Email Alerts
-
FCAPS (fault-management, configuration, accounting, performance, and security)
FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. Definition
-
What are the best tools for monitoring and troubleshooting my network?
See what monitoring and troubleshooting tools are best for your Exchange server, Windows 2003 servers and network, in this Q&A with security expert Puneet Mehta. Ask the Expert
-
Network downtime from security attacks proves costly
Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense. Article
-
Can you suggest a free vulnerability assessment tool to identify vulnerabilities in a campus network
Learn what free vulnerability assessment tools to identify vulnerabilities in a campus network are available in this response from security expert Puneet Mehta. Ask the Expert
-
How do I get upper management to see the urgency of our compromised network, and how do I begin test
Testing the integrity of your network's data and expressing concern to upper management are issues discussed by security expert Puneet Mehta in this Q&A. Ask the Expert
-
Can you help me find good monitoring tools and protocol analyzers?
In this Q&A, enterprise security expert Michael Gregg suggests some good network monitoring tools and protocol analyzers and recommends what users should do before buying. Ask the Expert
-
'Hacking for Dummies' giveaway contest
Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver. Article
-
Network hacking for dummies: Not just for dummies anymore
Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition. Article
-
Network Infrastructure -- Chapter 9 of "Hacking for Dummies"
This chapter will help you in selecting tools, scanning network hosts, assessing security with a network analyzer, and will guide you in preventing denial-of-service and infrastructure vulnerabilities. Chapter Download
-
Content filtering -- Taming the wild Web
Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privileges by downloading pornography or pirated software. E... Tip
Network Management Strategies for the CIO