Cisco Network Technology

All Cisco Network Technology Articles

Showing 261-280 of 367

Sort by Date | Title

261.
Overview of Modern SCSI Networking Protocols
Aug 4, 2006
The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
262.
Overview of Security Operations Center Technologies
Dec 15, 2015
This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
263.
Packet over SONET
Nov 7, 2003
This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
264.
Packet Switching Methods on Cisco Networks
Jul 14, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, teaches new networking students the basics they need to know about packet switching on Cisco networks. Experienced network engineers will find this article a useful refresher course on Cisco technology.
265.
Paint Your Data Center Green: An Interview with Douglas Alger
Jul 1, 2009
Douglas Alger explains what it takes for businesses to green their data centers.
266.
Penetration Testing and Network Defense: Performing Host Reconnaissance
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
267.
Performing a Great Screen Play: The Many Routes to Remote Computing
Apr 12, 2002
Symantec's pcAnywhere is no longer the de facto program for remote access. Ross Scott Rubin demonstrates how cross-platform options, hosted services, and two new options built into Windows XP can bridge the distance between you and another computer.
268.
PKI Processes and Procedures
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
269.
Planning for Cisco IP Telephony
May 6, 2005
This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.
270.
Planning the Cisco CallManager Implementation
Sep 24, 2004
Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
271.
Policy, Personnel, and Equipment as Security Enablers
Apr 1, 2005
Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
272.
Preparing for the CCNP ONT Exam: IP Quality of Service
Dec 7, 2007
273.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
274.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
275.
Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
Sep 18, 2012
Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
276.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
277.
Q&A with the Authors of "AAA Identity Management Security"
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
278.
Recovering and Securing Your Wi-Fi Encryption Keys
Jun 4, 2010
Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
279.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
280.
Securing the Cisco Security Monitoring, Analysis, and Response System
Jul 3, 2008
This chapter describes recommendations for securing MARS appliances, both physically and electronically.