Chapters & Articles

All Articles

Showing 21-40 of 771

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

21.
Variable-Length Subnet Masks
By Wendell Odom
Nov 19, 2016

In this sample chapter from CCENT/CCNA ICND1 100-105 Official Cert Guide, author Wendell Odom introduces variable-length subnet masks (VLSM)

22.
Variable-Length Subnet Masks
By Wendell Odom
Nov 19, 2016

In this chapter fromCCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition, author Wendell Odom introduces variable-length subnet masks (VLSM).

23.
Network Design Models
By Anthony Bruno, Steve Jordan
Sep 28, 2016

In this sample chapter from CCDA 200-310 Official Cert Guide, authors Anthony Bruno and Steve Jordan cover hierarchical network models, the Cisco Enterprise Architecture model, and high-availability network services.

24.
Intercloud Architecture and Technologies
Sep 26, 2016

In this sample chapter from Intercloud: Solving Interoperability and Communication in a Cloud of Clouds, authors Jazib Frahim, Venkata Josyula, Monique Morrow, and Ken Owens explore how cloud providers have set up data centers at many locations to service their customers. For example, Amazon, Google, Microsoft, Salesforce.com, and others have established data centers for hosting cloud application services such as social networking, gaming portals, and business applications. In many of these social networks, the service components run in separate virtual machines that may be hosted in data centers owned by different cloud computing providers. In order to link the services provided by different providers at different locations around the world and to provide quality service to a consumer, it is necessary to build an Intercloud to bring the services together. This chapter details Intercloud architecture mode, Intercloud use cases, and Intercloud deploy.

25.
Enterprise Use Cases for Network Function Virtualization
By Arvind Durai, Stephen Lynn, Amit Srivastava
Jun 13, 2016
Network Function Virtualization (NFV) offers new ways to design, orchestrate, and manage network services. Arvind Durai explores use cases of the adoption of NFV by enterprise architects, to control services in their tenant space.
26.
CSR with OpenStack
By Arvind Durai, Stephen Lynn, Amit Srivastava
Jun 1, 2016
Are you looking at virtualization to solve your horizontal scaling challenge and reduce capital expenditure? Arvind Durai explores OpenStack, the free and open-source cloud computing platform written in Python.
27.
RIP Next Generation (RIPng)
May 27, 2016
28.
Building a Security Strategy
By Bob Vachon
Mar 24, 2016
Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach.
29.
Remote Site Telephony and Branch Redundancy Options
By William Alexander Hannah, Akhil Behl
Mar 5, 2016
Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
30.
3 Common Network Security Threats
Feb 25, 2016
Whether their ultimate intention is harming your organization or stealing its information, attackers are probably already trying to crack your network. Network engineers need to anticipate these attacks and be ready to mitigate them. Security specialist Sean Wilkins points out three attack methods that most networks will experience.
31.
7 Popular Layer 2 Attacks
Feb 25, 2016
If you're responsible for securing a corporate or private network, you need to be aware of the vulnerabilities that attackers will use. Security expert Sean Wilkins discusses seven common methods that can give attackers access, helping them to control or steal information from your network.
32.
Designing and Deploying Cisco Unified IM and Presence
By Chris Olsen
Feb 25, 2016
This chapter describes the Cisco Unified Communications IM and Presence (IM&P) architecture and design.
33.
Securing Cisco Device Management
By Sean Wilkins
Feb 23, 2016
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, Academic Edition, discusses available solutions for addressing basic security concerns of Cisco network devices, including important protocols that every security approach should implement.
34.
Responding to Real-World Cyber Threats
By Joseph Muniz
Feb 16, 2016
Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
35.
Cisco Programmable Fabric Using VXLAN with BGP EVPN
By David Jansen, Lukas Krattiger
Feb 9, 2016
David Jansen and Lukas Krattiger, authors of Cisco Programmable Fabric Using VXLAN with BGP EVPN LiveLessons, explain how Cisco's BGP EVPN enhances VXLAN encapsulation with Layer 2 and Layer 3 benefits.
36.
DHCP Snooping: Basic Concepts and Configuration
By Mason Harris
Feb 9, 2016
Mason Harris, CCIE #5916 and co-author of CCNA Security 210-260 Complete Video Course, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.
37.
Cisco Video Surveillance
By Brian Morgan, Jason Ball
Jan 25, 2016
This chapter from CCNA Collaboration CIVND 210-065 Official Cert Guide offers a high-level overview of the solution Cisco offers in IP surveillance. The first section reviews legacy closed-circuit TV (CCTV) video-surveillance architecture and how it has evolved into what is available today. The subsequent sections cover Cisco’s physical security offering, the components involved with their solution, and the architectural design of how all the different elements work together.
38.
Understanding RRM
By David Hucaby
Jan 22, 2016
This chapter covers configuring 802.11 support and understanding RRM.
39.
Video: CCNP Routing and Switching ROUTE 300-101 Complete Video Course: GRE Tunnel Theory & Configuration
By Kevin Wallace
Jan 20, 2016
In this excerpt from CCNP Routing and Switching ROUTE 300-101 Complete Video Course, Kevin Wallace discusses how to create and configure a GRE Tunnel between two routers.
40.
Video: CCNP Routing and Switching ROUTE 300-101 Complete Video Course: OSPF Route Filtering
By Kevin Wallace
Jan 18, 2016
In this excerpt from CCNP Routing and Switching ROUTE 300-101 Complete Video Course, Kevin Wallace talks about how to do OSPF Route Filtering.

Page: < Prev 1 2 3 4 5 Next >