581. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
582. | - Python Functions, Classes, and Modules
- By
Jason Gooley, Adrian Iliesiu, Chris Jackson, Ashutosh Malegaonkar
- Nov 9, 2022
Building Python functions allows for the creation of reusable code and is the first step toward writing object-oriented code. In this sample chapter from Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide, you will review working with and building Python functions. It also introduces how Python modules can extend the capabilities of Python and make your job of coding much easier.
|
583. | - Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
- Sep 18, 2012
- Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
|
584. | - Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
- Apr 15, 2011
- Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
|
585. | - Q&A with the Authors of "AAA Identity Management Security"
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
586. | - QoS Design Principles and Best Practices
- Jan 1, 2018
In this sample chapter from Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, 4th Edition, the authors cover some best practice QoS design principles and QoS strategy models that are used to implement the numerous QoS tools we have at our disposal. Remember that usually, more than one solution fits the given QoS requirements, so simplifying the models leveraged can significantly accelerate and ensure proper QoS deployment.
|
587. | - Quality of Service Design Overview
- Dec 17, 2004
- This chapter provides an overview of the QoS design and deployment process. This process requires business-level objectives of the QoS implementation to be defined clearly and for the service-level requirements of applications to be assigned preferential or deferential treatment so that they can be analyzed.
|
588. | - Real World Project Management: An Introduction
- Jan 7, 2005
- Everyone talks about project management, but what is it? Project management expert Joseph Phillips kicks off his new series by looking at the big picture of project management.
|
589. | - Real World Project Management: Managing the Project Scope
- Jan 28, 2005
- How many of your projects fail? Can you blame that failure on lack of scope control, poorly defined requirements, or stakeholders who think your project is a la carte? If so, you need real-world scope management, as discussed by project management expert Joseph Phillips.
|
590. | - Recovering and Securing Your Wi-Fi Encryption Keys
- Jun 4, 2010
- Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
|
591. | - Remote Site Telephony and Branch Redundancy Options
- Mar 5, 2016
- Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
|
592. | - Responding to a Breach
- By
Aamir Lakhani, Joseph Muniz
- Jan 8, 2019
In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.
|
593. | - Responding to Real-World Cyber Threats
- Feb 16, 2016
- Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
|
594. | - RIP Next Generation (RIPng)
- May 27, 2016
|
595. | - Role of CS-MARS in Your Network
- Oct 16, 2006
|
596. | - Route Summarization
- By
Scott Empson
- Feb 11, 2020
In this sample chapter from CCNA 200-301 Portable Command Guide, 5th Edition, you will explore route summarization and requirements.
|
597. | - Routers and Switches and Hubs, Oh My! An Introduction to Network Devices and Their Functions
- Oct 12, 2015
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses some of the most common network devices that network engineers need to know and understand.
|
598. | - Routing Concepts
- Jan 1, 2018
This sample chapter from Routing and Switching Essentials v6 Companion Guide, answer the question, “What does a router do with a packet received from one network and destined for another network?” Details of the routing table will be examined, including connected, static, and dynamic routes.
|
599. | - Routing Information Protocol (RIPv2)
- By
Narbik Kocharians
- Feb 5, 2023
The Routing Information Protocol (RIP) is a perfect example of a simple distance vector routing protocol that follows all the standard distance vector designs. In this sample chapter from CCIE Enterprise Infrastructure Foundation, 2nd Edition, you will explore the simplicity of RIP configuration, advanced RIP filtering scenarios, and RIP configuration challenges.
|
600. | - Routing Protocol Authentication Concepts and Configuration
- Jul 13, 2011
- This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.
|