Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Network Security First-Step: Firewalls
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
Cyber Stalking, Fraud, and Abuse
Feb 1, 2012
This chapter explores what the various major types of internet fraud are, what the law says, and what you can do to protect yourself.
Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
Jan 26, 2012
Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
How TCP/IP Works
Jan 18, 2012
This chapter describes the TCP/IP protocol system and shows how the components of TCP/IP work together to send and receive data across the network.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
Jan 3, 2012
This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
Secure Your iPad 2 Now!
Dec 28, 2011
Is your iPad 2 reasonably secured right out of the box? Maybe not. Security specialist John Traenkenschuh, CISSP-ISSAP, provides sensible, flexible security patterns for the iPad 2.
Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
Dec 26, 2011
Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
CCNA ICND2 Cert Guide: Variable Length Subnet Masks
Dec 19, 2011
This chapter introduces VLSM, including VLSM Concepts and Configuration, Finding VLSM Overlaps, Adding New Subnets to an Existing VLSM Design, and Designing a Subnetting Plan Using VLSM.
LAN Network Cable Media and Connectors
Dec 19, 2011
This article takes a look at the LAN network cable media that is typically installed in most environments and the different connectors that are often used.
Secure Your Linux Workstation Now!
Dec 12, 2011
Security writer John "Tränk" Traenkenschuh, CISSP-ISSAP, explores several easy-to-use security improvements you can make to your Linux workstation, using two very popular distributions as models: Ubuntu 11.10 and Fedora 15.
Network Diagram Creation and Interpretation
Dec 5, 2011
This article is intended to be a primer on network diagrams, what the common symbols are, how the symbols are connected and how to interpret the different connectors on a diagram.
PKI: Broken, But Fixable
Nov 30, 2011
The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
Software [In]security: Third-Party Software and Security
Nov 30, 2011
How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
Connecting Your MacBook to a Network
Nov 28, 2011
In this chapter, you’ll learn how to get your MacBook online including tasks like connecting to wired and wireless networks, iPhones, VPNs and more.
TCP: The Transmission Control Protocol (Preliminaries)
Nov 24, 2011
This chapter provides background regarding the issues affecting reliable delivery in general. It shows how those issues play out in TCP and what type of service it provides to Internet applications.
OSI and TCP/IP Model Layers
Nov 22, 2011
Because both the OSI and TCP/IP models are still used when describing modern day protocols, this article will take a look at them both, including their layers and how they can be related to each other.
The TCP/IP and OSI Networking Models
Nov 21, 2011
This chapter explains the terminology and concepts behind TCP/IP. It also explains the terminology behind the OSI networking model in comparison to TCP/IP.
Secure Your Mac OS X System Now!
Nov 15, 2011
John Traenkenschuh, gives his ideas on good security for your Mac OS X computer. Easy to configure and immediately useful, these ideas will help you secure your expensive device and very valuable information.
CCNP: Troubleshooting OSPF
Nov 14, 2011
In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).

<< < Prev Page 7 8 9 10 11 Next >