Home > Articles > Networking


RSS Feed Subscribe to this topic  RSS details

1386 Items

Sort by Date | Title

"Open Sesame" or Not? Use the Right Access Controls
By Julia H. Allen
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
(Remote) Controlling Your Windows XP PC
By Kulvir Singh Bhogal
Jul 15, 2005
Kulvir Bhogal shows you how to get to the next level of laziness with a low-cost remote control solution for Windows XP and Winamp.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
21st Century Oxymorons: Jumbo Shrimp and Fibre Channel SAN
By Jon William Toigo
Apr 23, 2004
This article focuses on Fibre Channel-based SAN security. Like so many terms in the networking industry, "Storage Area Network" (SAN) boasts a bevy of definitions. Whatever form of SAN you construct must be secure enough to avoid the risk of losing or compromising critical data.
31 Days Before Your CCNA Exam: Connecting Switches and Ethernet Technology
By Allan Johnson
Apr 15, 2009
Allan Johnson provides late study tips and resources for Ethernet and switching topics on the CCNA 640-802 exam.
5 Questions with Cisco Systems' Telephony Expert Anne Smith
By Anne Smith
Jan 31, 2003
A Blade Server Primer
By Stephen B. Morris
Aug 27, 2004
Network management specialist Stephen Morris discusses the emerging area of blade servers. This key data center technology has important implications for hard-pressed IT managers.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
By Randy Nash
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
A Cisco Telephony Architecture Evolution
By Stephanie Carhee
Sep 3, 2004
This chapter introduces the concept of ROI, and provides the background and reasoning behind Cisco's decision to migrate to an all-IP network.
A Comparison of Dial Backup Approaches
By Vincent C. Jones
Sep 21, 2001
This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
A Look Back: Expert's Choice of Must-Have Books by William Stallings
By William Stallings
Apr 13, 2009
Find out what books William Stallings, the author of Business Data Communications and Computer Organization and Architecture, was recommending in 1995, and see his updated comments from 2009.
A Network Administrator's View of Multiservice Networks
By Robert Wood
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
A New Standard for MANs: The IEEE 802.17 Resilient Packet Ring
By William Stallings
Jun 15, 2001
Bill Stallings discusses the IEEE 802.17 Resilient Packet Ring Metropolitan Area Network Standard for high-speed packet-based data network capability.
A Practical Guide to Advanced Networking: IPv6
By Jeffrey S. Beasley, Piyasat Nilkaew
Dec 11, 2012
This chapter looks at IPv6, the IP addressing system that has been developed to replace IPv4.
A Quick and Dirty Introduction to OOP with PHP
By Christopher Cosentino
Dec 21, 2001
Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
A Quick Survey of Remote Desktop Technologies
By Timothy L. Warner
Jul 20, 2012
Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
A Security Review of Protocols: Lower Layers
By Steven M. Bellovin, William R. Cheswick, Aviel D. Rubin
May 2, 2003
As a security-minded system administrator, look at the lower layers, areas of possible dangers, and some basic infrastructure protocols, such as DNS, UDP, SCTP, ARP, TCP/IP, DHCP, IPv6, and WEP.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
By Seth Fogie
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
A Tour of the Tablet PC
By Lynn Greiner
Feb 6, 2004
Close to a quarter of a century after we became a keyboard-centric society with the introduction of the personal computer, the pen is again trying to become mighty, thanks to the tablet PC.
A Video Overview of the CCENT/CCNA Network Simulator
By Sean Wilkins
Jan 6, 2014
This CCENT/CCNA Network Simulator overview video examines the Cisco Network Simulator's redesigned interface. It also reviews the new grade history feature that enables students to track their lab attempt progress.

Page 1 2 3 4 5 Next >