Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Best Practices for Deploying Secure Cisco IP Telephony Solutions
Oct 31, 2012
Akhil Behl offers a brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
Best Practices for Designing a Nagios Monitoring System
Mar 23, 2007
David Josephsen provides important advice to help you to make important network monitoring design decisions.
Big Data Analysis with MapReduce and Hadoop
Jan 9, 2013
Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
BIND 9's New Resource Records
Nov 20, 2000
DNS's new version of BIND, BIND 9, implements two new Resource Records to help you take DNS to an advanced level. Learn about them quickly in this article.
Bluetooth FAQs
Nov 13, 2000
Several lists of frequently asked questions, or FAQs, can be found on the subject of BluetoothTM wireless communication. Here, Brent A. Miller, an authority on this subject, offers his own Bluetooth FAQs.
Bluetooth Resources: Where to Begin
Nov 13, 2000
BluetoothTM wireless communication authority Brent A. Miller presents an informal bibliography of information sources about this new technology and discusses resources that may assist those who are new to the technology and want to learn more about ...
Bluetooth Security Risks in Business
May 9, 2008
Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
Bluetooth Technology and SIG Overview
Nov 13, 2000
BluetoothTM wireless communication is a very hot topic in computing, telecommunications, and other industries. Here, author Brent A. Miller provides an introduction to the technology and the organization behind it, as found in Bluetooth Revealed, the ...
Bluetooth™ and Other Wireless Technologies
Nov 30, 2001
In this article, derived from the author’s book Bluetooth Revealed, Second Edition, Bluetooth wireless communication authority Brent A. Miller compares Bluetooth wireless communication with other wireless technologies.
Bluetooth™ Qualification Program Overview
Nov 30, 2001
In this article, derived from the author’s book Bluetooth Revealed, Second Edition, Bluetooth wireless communication authority Brent A. Miller presents an overview of the Bluetooth qualification program (BQP).
Bluetooth: Unifying the Telecommunications and Computing Industries
Jul 5, 2002
Examine how Bluetooth wireless technology is setting the stage for the next step in the information technology revolution. Learn about the Personal Area Network (PAN), piconets and scatternets, and how Bluetooth will enable devices to communicate seamlessly through a standardized communications subsystem.
Bluetooth: Why all the hype?
Nov 13, 2000
In this opinion piece, BluetoothTM wireless communication expert Brent A. Miller discusses potential reasons why that technology has garnered so much publicity and industry interest.
Book Review: "Deploying Wireless WANs" and Interview with Jack Unger
Mar 14, 2003
Border Gateway Protocol, Route Manipulation, and IP Multicast
Oct 26, 2007
Prepare for the CCDA exam by reviewing BGP, Route Manipulation, and IP Multicast.
Botnets II: Emerging Threats, Tactics, and Defenses
Dec 19, 2008
Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
Botnets, Part 1: Why They Strike and How to Defend Against Them
Dec 5, 2008
Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
Breaking Unwanted TCP Connections by Modifying Your Route Table
Dec 6, 2001
Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
Broadband Routers and Firewalls
Nov 17, 2006
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
Building a MapReduce Application with Hadoop
Jan 16, 2013
In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.

<< < Prev Page 3 4 5 6 7 Next >