Chapters & Articles

All Articles

Showing 21-40 of 813

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

21.
Advanced STP Tuning
By Bradley Edgeworth, Frankena, Jason Gooley, Ramiro Garza Rios
Feb 11, 2020

In this sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, you will review techniques for configuring a switch to be guaranteed as the root bridge or as a backup root bridge for a Layer 2 topology.

22.
Route Summarization
By Scott Empson
Feb 11, 2020

In this sample chapter from CCNA 200-301 Portable Command Guide, 5th Edition, you will explore route summarization and requirements.

23.
Introduction to Personal Computer Hardware
By Cisco Networking Academy, Allan Johnson
Jan 30, 2020

In this sample chapter from the Cisco Networking Academy IT Essentials Labs and Study Guide Version 7, you will review the definition of a computer, safety guidelines, computer components, and the process for disassembling a computer.

24.
Introduction to Personal Computer Hardware
By Cisco Networking Academy
Jan 30, 2020

In this sample chapter from IT Essentials Course Booklet, 7th Edition, by Cisco Networking Academy, you will be introduced to the components that make up a computer, including connectors, power supplies, storage drives, and more.

25.
Sharing the Context
By Chad Mitchell, Jamie Sanbower, Vivek Santuka, Aaron Woland
Jul 9, 2019

In this sample chapter from Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization, you will learn about the many different ways of sharing context out of Cisco Identify Services Engine (ISE) to other security solutions, about Rapid Threat Containment, and about the Platform Exchange Grid (pxGrid). Because ISE is positioned to know exactly who and what is on the network at any given time, as well as assign different levels of access and context assignments with security group tags, it is the perfect security tool to be at the center of a security ecosystem.

26.
CSR 1000V Software Architecture
By Arvind Durai, Stephen Lynn, Amit Srivastava
Jan 16, 2019

In this sample chapter from Virtual Routing in the Cloud, explore the software and data plane design of the CSR 1000V, a virtualized software router that runs the IOS XE operating system.

27.
IoT and Security Standards and Best Practices
By Rik Irons-Mclean, Anthony Sabella, Marcelo Yannuzzi
Jan 14, 2019

In this sample chapter from Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT, the author team raises awareness of what should be considered when planning to secure an IoT system and highlights some of the more robust standards and best practices used today that can help.

28.
Infrastructure Security and Segmentation
By Mason Harris, Jamie Sanbower, Vivek Santuka, Aaron Woland
Jan 11, 2019

In this sample chapter from Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, you will review security of the three planes of network infrastructure, the importance of segmenting traffic and methods for doing so, and the benefits of NetFlow.

29.
Linux Operating System
By Cisco Networking Academy
Jan 10, 2019

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, learn how to perform basic Linux operations as well as administrative and security-related tasks.

30.
Multicast Design Solutions
By Ray Blair, Arvind Durai, Josh Loveless
Jan 10, 2019

In this sample chapter from IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design, you will examine several archetypical network design models and best practices for multicast deployments.

31.
Cybersecurity and the Security Operations Center
By Cisco Networking Academy
Jan 9, 2019

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, you will learn about the who, what, and why of cyberattacks—plus review available resources to prepare for a career in cybersecurity operations.

32.
External Routing with ACI
By Frank Dagenhardt, Bill Dufresne, Jose Moreno
Jan 9, 2019

In this sample chapter from Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure, learn how to enable Layer 3 communication and integrate with routing protocols you may already be using in your environment.

33.
NX-OS Troubleshooting Tools
By Brad Edgeworth, Richard Furr, Vinit Jain
Jan 8, 2019

In this sample chapter from Troubleshooting Cisco Nexus Switches and NX-OS, you will review the various tools available on the Nexus platform that can help in troubleshooting and day-to-day operation.

34.
Responding to a Breach
By Aamir Lakhani, Joseph Muniz
Jan 8, 2019

In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.

35.
FTD on ASA 5500-X Series Hardware
By Nazmul Rajib
Jul 3, 2018

In this sample chapter from Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall, Next-Generation Intrusion Prevention System, and Advanced Malware Protection, review the steps required to reimage and troubleshoot any Cisco ASA 5500-X Series hardware.

36.
Service Design and Building the IT Service Portfolio
By Justin Mann
Apr 6, 2018

In this sample chapter from IT as a Service (ITaaS) Framework, The: Transform to an End-to-End Services Organization and Operate IT like a Competitive Business, examine the purpose, goals, and value potential of a Service portfolio. You’ll also explore how to design specific elements of the Service portfolio and review various guidelines, best practices, and lessons learned for the successful design of IT Services across the enterprise.

37.
Explore the Network
Jan 10, 2018

This sample chapter from Introduction to Networks v6 Companion Guide , introduces the platform of data networks upon which our social and business relationships increasingly depend. The material lays the groundwork for exploring the services, technologies, and issues encountered by network professionals as they design, build, and maintain the modern network.

38.
Introduction to Performance Routing (PfR)
By Brad Edgeworth, Jean Marc Barozet, Nir Ben-Dvora, Anthony Lockhart, David Prall
Jan 10, 2018

In this sample chapter from Cisco Intelligent WAN (IWAN), the authors cover Performance Routing (PfR), Introduction to the IWAN domain, and Intelligent path control principles

39.
BGP Fundamentals
By Vinit Jain, Brad Edgeworth
Jan 1, 2018

In This sample chapter from Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP, the authors cover BGP Messages and Inter-Router Communication, Basic BGP Configuration for IOS, IOS XR, and NX-OS, IBGP Rules, EBGP Rules, and BGP Route Aggregation

40.
Introduction to Lab Procedures and Tool Use
By - Cisco Networking Academy
Jan 1, 2018

This sample chapter from IT Essentials Companion Guide v6, 6th Edition, covers basic safety practices for the workplace, hardware and software tools, and the disposal of hazardous materials. Safety guidelines help protect individuals from accidents and injury. They also help to protect equipment from damage. Some of these guidelines are designed to protect the environment from contamination caused by improperly discarded materials.

Page: < Prev 1 2 3 4 5 Next >