Chapters & Articles

All Articles

Showing 141-148 of 148

Sort by Date | Title

Page: < Prev 4 5 6 7 8

141.
What's the Purpose of the Network?
By Zig Zsiga
Jul 3, 2023

As a network designer, understanding the purpose and goal of the network is critical to properly designing it. This sample chapter from Cisco Certified Design Expert (CCDE 400-007) Official Cert Guide maps to the CCDE v3.0 Unified Exam Topics Section 4.0, "Service Design," and covers the service design topics—from business applications and service models, to the cloud and data management—you need to meet business objectives.

142.
Why IT Pros Need to Learn About IPv6 Security Now: An Interview with Scott Hogg and Eric Vyncke
By Linda Leung, Scott Hogg, Eric Vyncke
Jul 4, 2009
Linda Leung talks with Scott Hogg and Eric Vyncke about IPv6 transition and security issues.
143.
Why Should You Consider Passing the SCYBER Exam?
By Joseph Muniz
Jan 5, 2016
Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
144.
Wired Host Networking Configuration
By Russ White
Apr 17, 2024
Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide, you will obtain a practical examination of configuring individual hosts to connect to and use an IP network. This chapter includes coverage of the Cisco Certified Support Technician CCST Networking exam from the original exam blueprint.

145.
Wireless Concepts
By Allan Johnson
Mar 27, 2020

In this sample chapter from 31 Days Before your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam, you will learn how to explain the role and function of network components, describe wireless principles, compare Cisco Wireless Architectures and AP modes, and more.

146.
Workload Optimization
By Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, Mohit Vaswani
Dec 17, 2022

Workload Optimizer is an analytical decision engine that generates actions that drive the IT environment toward a desired state where workload performance is assured and cost is minimized. In this sample chapter from Cisco Intersight: A Handbook for Intelligent Cloud Operations, you will explore how Workload Optimizer helps applications perform well while simultaneously minimizing cost (in a public cloud) and optimizing resource utilization (on premises) while also complying with workload policies.

147.
Zero Trust Capabilities
By Cindy Green-Ortiz, Brandon Fowler, Jason Frazier, Hank Hensel, David Houck, Patrick Lloyd, Andrew McDonald
Dec 24, 2023

In this sample chapter from Zero Trust Architecture, uncover the foundations of Zero Trust strategy with insights into its five pillars: policy overlay, identity-centric approach, vulnerability management, access control, and visibility. The authors offer a comprehensive guide for implementing Zero Trust in your organization.

148.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.

Page: < Prev 4 5 6 7 8