221. | - Network Security Basics
- May 7, 2004
- Robyn Aber help us to explore how routers and switches are the keys to a strong network foundation.Together they enable the intelligent, end-to-end movement of converged data, voice, and video information within or outside the business.
|
222. | - Network Security First-Step: Firewalls
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
223. | - Network Security Inside and Out: An Interview with Arvind Durai and Ray Blair
- Jul 1, 2009
- Arvind Durai and Ray Blair talk about the current landscape for enterprise security.
|
224. | - Network Switching Methods: Store-and-Forward Versus Cut-Through
- Jul 28, 2015
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, believes every network engineer should understand the differences between the two major switching methods employed in computer networks. This overview discusses the two methods from their initial deployments to modern usage.
|
225. | - Network Virtualization: A Basic Virtualized Enterprise
- Oct 6, 2006
- The authors of Network Virtualization define the technical requirements posed by the need to virtualize the network. Based on these requirements, they propose an architectural framework comprised of the functional areas necessary to successfully support concurrent virtual networks (VNs) over a shared enterprise physical network.
|
226. | - Networking First-Step: How to Build a Local (Network) Roadway
- Jun 4, 2004
- Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
|
227. | - Nine Switch Commands Every Cisco Network Engineer Needs to Know
- Aug 4, 2015
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, provides a quick overview of nine commands that are essential for working with Cisco networks, whether or not your goal is certification.
|
228. | - Offering Bundled Voice and Data Services
- Oct 11, 2002
|
229. | - Offloading Traditional Mobile Networks with IP
- Jun 23, 2009
- This chapter discusses pseudowire transport mechanisms used to provide a bridge between the legacy TDM systems and All IP systems on mobile networks.
|
230. | - On the Job with a Network Manager
- Jan 12, 2007
- Alexander Clemm presents a number of scenarios to give an impression of the types of activities that are performed by people who run networks for a living. He also provides an overview of some of the tools network managers have at their disposal to help them do their jobs.
|
231. | - Online Security: A Quest to Be One Step Ahead of the Bad Guys
- May 29, 2009
- Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
|
232. | - Overcoming Transport and Link Capacity Limitations Through WAN Optimization
- Jun 19, 2008
- This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
|
233. | - Overview of Modern SCSI Networking Protocols
- Aug 4, 2006
- The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
|
234. | - Packet over SONET
- Nov 7, 2003
- This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
|
235. | - Packet Switching Methods on Cisco Networks
- Jul 14, 2015
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, teaches new networking students the basics they need to know about packet switching on Cisco networks. Experienced network engineers will find this article a useful refresher course on Cisco technology.
|
236. | - Paint Your Data Center Green: An Interview with Douglas Alger
- Jul 1, 2009
- Douglas Alger explains what it takes for businesses to green their data centers.
|
237. | - Penetration Testing and Network Defense: Performing Host Reconnaissance
- Jun 2, 2006
- Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
|
238. | - Performing a Great Screen Play: The Many Routes to Remote Computing
- Apr 12, 2002
- Symantec's pcAnywhere is no longer the de facto program for remote access. Ross Scott Rubin demonstrates how cross-platform options, hosted services, and two new options built into Windows XP can bridge the distance between you and another computer.
|
239. | - PKI Processes and Procedures
- Apr 1, 2011
- Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
|
240. | - Planning for Cisco IP Telephony
- May 6, 2005
- This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.
|