Chapters & Articles

All Articles

Showing 641-660 of 854

Sort by Date | Title

641.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
642.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
643.
Security Financials: The Core Element of Security Business Proposals
Jun 10, 2005
Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
644.
The Cisco CCNA Exam Today: What You Need to Know to Pass the First Time
Jun 10, 2005
When preparing for Cisco's CCNA series of exams, it can sometimes be overwhelming trying to figure out what to study, how much to study, and where to begin. This article offers a brief overview of what is on the CCNA exams, and where you can look for the information you need.
645.
Troubleshooting Any Transport over MPLS Based VPNs
Jun 10, 2005
MPLS Layer 3 VPNs allow a service provider to provision IP connectivity for multiple customers over a shared IP backbone, while maintaining complete logical separation of customer traffic and routing information. Learn more about MPLS Layer 3 VPNs in this sample chapter from Cisco.
646.
What's New in Cisco PIX Firewall 7.0
By David Hucaby
Jun 10, 2005
The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
647.
CCNA Command Quick Reference: Routing and Routing Protocols
Jun 3, 2005
This chapter condenses the CCNA Routing commands into an easy-to-use chart for quick reference.
648.
Core Elements of the Cisco Self-Defending Network Strategy
May 27, 2005
Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
649.
Layer 2 VPN Architectures: Understanding Any Transport over MPLS
May 12, 2005
This chapter provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
650.
Untethered: Watching Live TV on Your Laptop Without Wires
May 12, 2005
Imagine being able to watch live television on your laptop without any wires. Now imagine no more — you'll learn the step-by-step procedure right here. With some inexpensive hardware, a desktop and laptop, and a wireless network, you'll be ready to go in no time.
651.
Planning for Cisco IP Telephony
May 6, 2005
This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.
652.
Policy, Personnel, and Equipment as Security Enablers
Apr 1, 2005
Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
653.
The ABCs of TCP/IP
Mar 25, 2005
Learn the very basics of TCP/IP in this sample chapter by Mark Sportack. Find out how TCP/IP interacts with the internet, as well as with other communication protocols.
654.
CCDP Self-Study: Designing High-Availability Services
Mar 18, 2005
Cisco IOS high-availability technologies provide network redundancy and fault tolerance. Reliable network devices, redundant hardware components with automatic failover, and protocols like Hot Standby Router Protocol (HSRP) are used to maximize network uptime. This chapter will help you get a handle on high-availability technologies.
655.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
656.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
657.
Storage Networking Fundamentals: Storage Devices
Mar 4, 2005
This chapter examines the pros and cons of various storage devices to help you decide which storage devices are appropriate for your storage network.
658.
CCIE Routing and Switching Flash Cards: General Networking Theory
Feb 25, 2005
This chapter ensures you are prepared for questions in the Cisco Certified Internetwork Expert (CCIE) written exam that deal with general networking theories. General networking theories include Open System Interconnection (OSI) models, routing concepts, networking standards, and protocol mechanics.
659.
EAP Authentication Protocols for WLANs
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
660.
Optimizing Applications on Cisco Networks: Beyond the Boundaries
Jan 28, 2005
You may only operate (own) part of your delivery mechanism, relying on third-party organizations to deliver your application to both your internal staff and your customers. This chapter discusses approaches to this situation, covering ways to work within these confinements.