Chapters & Articles

All Articles

Showing 401-420 of 854

Sort by Date | Title

401.
CCIE Security v3.0 Quick Reference: Application Protocols
Apr 1, 2011
This sample from CCIE Security v3.0 Quick Reference includes definitions and explanations of HTTP, HTTPS, SMTP, FTP, and DNS.
402.
PKI Processes and Procedures
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
403.
CCNP Security Secure 642-637 Quick Reference: Cisco Layer 2 Security
Mar 15, 2011
This chapter describes the main types of Layer 2 attacks and how to defend against them.
404.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
405.
CCNP Security Firewall 642-617 Quick Reference: Basic Connectivity and Device Management
Mar 11, 2011
This chapter starts to look at the configuration of the Cisco ASA and covers the fundamentals for providing basic connectivity and device management.
406.
CCNP Voice CIPT1 642-447 Quick Reference: Single-Site On-Net Calling
Mar 11, 2011
To aid in your CCNP 642-447 exam preparation, this chapter covers the configuration of CUCM for the support of on-cluster calling.
407.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
408.
Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
Feb 14, 2011
This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
409.
Q&A with the Authors of "AAA Identity Management Security"
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
410.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
411.
Computer Incident Response and Product Security: Operating an Incident Response Team
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
412.
Cisco Unified Wireless LAN Security Fundamentals
Dec 3, 2010
This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
413.
An Ideal Programmer
Nov 24, 2010
Ed Tittel, creator of the Exam Cram series, considers the qualifications that make for the best prospective programming candidates.
414.
CCIE Routing & Switching v4.0 Quick Reference: Network Optimization
Oct 27, 2010
This quick reference for CCIE Routing and Switching exam-takers covers SLAs, NetFlow, SPAN, RSPAN, and RITE, and Cisco IOS EEM.
415.
CCNA Voice: Everything’s Changing... Again!
Oct 21, 2010
Jeremy Cioara discusses the new CCNA Voice certification, its role in your CCVP journey, and what to expect in your studies.
416.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
417.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
418.
VoIP Deployment Models in Service Provider Networks
Oct 5, 2010
This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
419.
Developing Network Security Strategies
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
420.
Discovering the Upcoming Wi-Fi Direct Standard
Aug 16, 2010
See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.