Home > Articles > Networking

Networking

61 Items

Sort by Date | Title

Applied Big Data Analysis in the Real World with MapReduce and Hadoop
By Steven Haines
Jan 23, 2013
In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
Around the Globe in the Race Against IPv4 Address Depletion
By Jeff Doyle, Linda Leung
May 19, 2009
Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
Big Data Analysis with MapReduce and Hadoop
By Steven Haines
Jan 9, 2013
Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
Building a MapReduce Application with Hadoop
By Steven Haines
Jan 16, 2013
In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.
Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
By Ron Fuller, David Jansen, Matthew McPherson
Apr 26, 2013
This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
By Cristian Matei
Oct 19, 2012
This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
Developing Network Security Strategies
By Priscilla Oppenheimer
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
Foundations of Modern Networking: Background and Motivation of Software-Defined Networks (SDN)
By William Stallings
Dec 3, 2015
This chapter from Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud begins the discussion of software-defined networks (SDNs) by providing some background and motivation for the SDN approach.
IPv6 Internet Security for Your Network
By Eric Vyncke, Scott Hogg
Jun 4, 2009
This chapter covers how to secure your network when it is connected to the IPv6 Internet.
Mathematical Foundations of Computer Networking: Probability
By Srinivasan Keshav
May 1, 2012
This chapter is an introduction to the theory of probability, beginning by introducing the elementary concepts of outcomes, events, and sample spaces.
Network Security First-Step: Firewalls
By Donald Stoddard, Thomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
Networking First-Step: How to Build a Local (Network) Roadway
By Wendell Odom
Jun 4, 2004
Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
On the Job with a Network Manager
By Alexander Clemm
Jan 12, 2007
Find out what you would do if you ran networks for a living.
Practical Storage Area Networking: Project Modeling
By Daniel Pollack
Jan 17, 2003
Daniel Pollack discusses the tools you need in order to complete I/O analysis and determine the Storage Area Network project type.
Protocol Design Folklore
By Radia Perlman
Jan 15, 2001
Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
By Randy Nash
Dec 19, 2012
What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
By Ron Fuller
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES-128 bit encryption on your Cisco Nexus 7000 series switches.
Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
By Gary McGraw, Brian Chess
Oct 15, 2008
Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
Software [In]security: Attack Categories and History Prediction
By Gary McGraw
Aug 25, 2009
Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
Software [In]security: Balancing All the Breaking with some Building
By Gary McGraw
Aug 30, 2011
Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.

Page 1 2 3 4 Next >