Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Building a Mobile Platform Strategy - Part Two
May 30, 2003
Building functional and application roadmaps for enterprise wireless applications is the easy part. Choosing devices, platforms, and application software is the tricky part. Bhavish Sood leads you through the maze.
Building a Remote Data Logger
Nov 2, 2001
This sample chapter from The TINI Specification and Developer's Guide provides a tutorial in building a remote data logger.
Building a Roadmap for Securing Your Enterprise
Nov 16, 2001
This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
Building a Roadmap for Securing Your Enterprise
Jul 13, 2001
This sample chapter equips you with a roadmap for surviving the information security onslaught.
Building Cisco IDS 3.0(3) Custom Signatures
Feb 15, 2002
Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
Building Multiservice Transport Networks: MSPP Network Design Example: Cisco ONS 15454
Oct 13, 2006
The Cisco ONS 15454 is a highly flexible and highly scalable multiservice Synchronous Optical Network (SONET)/Synchronous Digital Hierarchy (SDH)/dense wavelength-division multiplexing (DWDM) platform. Service providers and enterprise customers use the ONS 15454 to build highly available transport networks for time-division multiplexing (TDM), Ethernet, storage extension, and wavelength services. In this chapter, you will learn the major components of the ONS 15454 system.
Building OpenSSH—Tools and Tradeoffs
May 23, 2003
This article updates the July 2001 Sun BluePrints OnLine article, "Building and Deploying OpenSSH for the Solaris Operating Environment." You'll learn about gathering the needed components, making compile-time configuration decisions, building components, and finally assembling the OpenSSH environment.
Building Resilient IP Networks: The Access Module
Jun 9, 2006
This chapter focuses on Ethernet switching technology, specifically Layer 2 network resiliency and how it should be built to provide a solid foundation for the Layer 3 network.
Building the Four Wireless Application Families of the Wireless Internet
Jan 11, 2002
Wireless apps may work on itty-bitty equipment, but they still need to serve up hot games and hotter gossip.
Business Innovation from Israel's Masters of Espionage: The Intercept
Jul 22, 2005
In the inky darkness of the predawn hours, the Red Sea had turned choppy. The sun had yet to bathe the sea, known in Arabic as Al Bahr Al Ahmar, in its winter light. Fishing boats moored in the waters surrounded by Yemen, Saudi Arabia, and the Sudan rocked in the stormy darkness. Find out how Israeli intelligence intercepted a ship smuggling Palestinian arms in this sample chapter.
C Language Issues for Application Security
Jan 25, 2008
How you use C could adversely affect an application's security and robustness.
Cable TV Return-Path Transmission Characteristics
Jun 1, 2001
This article discusses the sources of upstream noise, including ingress noise, and their impact on the return-path transmission over cable TV networks.
Cable TV Set-top Boxes
Nov 13, 2000
Telecommunications expert Annabel Dodd discusses the future of cable set-top boxes, including compression of TV signals, use for gaining Internet access and recording TV programs, and advanced digital security. You'll never look at your TV the same way ...
Campus Distribution (Cisco Catalyst 4500) QoS Design
Jan 22, 2014
This chapter discusses the best-practice QoS design recommendations for the Cisco Catalyst 4500 (Supervisor 6-E/7-E) series switch in the role of a campus distribution layer switch.
Can Your Network Hold Up to Terrorism?
Jan 25, 2002
If you suddenly lost voice communications, Internet access, or data transmission due to terrorism or disaster, could your business survive? Pete Moulton covers the plans that every enterprise needs to implement, just in case.
Capturing Network Traffic for the Catalyst 6000 IDS Module
Feb 15, 2002
With the addition of the Catalyst 6000 IDS Module, you can integrate your Cisco IDS directly into your network’s infrastructure, as discussed by expert Earl Carter.
CCDC and the Tale of the Insider Threat
May 24, 2010
Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
CCENT and CCNA Certification 2013: Which Exam Should You Take?
Mar 26, 2013
If you are considering taking the exams to become certified as a Cisco Certified Entry Networking Technician (CCENT) or Cisco Certified Network Associate (CCNA), this article by Cisco expert Michelle Plumb will help you decide which exams you should take.
CCENT Exam Prep: General Network Security
Apr 2, 2008
This chapter describes common attacks and shows how to mitigate those threats based on the requirements of both the 640-802 CCNA and 640-822 ICND1 exams.
CCENT/CCNA Exam Strategies for Success
Mar 26, 2013
Planning to take a CCNA or CCENT exam? Anthony Sequeira prepares you as much as possible for your new exam with some tried and true Cisco written certification exam strategies for success.

<< < Prev Page 4 5 6 7 8 Next >