- Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
- Oct 19, 2012
- This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
|
- CCNP Wireless: QoS for Wireless Applications
- Oct 18, 2012
- This chapter introduces the concepts of wireless Quality of Service and their related configuration in preparation for the 642-742 IUWVN exam.
|
- The Art of the Data Center: Bahnhof - Stockholm, Sweden
- Oct 9, 2012
- Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
|
- Recovering and Securing Network and Internet Passwords
- Oct 8, 2012
- Security expert Eric Geier shows you how to find or capture your network, browser, and email passwords, which is useful if you’ve forgotten them. Plus, he explores password vulnerabilities and teaches you how to protect against them.
|
- Eight Cool Things You Probably Don’t Know About Data Centers
- Sep 27, 2012
- Doug Alger, author of The Art of the Data Center, discusses eight cool things most people don’t realize about Data Centers in this InformIT exclusive audio segment.
|
- vSphere Pluggable Storage Architecture (PSA)
- Sep 26, 2012
- This chapter covers PSA (VMware Pluggable Storage Architecture) components. Learn how to list PSA plug-ins and how they interact with vSphere ESXi 5, as well as how to list, modify, and customize PSA claim rules and how to work around some common issues. It also covers how ALUA-capable devices interact with SATP claim rules for the purpose of using a specific PSP.
|
- Cisco IP Telephony Security Framework
- Sep 21, 2012
- This chapter examines the Cisco IP Telephony Security life cycle. It also shows how to develop an IP telephony security policy, evaluate cost versus risk, determine the level of security required for your IP Telephony network, and develop Cisco IP Telephony Security Framework.
|
- Managing and Optimizing VMware vSphere Deployments: Operating the Environment
- Sep 20, 2012
- Before delving into maintaining and monitoring a virtual infrastructure, this chapter talks about some other operational items that you might not have considered in the design.
|
- Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
- Sep 18, 2012
- Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
|
- Storage in vSphere 5
- Sep 4, 2012
- Eric Maillé and René-François Mennecier explain how vSphere provides the tools for optimal storage configuration.
|
- A Quick Survey of Remote Desktop Technologies
- Jul 20, 2012
- Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
|
- CCNP Wireless Quick Reference: How to Collect Information for the Wireless Site Survey
- Jun 13, 2012
- Conducting a wireless site survey is the final step of a carefully planned journey. This chapter helps you prepare for this site survey by listing the pieces of information that you need to collect before meeting your customer and planning the survey itself.
|
- WLAN Fundamentals
- May 30, 2012
- This excerpt from CCNA Wireless (640-722 IUWNE) Quick Reference covers Wireless Networks and Topologies.
|
- Securing Wireless Networks for CompTIA Network+
- May 16, 2012
- This important article walks the reader through key security mechanisms that should be considered for any wireless network environment.
|
- An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
- May 15, 2012
- Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
|
- Managing Virtual Machines in the Cloud with the Open-Source libvirt API
- May 9, 2012
- Stephen Morris shows you how to get up to speed with cloud virtualization using libvirt, an open-source API for access to virtualization facilities.
|
- Mathematical Foundations of Computer Networking: Probability
- May 1, 2012
- This chapter is an introduction to the theory of probability, beginning by introducing the elementary concepts of outcomes, events, and sample spaces.
|
- How to Create a Wi-Fi Hotspot in Your Car (or Anywhere Around You) to Better Surf the Web
- Mar 22, 2012
- Jason R. Rich explains how to create a 4G mobile hotspot that can be accessed by any Apple iPhone or iPad to achieve Internet connectivity at speeds up to 10 times faster than a typical 3G wireless data connection.
|
- Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
- VirtualBox: Making the Most of Any Operating System You Choose
- Mar 7, 2012
- John Traenkenschuh demonstrates how a free tool like VirtualBox can allow you to run multiple Operating Systems (OS) on a lot of PCs — including his MacBook Pro.
|