Title: Network and Systems Management
December 22, 2004 Published by  TechTarget

Network and Systems Management

TechTarget
Issue Sponsored By:
  > ITKnowledge Exchange on SearchNetworking.com


IN THIS ISSUE:
  >  Choosing a wireless architecture
  >  Don't underestimate physical security
  >  Identifying e-mail sources
  >  Featured Topic: The best of 2004
  >  Chapter of the Week: 802.11 Wireless LAN Fundamentals
  >  Cisco 2005 outlook: Fostering convergence is top priority
  >  Editor's Choice: Desktop Management


Network and Systems Management Tips

Choosing a wireless architecture
[David Jacobs]
Many office wireless networks have sprung up overnight, with access points placed here and there with no planning and little administration. The choice of a wireless architecture is actually as complicated as choosing a network architecture. With so many vendors and offerings, it is good to know exactly what you need and how the offerings differ. To that end this article, the first of two, discusses important issues in choosing a wireless architecture and describes products from a small sampling of vendors.

Don't underestimate physical security
[Carrie Higbie]
There are several approaches to securing an enterprise network. Vulnerability management, risk management, survivability and accountability or chain-of-responsibility all play key roles, both having two key components -- internal and external risk. Read about some of the more overlooked aspects of physical security.

Identifying e-mail sources
[Barrie Sosinsky]
It's become great sport for spammers and evildoers to spoof people in e-mail in an attempt to extract personal information. This method of spamming is known as "phishing." Phishing is of great concern to organizations like banks, online auction houses, credit card companies, and many other businesses. Thwart these attempts by making sure you and your users know the source of e-mail.


 
ITKnowledge Exchange on SearchNetworking.com
Join ITKnowledge Exchange (ITKE) -- an online community on SearchNetworking.com where you can exchange knowledge with IT pros from around the globe. This innovative feature is better than a list serv or discussion forum and allows you to choose the audience most qualified to answer your toughest IT questions. Create your ITKE profile today!
 


Essential Links

Featured Topic: The best of 2004
What was on your mind during 2004? We've compiled our most popular content for the year; browse through for a refresher on the technologies you'll need to carry you into 2005.

Chapter of the Week: 802.11 Wireless LAN Fundamentals
Chapter 5 - Mobility
This book, by Pejman Roshan and Jonathan Leary, covers the major components of 802.11 wireless LANs. This chapter specifically covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP. (Reproduced from the book '802.11 Wireless LAN fundamentals,' ISBN 1587050773, Copyright 2004, Cisco Systems, Inc. Reproduced with permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses.)

Cisco 2005 outlook: Fostering convergence is top priority
Cisco's 2005 agenda includes pushing deeper into VoIP and making networks easier to manage, but the networking giant's top task is to sell customers on its complex vision for the future.

Editor's Choice: Desktop Management
A good desktop management strategy can have a great impact on the productivity of your organization. Eliminating tedious tasks and increasing efficiency is key, and these documents will help.
-- Top 10 ways to improve desktop management
-- Four ways to sell a patch management strategy
-- Best backup plans for the desktop




Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Network and Systems Management Tip":
Go to unsubscribe: http://searchTechTarget.techtarget.com/u?cid=500351&lid=522392&track=NL-314

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to