301. | - Corporate Governance, Business Continuity Planning, and Disaster Recovery
- Dec 1, 2005
- To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
|
302. | - Cracking Wi-Fi Protected Access (WPA), Part 1
- Mar 4, 2005
- In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
|
303. | - Cracking Wi-Fi Protected Access (WPA), Part 2
- Mar 11, 2005
- Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
|
304. | - Crafting the Test Approach
- May 11, 2011
- This chapter will begin to fill in the practical details of what is necessary to build an effective approach toward different types of test requests. It begins with a suggested approach for assessing and scoping a test project, and offers guidance and best practices.
|
305. | - Creating a Hotspot Gateway with RouterOS
- Nov 2, 2009
- Eric Geier shows how to set up the integrated hotspot gateway with RouterOS.
|
306. | - Creating a VPN Server with RouterOS
- Oct 27, 2009
- Eric Geier continues his RouterOS series by discussing its VPN capabilities
|
307. | - Creating Custom Policies for the Cisco Security Agent
- Jul 14, 2006
- Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
|
308. | - Creating Your Own VPN
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|
309. | - CSR 1000V Software Architecture
- By
Arvind Durai, Stephen Lynn, Amit Srivastava
- Jan 16, 2019
In this sample chapter from Virtual Routing in the Cloud, explore the software and data plane design of the CSR 1000V, a virtualized software router that runs the IOS XE operating system.
|
310. | - CSR with OpenStack
- Jun 1, 2016
- Are you looking at virtualization to solve your horizontal scaling challenge and reduce capital expenditure? Arvind Durai explores OpenStack, the free and open-source cloud computing platform written in Python.
|
311. | - Cybersecurity and the Security Operations Center
- By
Cisco Networking Academy
- Jan 9, 2019
In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, you will learn about the who, what, and why of cyberattacks—plus review available resources to prepare for a career in cybersecurity operations.
|
312. | - Data Center Architecture and Technologies in the Cloud
- Mar 20, 2012
- This chapter provides an overview of the architectural principles and infrastructure designs needed to support a new generation of real-time-managed IT service use cases in the data center.
|
313. | - Data Center Design Overview
- Dec 31, 2003
- This sample chapter covers types of server farms and Data Centers, Data Center topologies, fully redundant Layer 2 and Layer 3 designs, and fully redundant Layer 2 and Layer 3 designs with services.
|
314. | - David Jansen talks data centers, Cisco Catalyst and EnergyWise
- Jun 30, 2009
- Linda Leung and David Jansen talk about the future of Cisco's Catalyst family, the different versions of IOS, and his own certifications.
|
315. | - Defining the Virtual Business and its Benefits
- Mar 26, 2004
- Martha Young and Michael Jude define Virtual Business and Virtual Business Processes, explain their benefits, and provide practical implementation examples.
|
316. | - Delivering Broadband Access Today: An Access Technologies Primer
- Jan 21, 2005
- This chapter explains the infrastructure required to provide broadband internet access to customers. DSL, cable, and Ethernet technologies are covered, and the respective network systems that are required to serve internet in these environments is explained.
|
317. | - Demographic and Social Trends in the Broadband Home
- Oct 10, 2003
- Who uses broadband, what do they use it for, and how have "always on" connections changed the habits of connected families? This sample chapter examines demographic and social trends of broadband households.
|
318. | - Demystifying Convergence and VoIP
- Aug 9, 2002
- Convergence eliminates the need for duplicate hardware and special vendors. Learn how Voice over IP (VoIP) uses the Internet Protocol to deliver voice traffic over a converged network.
|
319. | - Deploying a Fast and Stable Wireless Mesh Network
- Dec 9, 2009
- This chapter provides practical tips and advice for deploying a fast and stable wireless mesh network.
|
320. | - Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions
- Oct 19, 2012
- This chapter shows how to deploy and manage client-based Secure Sockets Layer (SSL) virtual private networks (VPN) on Cisco Adaptive Security Appliance (ASA) as the VPN gateway using AnyConnect Secure Mobility Client software.
|