- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- A Network Administrator's View of Multiservice Networks
- Dec 9, 2005
- Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
|
- Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
- Mar 11, 2011
- This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
|
- Administering Windows Server 2003 Remotely
- Jul 30, 2004
- This chapter covers the wealth of tools and options available to administrators in Windows Server 2003, including many enhancements to tools that existed in previous versions of the system.
|
- An Overview of the syslog Protocol
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
|
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
|
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
|
- Best Practices for Designing a Nagios Monitoring System
- Mar 23, 2007
- David Josephsen provides important advice to help you to make important network monitoring design decisions.
|
- Building a Roadmap for Securing Your Enterprise
- Nov 16, 2001
- This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
|
- Cisco IOS IP Accounting Features
- Oct 19, 2007
- This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details.
|
- Cisco Networking Academy's Introduction to Scaling Networks
- Apr 17, 2014
- This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
|
- Computer Forensics: Tracking an Offender
- Nov 30, 2001
- Learn to collect and analyze evidence found in a compromised computer system.
|
- Configuring the Cisco PIX Firewall for CA Site-to-Site
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
- Creating a Fault-Tolerant Environment in Windows Server 2003
- Aug 6, 2004
- There are many ways to add fault tolerance to network services and resources running on Windows Server 2003 servers, and all without the hassle of third-party software. Find out how to use them in this chapter from Microsoft Windows Server 2003 Insider Solutions.
|
- Data Communications: Use the Right Medium for your Message
- Apr 12, 2002
- Learn when to use twisted pair cable, satellites, or fiber-optics to get your message across. From economic considerations to bandwidth limitations, here's a guide to your options.
|
- Desktop Search Tools - A Security Investigator's New Best Friend
- Oct 26, 2007
- John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
|
- Detecting Signs of Intrusion
- Dec 28, 2001
- This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
|
- Diary of a Network Administrator: Mean People Suck
- Nov 15, 2002
- In this diary entry, Joseph Phillips lists characteristics of good (and bad) network administrators.
|