401. | - CCIE Security v3.0 Quick Reference: Application Protocols
- Apr 1, 2011
- This sample from CCIE Security v3.0 Quick Reference includes definitions and explanations of HTTP, HTTPS, SMTP, FTP, and DNS.
|
402. | - PKI Processes and Procedures
- Apr 1, 2011
- Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
|
403. | - CCNP Security Secure 642-637 Quick Reference: Cisco Layer 2 Security
- Mar 15, 2011
- This chapter describes the main types of Layer 2 attacks and how to defend against them.
|
404. | - Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
- Mar 11, 2011
- This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
|
405. | - CCNP Security Firewall 642-617 Quick Reference: Basic Connectivity and Device Management
- Mar 11, 2011
- This chapter starts to look at the configuration of the Cisco ASA and covers the fundamentals for providing basic connectivity and device management.
|
406. | - CCNP Voice CIPT1 642-447 Quick Reference: Single-Site On-Net Calling
- Mar 11, 2011
- To aid in your CCNP 642-447 exam preparation, this chapter covers the configuration of CUCM for the support of on-cluster calling.
|
407. | - Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
- Feb 22, 2011
- Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
|
408. | - Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
- Feb 14, 2011
- This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
|
409. | - Q&A with the Authors of "AAA Identity Management Security"
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
410. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
411. | - Computer Incident Response and Product Security: Operating an Incident Response Team
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|
412. | - Cisco Unified Wireless LAN Security Fundamentals
- Dec 3, 2010
- This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
|
413. | - An Ideal Programmer
- Nov 24, 2010
- Ed Tittel, creator of the Exam Cram series, considers the qualifications that make for the best prospective programming candidates.
|
414. | - CCIE Routing & Switching v4.0 Quick Reference: Network Optimization
- Oct 27, 2010
- This quick reference for CCIE Routing and Switching exam-takers covers SLAs, NetFlow, SPAN, RSPAN, and RITE, and Cisco IOS EEM.
|
415. | - CCNA Voice: Everything’s Changing... Again!
- Oct 21, 2010
- Jeremy Cioara discusses the new CCNA Voice certification, its role in your CCVP journey, and what to expect in your studies.
|
416. | - The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
417. | - Getting Owned: The USB Keystroke Injection Attack
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
|
418. | - VoIP Deployment Models in Service Provider Networks
- Oct 5, 2010
- This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
|
419. | - Developing Network Security Strategies
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
420. | - Discovering the Upcoming Wi-Fi Direct Standard
- Aug 16, 2010
- See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.
|