Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

An Overview of the SOAP v1.1 Specification
Oct 1, 2000
SOAP allows business software programs to communicate over the Internet regardless of the platform on which they are based. This article discusses SOAP v1.1 specification topics, including, using XML in SOAP, http as a base transport, and method invocation ...
Analyzing Business Goals and Constraints of Network Design
Aug 6, 2004
This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
Analyzing MPLS VPN Security
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
Analyzing the Cisco Enterprise Campus Architecture
Jul 15, 2010
This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
Mar 8, 2006
"Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
Apache: Starting, Stopping, and Restarting
Mar 29, 2002
Apache provides a variety of ways to start, stop, and restart your server. Learn here how to automate these processes, and ensure that your server is always running when it needs to be.
AppForge Brings Visual Basic to the PalmOS
Apr 6, 2001
Intimidated by the prospect of PalmOS C programming? Looking for a rapid application development tool for PDA development? This article explores the exciting new AppForge development toolkit.
Application Security for Visual C++.NET Developers
Jul 18, 2003
It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
Applied Big Data Analysis in the Real World with MapReduce and Hadoop
Jan 23, 2013
In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
Applying Cisco Troubleshooting Tools
Nov 16, 2001
This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
Applying the Principles of Network Design
Feb 1, 2002
To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
Are You Ready for Computing in the Cloud?
Sep 3, 2008
Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
Are Your Passwords Strong Enough? Advice from a Software Tester
Nov 9, 2007
Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
Around the Globe in the Race Against IPv4 Address Depletion
May 19, 2009
Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
art_gore_outsourcing
Jan 1, 2003
Assessing Your Security Needs
Jun 15, 2001
Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
Asymmetric Cryptography
Dec 19, 2003
Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
Asynchronous Transfer Mode (ATM)
May 11, 2001
Kyle Cassidy examines the Asynchronous Transfer Mode (ATM) and covers the wireless, wiring, and hardware requirements for various bandwidth-delivery technologies. He also offers some suggestions for choosing the technology that's right for you.
Attack of the Clones: Is Lindows the Real Deal?
Feb 14, 2003
Lindows 3.0 promises fast installations, easy updates, and an interface built to please. Seth Fogie takes a closer look at this operating system to determine whether Lindows has accomplished its goal.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.

<< < Prev Page 1 2 3 4 5 Next >