Booksgiving: Buy 1, save 40% or buy 2+, save 55% on eligible books & eBooks* through December 7 with code BOOKSGIVING

Favorites

Automation

CCIE

SD-WAN

book cover: Network Automation Made Easy book cover: CCIE Enterprise Infrastructure Foundation, 2nd Edition book cover: Cisco Software-Defined Wide Area Networks

Coming Soon  | Just Released   

Free Chapters and Articles

arrow Challenges in the Security Operations Center (SOC)
In this sample chapter from Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, you will learn how attackers obtain stealth access and the tricks used to negatively impact detection and forensic technologies.

arrow Using data from your network
In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.

arrow Initial configuration settings on the Cisco Expressway
In this sample chapter from CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide, you will explore protocol interworking on the Cisco Expressway. It covers both the H.323 and SIP settings and includes interworking on the Expressway. You will also confirm these settings with the verification of registration.

arrow Optimize API usage through HTTP cache controls
When API load increases due to growth of user requests and application data, hardware requirements increase as well. In this sample chapter from Cisco DevNet Professional DEVCOR 350-901 Study Guide, you will explore application optimization through HTTP caching, HTTP condition requests, caching controls, and HTTP data compression.

arrow Linux storage, security, and networks
Many network engineers struggle with concepts such as what mounting a volume means and the relationship between physical and logical volumes. In this sample chapter from Network Programmability and Automation Fundamentals, you will explore everything you need to know about storage to effectively manage a Linux-based environment.

arrow How to configure Centralized Web Authentication
There are a number of reasons that a company may choose to implement a WebAuth strategy. In this sample chapter from CCNP Security Identity Management SISE 300-715 Official Cert Guide, you will learn how to configure Centralized Web Authentication, build CWA authorization rules, and verify Centralized Web Authentication.