- Attacks from Outside the Operating System
- Mar 29, 2002
- This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
|
- Authentication
- Sep 21, 2001
- Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
|
- Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Availability: Requirements and Measurement
- Oct 19, 2001
- It's really the end user who determines whether a system is "available," according to Michael Hawkins. In this article, he explains how to determine realistic availability definitions and requirements.
|
- Backbone Router Configuration
- Mar 14, 2003
|
- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
|
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
|
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
|
- Basic Access List Configuration for Cisco Devices
- Apr 4, 2011
- This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
|
- Basic Cisco IOS Software and Catalyst 3550 Series Security
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
|
- Basic Data Transmission in Networks: MAC Tables and ARP Tables
- May 12, 2015
- Bombarded with jargon, no wonder networking beginners get lost. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, explains some crucial terminology for anyone who needs to understand complex networking.
|
- Basic IP Connectivity and Troubleshooting in Cisco Express Forwarding
- Oct 26, 2007
- This chapter helps you verify whether CEF is the root cause of a particular IP connectivity problem.
|
- Basic IPsec VPN Topologies and Configurations
- Sep 29, 2006
- In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
|
- Basic Layer 3 Routing Concepts
- Oct 6, 2015
- How does a message get from point A to point B on a network? Though the question may seem simple, the process isn't. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses how basic packet routing works.
|
- Basic Network Programming in J2ME MIDP
- Aug 27, 2001
- This sample chapter discusses the important concepts involved in network programming with J2ME MIDP-such as the difference between network programming with J2SE and with J2ME, and the concept of the Generic Connection framework.
|
- Basic Virtual Private Network Deployment
- Jan 19, 2001
- Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
|
- Basics of the Open Source Community
- Mar 25, 2005
- Nominally, this excerpted book chapter from Apache Jakarta and Beyond is an introduction to the Apache Jakarta project. But it's also a thoughtful briefing about the roles of open source software — and the related development communities.
|
- Basics of the PIX Firewall
- Nov 7, 2003
- There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
|
- Been Cracked? Just Put PAM On It!
- Oct 26, 2001
- Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
|