Chapters & Articles

All Articles

Showing 301-320 of 854

Sort by Date | Title

301.
Corporate Governance, Business Continuity Planning, and Disaster Recovery
Dec 1, 2005
To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
302.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
303.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
304.
Crafting the Test Approach
May 11, 2011
This chapter will begin to fill in the practical details of what is necessary to build an effective approach toward different types of test requests. It begins with a suggested approach for assessing and scoping a test project, and offers guidance and best practices.
305.
Creating a Hotspot Gateway with RouterOS
Nov 2, 2009
Eric Geier shows how to set up the integrated hotspot gateway with RouterOS.
306.
Creating a VPN Server with RouterOS
Oct 27, 2009
Eric Geier continues his RouterOS series by discussing its VPN capabilities
307.
Creating Custom Policies for the Cisco Security Agent
Jul 14, 2006
Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
308.
Creating Your Own VPN
Oct 23, 2012
Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
309.
CSR 1000V Software Architecture
By Arvind Durai, Stephen Lynn, Amit Srivastava
Jan 16, 2019

In this sample chapter from Virtual Routing in the Cloud, explore the software and data plane design of the CSR 1000V, a virtualized software router that runs the IOS XE operating system.

310.
CSR with OpenStack
Jun 1, 2016
Are you looking at virtualization to solve your horizontal scaling challenge and reduce capital expenditure? Arvind Durai explores OpenStack, the free and open-source cloud computing platform written in Python.
311.
Cybersecurity and the Security Operations Center
By Cisco Networking Academy
Jan 9, 2019

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, you will learn about the who, what, and why of cyberattacks—plus review available resources to prepare for a career in cybersecurity operations.

312.
Data Center Architecture and Technologies in the Cloud
Mar 20, 2012
This chapter provides an overview of the architectural principles and infrastructure designs needed to support a new generation of real-time-managed IT service use cases in the data center.
313.
Data Center Design Overview
Dec 31, 2003
This sample chapter covers types of server farms and Data Centers, Data Center topologies, fully redundant Layer 2 and Layer 3 designs, and fully redundant Layer 2 and Layer 3 designs with services.
314.
David Jansen talks data centers, Cisco Catalyst and EnergyWise
Jun 30, 2009
Linda Leung and David Jansen talk about the future of Cisco's Catalyst family, the different versions of IOS, and his own certifications.
315.
Defining the Virtual Business and its Benefits
Mar 26, 2004
Martha Young and Michael Jude define Virtual Business and Virtual Business Processes, explain their benefits, and provide practical implementation examples.
316.
Delivering Broadband Access Today: An Access Technologies Primer
Jan 21, 2005
This chapter explains the infrastructure required to provide broadband internet access to customers. DSL, cable, and Ethernet technologies are covered, and the respective network systems that are required to serve internet in these environments is explained.
317.
Demographic and Social Trends in the Broadband Home
Oct 10, 2003
Who uses broadband, what do they use it for, and how have "always on" connections changed the habits of connected families? This sample chapter examines demographic and social trends of broadband households.
318.
Demystifying Convergence and VoIP
Aug 9, 2002
Convergence eliminates the need for duplicate hardware and special vendors. Learn how Voice over IP (VoIP) uses the Internet Protocol to deliver voice traffic over a converged network.
319.
Deploying a Fast and Stable Wireless Mesh Network
Dec 9, 2009
This chapter provides practical tips and advice for deploying a fast and stable wireless mesh network.
320.
Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
Oct 19, 2012
This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.