNP BCMSN
Nov 30, 2007
386.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
387.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
388.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
389.
Hot Standby Router Protocol (HSRP) Configuration
Sep 23, 2013
In this article, networking consultant Sean Wilkins explains how Hot Standby Redundancy Protocol (HSRP) devices communicate together. The article then delves into the commands and configuration steps required to get HSRP up and operating between devices.
390.
How a LAN Switch Works
Dec 17, 2004
This chapter explains how frame switching works, and what precisely happens while a frame is switching.
391.
How Apple's iPhone is Changing the Game Plan for Mobile Service Operators: An Interview with Mark Grayson and Kevin Shatzkamer
Jun 30, 2009
Linda Leung, Mark Grayson, and Kevin Shatzkamer discuss how mobile operators can implement all-IP networks, what enterprises and service providers can learn from each other, and how IPv6 affects the mobile world.
392.
How Can I Possibly Learn Everything in the New ICND1?
May 2, 2013
Anthony Sequeira provides steps you can follow that should help you pursue excellence in entry-level Cisco certifications.
393.
How Can I Possibly Learn Everything in the New ICND2?
May 2, 2013
Anthony Sequeira breaks down the ICND2 exam content, letter for letter, with a focus on scope that you should know.
394.
How Does Cisco's Overhaul of the CCNP Certification Affect CCNP Candidates? An Interview with Wendell Odom
Feb 8, 2010
Linda Leung and Wendell Odom discuss the major changes in the new Cisco CCNP exams.
395.
How This Book Can Help You Achieve Business Goals
Feb 15, 2002
This chapter gives you a view into the services that some organizations and businesses have developed to help them solve three important business goals: increase productivity, gain the competitive advantage, and generate revenue.
396.
How to Configure OpenVPN
Sep 8, 2006
Michael Riley shows you how to use OpenVPN for secure internet surfing on your client PCs. He’ll also help you set up the configuration that will allow you access to your home network while you’re traveling.
397.
How to Network Windows 7, Vista, and XP Computers
Nov 13, 2009
Upgrading to Windows 7 but still have XP or Vista machines? No problem. Eric Geier shows you how to network among all these Windows versions.
398.
How to Perform a Security Audit - Part 1
Dec 21, 2001
To ensure that your system's security is up to scratch, you first need to know what is involved in carrying out a security audit. In this first of two articles, Michelle Johnston takes a look at the business aspects involved.
399.
How to Perform a Security Audit - Part 2
Dec 21, 2001
In her continuing look at what's involved in a security audit, Michelle Johnston explores the technical aspects that come into play – especially those related to e-business systems.
400.
I/O Consolidation in the Data Center
Sep 23, 2009
This chapter explains the benefits and challenges of designing physical infrastructure to simultaneously carry multiple types of traffic.