- Foundations of Modern Networking: Background and Motivation of Software-Defined Networks (SDN)
-
By
William Stallings
- Dec 3, 2015
- This chapter from Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud begins the discussion of software-defined networks (SDNs) by providing some background and motivation for the SDN approach.
|
- Troubleshooting Methods for Cisco IP Networks
- Jan 14, 2015
- This chapter from Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: (CCNP TSHOOT 300-135) defines troubleshooting and troubleshooting principles. Next, six different troubleshooting approaches are described. The third section of this chapter presents a troubleshooting example based on each of the six troubleshooting approaches.
|
- The Art of Network Architecture: Applying Modularity
- May 12, 2014
- This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
|
- Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|
- Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES-128 bit encryption on your Cisco Nexus 7000 series switches.
|
- Applied Big Data Analysis in the Real World with MapReduce and Hadoop
- Jan 23, 2013
- In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
|
- Building a MapReduce Application with Hadoop
- Jan 16, 2013
- In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.
|
- Big Data Analysis with MapReduce and Hadoop
- Jan 9, 2013
- Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
|
- Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
- Dec 19, 2012
- What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
|
- Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
- Oct 19, 2012
- This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
|
- Mathematical Foundations of Computer Networking: Probability
- May 1, 2012
- This chapter is an introduction to the theory of probability, beginning by introducing the elementary concepts of outcomes, events, and sample spaces.
|
- Network Security First-Step: Firewalls
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
- Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
- Jan 26, 2012
- Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
|
- ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|
- Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
- Dec 26, 2011
- Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
|
- Software [In]security: Third-Party Software and Security
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- TCP: The Transmission Control Protocol (Preliminaries)
- Nov 24, 2011
- This chapter provides background regarding the issues affecting reliable delivery in general. It shows how those issues play out in TCP and what type of service it provides to Internet applications.
|
- Software [In]security: Software Security Training
- Oct 31, 2011
- Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
|
- Software [In]security: BSIMM3
- Sep 27, 2011
- BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
|
- Software [In]security: Balancing All the Breaking with some Building
- Aug 30, 2011
- Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
|