Chapters & Articles

All Articles

Showing 1-20 of 834

Sort by Date | Title

Page: 1 2 3 4 5 Next >

Workload Optimization
Dec 17, 2022
Port Channels and vPCs
Nov 9, 2022
Python Functions, Classes, and Modules
Nov 9, 2022
Understanding ACI Hardware and Topologies
Nov 9, 2022
Introduction: A License to Design
Nov 5, 2022
Nov 5, 2022
Sep 24, 2022
Firewall Deployment in Routed Mode
Sep 24, 2022
Sep 24, 2022
Communication Principles
By Cisco Networking Academy
Mar 25, 2022

In this sample chapter from Networking Essentials Companion Guide, you will explore the protocols of network communication and how to troubleshoot problems in your network.

Using APIs
By Constantin Mohorea
Feb 10, 2022

When API load increases due to growth of user requests and application data, hardware requirements increase as well. In this sample chapter from Cisco DevNet Professional DEVCOR 350-901 Study Guide, you will explore application optimization through HTTP caching, HTTP condition requests, caching controls, and HTTP data compression.

Initial Configuration Settings on the Cisco Expressway
By Thomas Arneson, Jason Ball
Jan 25, 2022

In this sample chapter from CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide, you will explore protocol interworking on the Cisco Expressway. It covers both the H.323 and SIP settings and includes interworking on the Expressway. You will also confirm these settings with the verification of registration.

Clocks, Time Error, and Noise
By Shahid Ajmeri, Dennis Hagarty, Anshul Tanwar
Jan 8, 2022

In the world of electronics, the term clock refers to a microchip that generates a clock signal, which is used to regulate the timing and speed of the components on a circuit board. This sample chapter from Synchronizing 5G Mobile Networks explains the different metrics used to quantify time error and how to measure them.

Linux Storage, Security, and Networks
By Khaled Abuelenain, Jeff Doyle, Vinit Jain, Anton Karneliuk
Jan 8, 2022

Many network engineers struggle with concepts such as what mounting a volume means and the relationship between physical and logical volumes. This sample chapter from Network Programmability and Automation Fundamentals covers everything you need to know about storage to effectively manage a Linux-based environment, whether it is your development environment or the underlying Linux system on which a network operating system is based, such as IOS XR and NX-OS.

Using Data from Your Network
By Ivo Pinto
Nov 20, 2021

In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.

Web Authentication
By Katherine McNamara, Aaron Woland
Feb 25, 2021

There are a number of reasons that a company may choose to implement a WebAuth strategy. In this sample chapter from CCNP Security Identity Management SISE 300-715 Official Cert Guide, you will learn how to configure Centralized Web Authentication, build CWA authorization rules, and verify Centralized Web Authentication.

VMM Integration
By Sadiq Memon, Joseph Ristaino, Carlo Schmidt
Feb 2, 2021

In this sample chapter from ACI Advanced Monitoring and Troubleshooting, you will learn about Virtual Machine Manager (VMM) and its integration into Cisco Application Centric Infrastructure (ACI).

Challenges in the Security Operations Center (SOC)
By Omar Santos
Jan 11, 2021

In this sample chapter from Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, you will learn how attackers obtain stealth access and the tricks used to negatively impact detection and forensic technologies.

Network Automation
By Patrick Gargano
Dec 20, 2020

In this sample chapter from 31 Days Before Your CCNP and CCIE Enterprise Core Exam, you will review network configuration management tools such as Puppet, Chef, Ansible, and SaltStack.

Security Through Network Fundamentals
By Brett Hall, Nik Smith
Dec 5, 2020

In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.

Page: 1 2 3 4 5 Next >