261. | - Overview of Modern SCSI Networking Protocols
- Aug 4, 2006
- The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
|
262. | - Overview of Security Operations Center Technologies
- Dec 15, 2015
- This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
|
263. | - Packet over SONET
- Nov 7, 2003
- This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
|
264. | - Packet Switching Methods on Cisco Networks
- Jul 14, 2015
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, teaches new networking students the basics they need to know about packet switching on Cisco networks. Experienced network engineers will find this article a useful refresher course on Cisco technology.
|
265. | - Paint Your Data Center Green: An Interview with Douglas Alger
- Jul 1, 2009
- Douglas Alger explains what it takes for businesses to green their data centers.
|
266. | - Penetration Testing and Network Defense: Performing Host Reconnaissance
- Jun 2, 2006
- Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
|
267. | - Performing a Great Screen Play: The Many Routes to Remote Computing
- Apr 12, 2002
- Symantec's pcAnywhere is no longer the de facto program for remote access. Ross Scott Rubin demonstrates how cross-platform options, hosted services, and two new options built into Windows XP can bridge the distance between you and another computer.
|
268. | - PKI Processes and Procedures
- Apr 1, 2011
- Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
|
269. | - Planning for Cisco IP Telephony
- May 6, 2005
- This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.
|
270. | - Planning the Cisco CallManager Implementation
- Sep 24, 2004
- Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
|
271. | - Policy, Personnel, and Equipment as Security Enablers
- Apr 1, 2005
- Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
|
272. | - Preparing for the CCNP ONT Exam: IP Quality of Service
- Dec 7, 2007
|
273. | - Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
- Sep 20, 2011
- Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
|
274. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
275. | - Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
- Sep 18, 2012
- Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
|
276. | - Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
- Apr 15, 2011
- Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
|
277. | - Q&A with the Authors of "AAA Identity Management Security"
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
278. | - Recovering and Securing Your Wi-Fi Encryption Keys
- Jun 4, 2010
- Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
|
279. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
280. | - Securing the Cisco Security Monitoring, Analysis, and Response System
- Jul 3, 2008
- This chapter describes recommendations for securing MARS appliances, both physically and electronically.
|