1. | - 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
2. | - 5 Questions with Cisco Systems' Telephony Expert Anne Smith
- Jan 31, 2003
|
3. | - 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
4. | - A Cisco Telephony Architecture Evolution
- Sep 3, 2004
- This chapter introduces the concept of ROI, and provides the background and reasoning behind Cisco's decision to migrate to an all-IP network.
|
5. | - A Network Administrator's View of Multiservice Networks
- Dec 9, 2005
- Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
|
6. | - A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
- Mar 31, 2006
- Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
|
7. | - Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
- Mar 11, 2011
- This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
|
8. | - An Overview of Cisco IOS Versions and Naming
- Jun 28, 2013
- This article covers the different Cisco IOS releases and naming structures and aims to give a single location where network engineers can look to figure out what the different releases mean.
|
9. | - An Overview of Cisco IP Communications
- Dec 9, 2005
- This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
|
10. | - An Overview of the syslog Protocol
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
|
11. | - Analyzing Business Goals and Constraints of Network Design
- Aug 6, 2004
- This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
|
12. | - Analyzing MPLS VPN Security
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
13. | - Analyzing the Cisco Enterprise Campus Architecture
- Jul 15, 2010
- This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
|
14. | - Applying Cisco Troubleshooting Tools
- Nov 16, 2001
- This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
|
15. | - Applying the Principles of Network Design
- Feb 1, 2002
- To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
|
16. | - Around the Globe in the Race Against IPv4 Address Depletion
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
17. | - Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
18. | - Attacking the Spanning Tree Protocol
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
19. | - Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
20. | - Backbone Router Configuration
- Mar 14, 2003
|