Chapters & Articles

All Articles

Showing 581-600 of 854

Sort by Date | Title

Page: < Prev 28 29 30 31 32 Next >

581.
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
582.
VoIP: An In-Depth Analysis
Oct 20, 2006
This chapter explains many of the issues facing Voice over IP (VoIP) and ways in which Cisco addresses these issues.
583.
Role of CS-MARS in Your Network
Oct 16, 2006
584.
Session Initiation Protocol
Oct 16, 2006
585.
Voice Interface Configuration
Oct 16, 2006
586.
Building Multiservice Transport Networks: MSPP Network Design Example: Cisco ONS 15454
Oct 13, 2006
The Cisco ONS 15454 is a highly flexible and highly scalable multiservice Synchronous Optical Network (SONET)/Synchronous Digital Hierarchy (SDH)/dense wavelength-division multiplexing (DWDM) platform. Service providers and enterprise customers use the ONS 15454 to build highly available transport networks for time-division multiplexing (TDM), Ethernet, storage extension, and wavelength services. In this chapter, you will learn the major components of the ONS 15454 system.
587.
Implementing Network Admission Control
Oct 9, 2006
588.
Tip 5: Lock Out Spyware and Adware
Oct 9, 2006
589.
Network Virtualization: A Basic Virtualized Enterprise
Oct 6, 2006
The authors of Network Virtualization define the technical requirements posed by the need to virtualize the network. Based on these requirements, they propose an architectural framework comprised of the functional areas necessary to successfully support concurrent virtual networks (VNs) over a shared enterprise physical network.
590.
Basic IPsec VPN Topologies and Configurations
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
591.
Multiprotocol Label Switching Traffic Engineering Technology Overview
Sep 22, 2006
This chapter presents a review of Multiprotocol Label Switching Traffic Engineering (MPLS TE) technology. MPLS TE can play an important role in the implementation of network services with quality of service (QoS) guarantees.
592.
How to Configure OpenVPN
Sep 8, 2006
Michael Riley shows you how to use OpenVPN for secure internet surfing on your client PCs. He’ll also help you set up the configuration that will allow you access to your home network while you’re traveling.
593.
Overview of Modern SCSI Networking Protocols
Aug 4, 2006
The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
594.
Throw Away the Resume!
Jul 28, 2006
Although most IT professionals rely on their resume as their primary marketing document, published articles and case studies can have a dramatic impact on career development. Matthew Moran discusses techniques to help you get started in writing case studies and articles and also provides some ideas for getting them published.
595.
Enterprise-Class Wireless LANs: Guidelines for A Successful Architecture and Design
Jul 21, 2006
This chapter adopts a "60,000-foot view" of the challenges ahead and asks you to answer some key questions on technical, financial, and program management issues. The chapter also introduces such topics as strategic preparation and planning, architectural considerations, and program management. Upon completion, you will be prepared to describe in strategic terms where you will deploy, how you will deploy, how you will fund and manage your deployment.
596.
Professional Networking Made Easy: Priming the Pump
Jul 21, 2006
Matthew Moran provides techniques and strategies to help you create a strong professional network, starting today.
597.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
598.
Creating Custom Policies for the Cisco Security Agent
Jul 14, 2006
Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
599.
CCSP SNRS Exam Self-Study: Mitigating Layer 2 Attacks
Jul 7, 2006
This excerpt from the official Cisco SNRS study guide discusses Layer 2 attacks, mitigations, best practices, and functionality within the scope of the CCSP SNRS exam framework.
600.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.

Page: < Prev 28 29 30 31 32 Next >