- Introduction to Cloud Computing
- Oct 18, 2010
- This chapter describes the Cloud Services Market, explains what that means and how it can benefit your business, and provides examples of possible pitfalls to watch for.
|
- The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
- Getting Owned: The USB Keystroke Injection Attack
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
|
- VoIP Deployment Models in Service Provider Networks
- Oct 5, 2010
- This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
|
- Developing Network Security Strategies
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
- Extending Your Wireless Home Network
- Oct 4, 2010
- What do you do when you canβt receive a strong wireless signal at the far end of your house? In this article, Michael Miller, author of Windows 7 Your Way and Wireless Networking with Windows Vista, discusses several ways to extend the range of your wireless home network — and stay connected everywhere in your house.
|
- Software [In]security: How to p0wn a Control System with Stuxnet
- Sep 23, 2010
- Gary McGraw describes the Stuxnet worm and explains some of its potentially dangerous implications.
|
- Designing a Broadband Wireless Network: Overview and Channel Structure of LTE
- Sep 21, 2010
- Long-Term Evolution (LTE) is the next step in the GSM evolutionary path beyond 3G technology, and it is strongly positioned to be the dominant global standard for 4G cellular networks. This chapter provides an overview of the LTE (Long-Term Evolution) radio interface.
|
- Discovering the Upcoming Wi-Fi Direct Standard
- Aug 16, 2010
- See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.
|
- Software [In]security: Software Security Crosses the Threshold
- Aug 16, 2010
- The software security space exceeded the $500 million mark in 2009. Software security expert Gary McGraw examines the sales of security tools providers and services firms to find out how quickly the market is growing, and which parts of the market are driving growth.
|
- Security in Tcl Scripts for Cisco IOS
- Aug 10, 2010
- This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
|
- CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control
- Aug 5, 2010
- This chapter covers implementing path control, focusing on understanding and implementing path control as well as advanced path control tools.
|
- WLAN Design: Range, Performance, and Roaming Considerations
- Aug 3, 2010
- This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
|
- Configuration of Frame Mode MPLS
-
By
David Hucaby, Stephen McQuerry
- Jul 28, 2010
- This chapter covers the background and configuration of frame mode Multiprotocol Label Switching (MPLS).
|
- Configuring the Cisco Unified Personal Communicator
- Jul 27, 2010
- This chapter covers the client installation, configuration, basic and advanced features, and client-side troubleshooting of the Cisco Unified Personal Communicator.
|
- CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
- Jul 21, 2010
- William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
|
- CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
- Jul 20, 2010
- This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
|
- Introduction to Cisco NX-OS
- Jul 19, 2010
- This chapter provides an introduction and overview of NX-OS and a comparison between traditional IOS and NX-OS configurations and terminology.
|
- Software [In]security: Obama Highlights Cyber Security Progress
- Jul 16, 2010
- Software security expert Gary McGraw went to a White House meeting on cyber security attended by 100 public and private sector security experts. McGraw shares the details of the meeting, including an unannounced visit by President Obama.
|
- Analyzing the Cisco Enterprise Campus Architecture
- Jul 15, 2010
- This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
|