Home > Articles > Networking > Network Administration & Management

Network Administration & Management

RSS Feed Subscribe to this topic  RSS details

74 Items

Sort by Date | Title

"Open Sesame" or Not? Use the Right Access Controls
By Julia H. Allen
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
A Network Administrator's View of Multiservice Networks
By Robert Wood
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
By Kevin Shatzkamer, Mark Grayson, Klaas Wierenga
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
Administering Windows Server 2003 Remotely
By Ed Roberts, Andrew Abbate, Eric Kovach, Rand Morimoto
Jul 30, 2004
This chapter covers the wealth of tools and options available to administrators in Windows Server 2003, including many enhancements to tools that existed in previous versions of the system.
An Overview of the syslog Protocol
By Anand Deveriya
Dec 1, 2005
This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
Authentication Auditing in Windows 2000
By Rick Cook
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
By Ryan Faas
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
Backup Basics Part 2: Demystifying Backup Media
By Ryan Faas
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
Backup Basics Part 3: General Tips for a Backup Strategy
By Ryan Faas
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
Best Practices for Designing a Nagios Monitoring System
By David Josephsen
Mar 23, 2007
David Josephsen provides important advice to help you to make important network monitoring design decisions.
Building a Roadmap for Securing Your Enterprise
By Greg Shipley
Nov 16, 2001
This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
Cisco IOS IP Accounting Features
By Benoit Claise, Ralf Wolter
Oct 19, 2007
This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details.
Cisco Networking Academy's Introduction to Scaling Networks
By Cisco Networking Academy
Apr 17, 2014
This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
Computer Forensics: Tracking an Offender
By Jay G. Heiser, Warren G. Kruse II
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Configuring the Cisco PIX Firewall for CA Site-to-Site
By Andrew Mason
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
Creating a Fault-Tolerant Environment in Windows Server 2003
By Ed Roberts, Andrew Abbate, Eric Kovach, Rand Morimoto
Aug 6, 2004
There are many ways to add fault tolerance to network services and resources running on Windows Server 2003 servers, and all without the hassle of third-party software. Find out how to use them in this chapter from Microsoft Windows Server 2003 Insider Solutions.
Data Communications: Use the Right Medium for your Message
By Gilbert Held
Apr 12, 2002
Learn when to use twisted pair cable, satellites, or fiber-optics to get your message across. From economic considerations to bandwidth limitations, here's a guide to your options.
Desktop Search Tools - A Security Investigator's New Best Friend
By John Traenkenschuh
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Detecting Signs of Intrusion
By Julia H. Allen
Dec 28, 2001
This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
Diary of a Network Administrator: Mean People Suck
By Joseph Phillips
Nov 15, 2002
In this diary entry, Joseph Phillips lists characteristics of good (and bad) network administrators.

Page 1 2 3 4 Next >