- An Overview of the SOAP v1.1 Specification
- Oct 1, 2000
- SOAP allows business software programs to communicate over the Internet regardless of the platform on which they are based. This article discusses SOAP v1.1 specification topics, including, using XML in SOAP, http as a base transport, and method invocation ...
|
- Analyzing Business Goals and Constraints of Network Design
- Aug 6, 2004
- This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
|
- Analyzing MPLS VPN Security
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
- Analyzing the Cisco Enterprise Campus Architecture
- Jul 15, 2010
- This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
|
- Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
- Mar 8, 2006
- "Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
|
- Apache: Starting, Stopping, and Restarting
- Mar 29, 2002
- Apache provides a variety of ways to start, stop, and restart your server. Learn here how to automate these processes, and ensure that your server is always running when it needs to be.
|
- AppForge Brings Visual Basic to the PalmOS
- Apr 6, 2001
- Intimidated by the prospect of PalmOS C programming? Looking for a rapid application development tool for PDA development? This article explores the exciting new AppForge development toolkit.
|
- Application Security for Visual C++.NET Developers
- Jul 18, 2003
- It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
|
- Applied Big Data Analysis in the Real World with MapReduce and Hadoop
- Jan 23, 2013
- In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
|
- Applying Cisco Troubleshooting Tools
- Nov 16, 2001
- This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
|
- Applying the Principles of Network Design
- Feb 1, 2002
- To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
|
- Are You Ready for Computing in the Cloud?
- Sep 3, 2008
- Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
|
- Are Your Passwords Strong Enough? Advice from a Software Tester
- Nov 9, 2007
- Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
|
- Around the Globe in the Race Against IPv4 Address Depletion
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
- art_gore_outsourcing
- Jan 1, 2003
|
- Assessing Your Security Needs
- Jun 15, 2001
- Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
|
- Asymmetric Cryptography
- Dec 19, 2003
- Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
|
- Asynchronous Transfer Mode (ATM)
- May 11, 2001
- Kyle Cassidy examines the Asynchronous Transfer Mode (ATM) and covers the wireless, wiring, and hardware requirements for various bandwidth-delivery technologies. He also offers some suggestions for choosing the technology that's right for you.
|
- Attack of the Clones: Is Lindows the Real Deal?
- Feb 14, 2003
- Lindows 3.0 promises fast installations, easy updates, and an interface built to please. Seth Fogie takes a closer look at this operating system to determine whether Lindows has accomplished its goal.
|
- Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|