- Applied Big Data Analysis in the Real World with MapReduce and Hadoop
-
By
Steven Haines
- Jan 23, 2013
- In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
|
- Around the Globe in the Race Against IPv4 Address Depletion
-
By
Jeff Doyle, Linda Leung
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
- Big Data Analysis with MapReduce and Hadoop
-
By
Steven Haines
- Jan 9, 2013
- Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
|
- Building a MapReduce Application with Hadoop
-
By
Steven Haines
- Jan 16, 2013
- In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.
|
- Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
-
By
Ron Fuller, David Jansen, Matthew McPherson
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|
- Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
-
By
Cristian Matei
- Oct 19, 2012
- This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
|
- Developing Network Security Strategies
-
By
Priscilla Oppenheimer
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
- Foundations of Modern Networking: Background and Motivation of Software-Defined Networks (SDN)
-
By
William Stallings
- Dec 3, 2015
- This chapter from Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud begins the discussion of software-defined networks (SDNs) by providing some background and motivation for the SDN approach.
|
- IPv6 Internet Security for Your Network
-
By
Eric Vyncke, Scott Hogg
- Jun 4, 2009
- This chapter covers how to secure your network when it is connected to the IPv6 Internet.
|
- Mathematical Foundations of Computer Networking: Probability
-
By
Srinivasan Keshav
- May 1, 2012
- This chapter is an introduction to the theory of probability, beginning by introducing the elementary concepts of outcomes, events, and sample spaces.
|
- Network Security First-Step: Firewalls
-
By
Donald Stoddard, Thomas M. Thomas
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
- Networking First-Step: How to Build a Local (Network) Roadway
-
By
Wendell Odom
- Jun 4, 2004
- Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
|
- On the Job with a Network Manager
-
By
Alexander Clemm
- Jan 12, 2007
- Find out what you would do if you ran networks for a living.
|
- Practical Storage Area Networking: Project Modeling
-
By
Daniel Pollack
- Jan 17, 2003
- Daniel Pollack discusses the tools you need in order to complete I/O analysis and determine the Storage Area Network project type.
|
- Protocol Design Folklore
-
By
Radia Perlman
- Jan 15, 2001
|
- Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
-
By
Randy Nash
- Dec 19, 2012
- What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
|
- Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
-
By
Ron Fuller
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES-128 bit encryption on your Cisco Nexus 7000 series switches.
|
- Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
-
By
Gary McGraw, Brian Chess
- Oct 15, 2008
- Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
|
- Software [In]security: Attack Categories and History Prediction
-
By
Gary McGraw
- Aug 25, 2009
- Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
|
- Software [In]security: Balancing All the Breaking with some Building
-
By
Gary McGraw
- Aug 30, 2011
- Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
|