Et Cetera


Multiprotocol Label Switching: An In Depth View

Contributed by LoyCurtis Smith


Survey of Sensitive Information Detection Techniques: The need and usefulness of Machine Learning Techniques

Contributed by Riya Shah and Manisha Valera


Software Defined Networking: What it is and what you should know!

Contributed by Jeff Dixon

It’s well known that technology changes and creates new and increasing demands at an incredible pace. There have been few dramatic changes in how networks are designed over the years, however, that is quickly changing with the advent of Software Defined Networking (SDN). This paper will serve to provide a comprehensive guide to explore and explain the advancements of Software Defined Networking. The purpose is aimed to further inform and educate readers about SDN, what it is, and what you need to know moving forward, learning today for the challenges of tomorrow.

This document is in PDF format. To view it click here.


Enterprise Network Management

Contributed by Billy Short

This document was created for the implementation of best practices in enterprise network management. Specifically, best practices in security are emphasized. Best practices in an enterprise network are used by Network Administrators and Information Technology management in order to consistently create highly functional, yet highly secure networks. Secure networks are key in providing clients, customers, and employee's data and other files safe and secure. While reading and understanding this report, individuals will learn that the level of security and the level of usability by the user is directly affected. A network can be extremely secure, but impractical to use.

This document is in PDF format. To view it click here.


Impact of Network Security Vulnerability Managment

Contributed by Robert Underwood

Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns that negatively impact customers and the delivery of service. The challenge of managing cyber security for a large network is monumental because of the complexity of cyber security associated with multifaceted and interrelated systems to which data, voice, and video may be imbedded. Since all computers in the network are interconnected and their cyber security is independent the total effort required for the entire network the effort to manage cyber security becomes multiplied by a colossal scale.

This document is in PDF format. To view it click here.


Subscribe to RSS - Et Cetera