Chapters & Articles

All Articles

Showing 121-140 of 544

Sort by Date | Title | Popularity

Page: « Prev 5 6 7 8 9 Next »

121.
Building a Business Case for VoIP
By John Q. Walker, Jeffrey T. Hicks
Feb 23, 2004
This chapter explains how to build a business case for VoIP. It points out some of the benefits that VoIP can provide and discusses how to analyze return on investment (ROI) for VoIP implementation and management.
122.
Effective BGP Policy Control
By Micah Bartell, Randy Zhang
Jan 23, 2004
123.
Developing "Deploying License-Free Wireless Wide-Area Networks"
By Jack Unger
Jul 11, 2003
124.
Introduction to Cisco IP Telephony (CIPT) Components
By David Lovell
Dec 17, 2001
This chapter discusses the Cisco IP Telephony (CIPT) components and the following topics: abbreviations, audience, prerequisites, Sources of Information, Cisco AVVID, and CIPT Components.
125.
Passing Certification Exams
By Denise Donohue
Sep 26, 2003
Denise Donohue describes what it takes to be a successful test-taker.
126.
Optimizing Applications on Cisco Networks: Beyond the Boundaries
By Michael Hicks
Jan 28, 2005
You may only operate (own) part of your delivery mechanism, relying on third-party organizations to deliver your application to both your internal staff and your customers. This chapter discusses approaches to this situation, covering ways to work within these confinements.
127.
Demystifying Convergence and VoIP
By Anne Smith
Aug 9, 2002
Convergence eliminates the need for duplicate hardware and special vendors. Learn how Voice over IP (VoIP) uses the Internet Protocol to deliver voice traffic over a converged network.
128.
A Cisco Telephony Architecture Evolution
By Stephanie Carhee
Sep 3, 2004
This chapter introduces the concept of ROI, and provides the background and reasoning behind Cisco's decision to migrate to an all-IP network.
129.
Building Cisco IDS 3.0(3) Custom Signatures
By Earl Carter
Feb 15, 2002
Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
130.
Troubleshooting Your CCIE Lab
By Henry Benjamin
May 23, 2003
Henry Benjamin, Triple CCIE and former CCIE Proctor, shares some of the tools he used to pass CCIE lab examinations.
131.
CCNP BSCI Exam: Using OSPF Across Multiple Areas
By Clare Gough
Apr 25, 2003
132.
Make the Right Call: Cisco's AVVID
By Robert Richardson
Jun 21, 2002
Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
133.
E-Learning Goes Global: How the Cisco Networking Academy Transforms Lives
By Nader A Nanjiani, Tom M Kelly
Dec 10, 2004
With its global success in transforming lives, learning, and social paradigms, the Cisco Networking Academy Program is hailed as a remarkably successful example of a productivity pyramid metaphor.
134.
What's New in CCNA #640-607?
By Cisco Systems, Inc.
Mar 22, 2002
Confused about the new CCNA exam? This FAQ from Cisco Press answers the most common questions about Cisco's new exam #640-607.
135.
Learning WAN Switching Technologies
By Tracy L Thorpe
Apr 18, 2003
136.
The Security Certification Quagmire
By Steve Kalman
May 30, 2003
137.
Intrusion Detection: Cisco IDS Overview
By Earl Carter, Rick Stiffler
Dec 28, 2001
Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
138.
Should I Be Interested in MPLS Traffic Engineering?
By Ivan Pepelnjak
Jan 3, 2003
139.
Cisco Networking Simplified: Security
By Paul Della Maggiora, Jim Doherty
Jun 20, 2003
Security should be designed around efforts to protect from the outside and control from the inside. Discover the vital aspects of security and identity and how each can function to keep your company and its parts safe.
140.
Letting The Telecommuters Into The Network
By Rebecca Rohan
Dec 23, 2004
You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.

Page: « Prev 5 6 7 8 9 Next »