Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
Oct 19, 2012
This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
CCNP Wireless: QoS for Wireless Applications
Oct 18, 2012
This chapter introduces the concepts of wireless Quality of Service and their related configuration in preparation for the 642-742 IUWVN exam.
The Art of the Data Center: Bahnhof - Stockholm, Sweden
Oct 9, 2012
Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
Recovering and Securing Network and Internet Passwords
Oct 8, 2012
Security expert Eric Geier shows you how to find or capture your network, browser, and email passwords, which is useful if you’ve forgotten them. Plus, he explores password vulnerabilities and teaches you how to protect against them.
Eight Cool Things You Probably Don’t Know About Data Centers
Sep 27, 2012
Doug Alger, author of The Art of the Data Center, discusses eight cool things most people don’t realize about Data Centers in this InformIT exclusive audio segment.
vSphere Pluggable Storage Architecture (PSA)
Sep 26, 2012
This chapter covers PSA (VMware Pluggable Storage Architecture) components. Learn how to list PSA plug-ins and how they interact with vSphere ESXi 5, as well as how to list, modify, and customize PSA claim rules and how to work around some common issues. It also covers how ALUA-capable devices interact with SATP claim rules for the purpose of using a specific PSP.
Cisco IP Telephony Security Framework
Sep 21, 2012
This chapter examines the Cisco IP Telephony Security life cycle. It also shows how to develop an IP telephony security policy, evaluate cost versus risk, determine the level of security required for your IP Telephony network, and develop Cisco IP Telephony Security Framework.
Managing and Optimizing VMware vSphere Deployments: Operating the Environment
Sep 20, 2012
Before delving into maintaining and monitoring a virtual infrastructure, this chapter talks about some other operational items that you might not have considered in the design.
Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
Sep 18, 2012
Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
Storage in vSphere 5
Sep 4, 2012
Eric Maillé and René-François Mennecier explain how vSphere provides the tools for optimal storage configuration.
A Quick Survey of Remote Desktop Technologies
Jul 20, 2012
Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
CCNP Wireless Quick Reference: How to Collect Information for the Wireless Site Survey
Jun 13, 2012
Conducting a wireless site survey is the final step of a carefully planned journey. This chapter helps you prepare for this site survey by listing the pieces of information that you need to collect before meeting your customer and planning the survey itself.
WLAN Fundamentals
May 30, 2012
This excerpt from CCNA Wireless (640-722 IUWNE) Quick Reference covers Wireless Networks and Topologies.
Securing Wireless Networks for CompTIA Network+
May 16, 2012
This important article walks the reader through key security mechanisms that should be considered for any wireless network environment.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
Managing Virtual Machines in the Cloud with the Open-Source libvirt API
May 9, 2012
Stephen Morris shows you how to get up to speed with cloud virtualization using libvirt, an open-source API for access to virtualization facilities.
Mathematical Foundations of Computer Networking: Probability
May 1, 2012
This chapter is an introduction to the theory of probability, beginning by introducing the elementary concepts of outcomes, events, and sample spaces.
How to Create a Wi-Fi Hotspot in Your Car (or Anywhere Around You) to Better Surf the Web
Mar 22, 2012
Jason R. Rich explains how to create a 4G mobile hotspot that can be accessed by any Apple iPhone or iPad to achieve Internet connectivity at speeds up to 10 times faster than a typical 3G wireless data connection.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
VirtualBox: Making the Most of Any Operating System You Choose
Mar 7, 2012
John Traenkenschuh demonstrates how a free tool like VirtualBox can allow you to run multiple Operating Systems (OS) on a lot of PCs — including his MacBook Pro.

<< < Prev Page 6 7 8 9 10 Next >