Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Introduction to Cloud Computing
Oct 18, 2010
This chapter describes the Cloud Services Market, explains what that means and how it can benefit your business, and provides examples of possible pitfalls to watch for.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
VoIP Deployment Models in Service Provider Networks
Oct 5, 2010
This chapter gives you an understanding of how Voice over IP (VoIP) is deployed in service provider (SP) networks by describing a use case in which the VoIP infrastructure and the transport and the access are managed by an SP.
Developing Network Security Strategies
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
Extending Your Wireless Home Network
Oct 4, 2010
What do you do when you can’t receive a strong wireless signal at the far end of your house? In this article, Michael Miller, author of Windows 7 Your Way and Wireless Networking with Windows Vista, discusses several ways to extend the range of your wireless home network — and stay connected everywhere in your house.
Software [In]security: How to p0wn a Control System with Stuxnet
Sep 23, 2010
Gary McGraw describes the Stuxnet worm and explains some of its potentially dangerous implications.
Designing a Broadband Wireless Network: Overview and Channel Structure of LTE
Sep 21, 2010
Long-Term Evolution (LTE) is the next step in the GSM evolutionary path beyond 3G technology, and it is strongly positioned to be the dominant global standard for 4G cellular networks. This chapter provides an overview of the LTE (Long-Term Evolution) radio interface.
Discovering the Upcoming Wi-Fi Direct Standard
Aug 16, 2010
See how you'll benefit from this new Wi-Fi standard. Eric Geier shows you how it compares with Bluetooth and the existing Wi-Fi ad-hoc networking. Plus you'll discover its downsides and negative impacts.
Software [In]security: Software Security Crosses the Threshold
Aug 16, 2010
The software security space exceeded the $500 million mark in 2009. Software security expert Gary McGraw examines the sales of security tools providers and services firms to find out how quickly the market is growing, and which parts of the market are driving growth.
Security in Tcl Scripts for Cisco IOS
Aug 10, 2010
This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control
Aug 5, 2010
This chapter covers implementing path control, focusing on understanding and implementing path control as well as advanced path control tools.
WLAN Design: Range, Performance, and Roaming Considerations
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
Configuration of Frame Mode MPLS
By David Hucaby, Stephen McQuerry
Jul 28, 2010
This chapter covers the background and configuration of frame mode Multiprotocol Label Switching (MPLS).
Configuring the Cisco Unified Personal Communicator
Jul 27, 2010
This chapter covers the client installation, configuration, basic and advanced features, and client-side troubleshooting of the Cisco Unified Personal Communicator.
CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
Jul 21, 2010
William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
Jul 20, 2010
This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
Introduction to Cisco NX-OS
Jul 19, 2010
This chapter provides an introduction and overview of NX-OS and a comparison between traditional IOS and NX-OS configurations and terminology.
Software [In]security: Obama Highlights Cyber Security Progress
Jul 16, 2010
Software security expert Gary McGraw went to a White House meeting on cyber security attended by 100 public and private sector security experts. McGraw shares the details of the meeting, including an unannounced visit by President Obama.
Analyzing the Cisco Enterprise Campus Architecture
Jul 15, 2010
This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.

<< < Prev Page 11 12 13 14 15 Next >