Chapters & Articles

All Articles

Showing 661-680 of 854

Sort by Date | Title

661.
The ABCs of TCP/IP
Mar 25, 2005
Learn the very basics of TCP/IP in this sample chapter by Mark Sportack. Find out how TCP/IP interacts with the internet, as well as with other communication protocols.
662.
The Art of Network Architecture: Applying Modularity
May 12, 2014
This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
663.
The Art of the Data Center: Bahnhof - Stockholm, Sweden
Oct 9, 2012
Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
664.
The AT&T / T-Mobile Merger: So What Happens Now?
Dec 2, 2011
Will the AT&T / T-Mobile merger end from "death by 1000 cuts" if opposition by the DOJ, FCC, competitors and consumer groups proves insurmountable? If so, what happens next?
665.
The Bad Guys from Outside: Malware
Apr 29, 2010
In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
666.
The Basic Uses of TCP/IP Route Maps
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
667.
The Basics of the Cisco PIX Firewall
Feb 15, 2002
The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
668.
The Building Blocks in a Cisco NAC Appliance Design
Jul 8, 2008
This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
669.
The Business Case for Storage Networks
Nov 18, 2004
This chapter covers the copious reasons for preferring storage networks, from the legal implications of Sarbanes-Oxley to the economy of scale created by their usage. Discover the other advantages storage networks could provide to your business within.
670.
The Business Side of Hosting a Hotspot
Jan 12, 2007
Eric Geier explains the benefits of hosting a hotspot, such as generating additional revenue and attracting more people to your business or organization, and the associated costs of doing so. This will help you decide which type of hotspot is best for your particular situation.
671.
The Cisco CCNA Exam Today: What You Need to Know to Pass the First Time
Jun 10, 2005
When preparing for Cisco's CCNA series of exams, it can sometimes be overwhelming trying to figure out what to study, how much to study, and where to begin. This article offers a brief overview of what is on the CCNA exams, and where you can look for the information you need.
672.
The Cisco Certified Security Professional
Oct 31, 2003
673.
The Cisco IOS Firewall Feature Set
May 1, 2002
Anu Tewari covers the basic components of the Cisco IOS Firewall Feature Set and tells how it can help a business guard against security breaches.
674.
The Doctor Will See You Now: Transforming Healthcare with IP Video
Mar 19, 2009
Learn how healthcare organizations are using video to transform the healthcare industry.
675.
The Economics of Cloud Computing: An Overview For Decision Makers
Jul 30, 2012
In this chapter, Bill Williams explores the standard definition of cloud computing to establish a baseline of common terminology. Understanding the essential characteristics of cloud computing platforms, as well as cloud deployment and service models, is critical for making informed decisions and for choosing the appropriate platform for your business needs.
676.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
677.
The Ins and Outs of Pearson's Cisco Network Simulator
Nov 25, 2013
Sean Wilkins takes an in-depth look at the topics that have been added to the new Pearson Cisco Network Simulator as well as a review of some of the commands that are being added.
678.
The IT Career Builder's Toolkit, Chapter 1: The Toolkit Approach to Career Development
Jan 11, 2008
679.
The IT Career Builder's Toolkit, Chapter 10: The Résumé
Jan 18, 2008
680.
The IT Career Builder's Toolkit, Chapter 11: Breaking into IT
Jan 21, 2005
IT jobs seem to be disappearing at an alarming rate. New graduates trying to get into the IT field appear to be faced with an alarming shortage of available positions. Matthew Moran, however, shows that this isn't necessarily the case, as it's still possible to work in IT outside of the IT department. Find out how in this chapter.