27%
12.09.2022
Los Alamos researchers prove that training a quantum neural network will require less data than originally assumed.
25%
14.11.2013
Today's communication networks are designed around the original mechanisms of Ethernet and TCP/IP. Because of the success of these early technologies, networks grew bigger and more complex, which ... Software Defined Networking (SDN) marks a paradigm shift toward a more holistic approach for managing networking hardware. The Floodlight OpenFlow controller offers an easy and inexpensive way
25%
17.06.2011
In these pages, you'll learn about tools for configuring, managing, and troubleshooting your networks. You'll hear about cloud infrastructures, database systems, server plugins, and enterprise ... Our Admin special edition was so popular we're back, with a new quarterly magazine that is all for admins. Welcome to the first issue of Admin: Network and Security – a magazine for administrators
25%
05.09.2011
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ...
Intruders rely on arp cache poisoning to conceal their presence on a local network. We'll show you some of the tools an attacker might use to poison the arp cache and gather information on your
25%
20.05.2014
management and discovery
Log management
Network management
IDS (intrusion detection)
HID (host intrusion detection)
Vulnerability assessment
Threat detection
Behavioral monitoring ... Systems, network, and security professionals face a big problem managing disparate security data from a variety of sources. OSSIM gives IT security professionals the capacity to cut through the noise
25%
15.08.2016
, such attacks can reach bandwidths of 300GBps or more. Admins usually defend themselves by securing the external borders of their own networks and listening for unusual traffic signatures on the gateways ... OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
25%
21.08.2014
OCS Inventory NG (Next Generation) [1] is an inventory system that gathers information about hardware and software running on your network. OCS uses an SNMP-based discovery mechanism to inventory ... If you want to manage large IT environments efficiently, you need automation. In this article, we describe how to transfer information automatically from the OCS network inventory system to the Open
24%
15.06.2011
Click on the button to order single issues or a subscription to ADMIN Network & Security magazine
Order Now »
Subscription prices for 1 year of ADMIN Network & Security print (6 issues + 6 ...
Click on the button to order single issues or a subscription to ADMIN Network & Security magazine
Order Now »
24%
10.06.2015
the data streams.
However, developers have come up with a solution for this analysis problem: a virtual switch with an integrated span port. This setup lets administrators define a network interface ... Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.
24%
06.10.2022
If you are responsible for protecting the corporate infrastructure, you probably have various security products in use to support you in this task – with a distinction made between network and host ... How to deal with threat intelligence on the corporate network when the existing security tools are not effective.