• Enterprise network testing: Test lab best practices

    Enterprise network testing can minimize IT service outages, yet developing a test lab can bring up various issues. Knowing best practices for running a test facility is imperative.

  • NAC integration at the endpoint

    NAC integration with endpoint software enables more than just access control. NAC solutions can be used at endpoints to scan for operating system patches, monitor use of virtual sandboxes, control ...

  • Extending NAC enforcement to network security devices

    NAC enforcement tools can be extended to network security and management devices -- and in return user and machine identity can be integrated into firewalling, VPN, application access, intrusion pr...

  • Integrating NAC with network security tools

    Integrating network access control solutions with other network security tools and network inventory applications can produce a more complete user and machine identity to strengthen every policy ac...

Networking Book Excerpts

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Introduction to Network Protection - Protect Your Windows Network from Perimeter to Data, Chapter 1

    Introduction to Network Protection from 'Protect Your Windows Network from Perimeter to Data' by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. 

  • Hacking Wireless Networks For Dummies, Chapter 10: Still at War

    Chapter 10 from Hacking Wireless Networks For Dummies by Kevin Beaver and Peter Davis covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. 

  • CCNA Command Quick Reference, Chapter 3: Configuring a router

    Chapter 3 of CCNA Command Quick Reference by Scott Empson provides information and commands for configuring a router, specifically it covers names, passwords, interfaces, MOTD banners, IP host tables, saving and erasing your configurations and then d... 

  • "LAN Switching First-Step," Chapter 6: How a switch works

    Chapter 6 of "LAN Switching First-Step," by Matthew Castelli, explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragment-free switching mechanisms; and then describes Layer... 

  • Wireless Networks For Dummies, Chapter 1: Removing the tethers: Entering the wireless world

    Removing the tethers: Entering the wireless world, Chapter 1 of Wireless Networks For Dummies by Barry Lewis and Peter Davis, explains the risks and the rewards of going wireless, helps you sort out acronyms and types of wireless networks, and offer... 

  • Firewalls for Dummies, Chapter 1: Why do you need a firewall?

    Firewalls for Dummies, Chapter 1, by Brian Komar, Ronald Beekelaar and Joern Wettern provides an excellent overview of what a firewall is, what it does and how it works. Further, it explains when you might need a firewall, covering issues like Intern... 

  • Choosing an optimal data center site

    This chapter explains how to choose an appropriate location for your data center, from the hazards you should avoid to the physical attributes you want. 

  • Network Virtualization, Chapter 3: A basic virtualized enterprise

    In this excerpt from Network Virtualization by Victor Moreno and Kumar Reddy, learn the technical requirements posed by the need to virtualize the network, as well as an architectural framework comprised of the functional areas necessary to successfu... 

  • Wireless and WiMax introduction

    This chapter excerpt examines the driving forces behind WiMAX, including the desire for more bandwidth, an increasing demand for mobility, the need for global roaming, the requirement on the part of the market to have anywhere, anytime access to cont... 

  • The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference

    This chapter describes some of the key operating fundamentals of TCP beginning with a discussion of how TCP handles data and introduces the concepts of streams, segments, and sequences. Further it describes the most important applications that use TC...