Chapters & Articles

All Articles

Showing 581-600 of 854

Sort by Date | Title

581.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
582.
Python Functions, Classes, and Modules
By Jason Gooley, Adrian Iliesiu, Chris Jackson, Ashutosh Malegaonkar
Nov 9, 2022

Building Python functions allows for the creation of reusable code and is the first step toward writing object-oriented code. In this sample chapter from Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide, you will review working with and building Python functions. It also introduces how Python modules can extend the capabilities of Python and make your job of coding much easier.

583.
Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
Sep 18, 2012
Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
584.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
585.
Q&A with the Authors of "AAA Identity Management Security"
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
586.
QoS Design Principles and Best Practices
Jan 1, 2018

In this sample chapter from Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, 4th Edition, the authors cover some best practice QoS design principles and QoS strategy models that are used to implement the numerous QoS tools we have at our disposal. Remember that usually, more than one solution fits the given QoS requirements, so simplifying the models leveraged can significantly accelerate and ensure proper QoS deployment.

587.
Quality of Service Design Overview
Dec 17, 2004
This chapter provides an overview of the QoS design and deployment process. This process requires business-level objectives of the QoS implementation to be defined clearly and for the service-level requirements of applications to be assigned preferential or deferential treatment so that they can be analyzed.
588.
Real World Project Management: An Introduction
Jan 7, 2005
Everyone talks about project management, but what is it? Project management expert Joseph Phillips kicks off his new series by looking at the big picture of project management.
589.
Real World Project Management: Managing the Project Scope
Jan 28, 2005
How many of your projects fail? Can you blame that failure on lack of scope control, poorly defined requirements, or stakeholders who think your project is a la carte? If so, you need real-world scope management, as discussed by project management expert Joseph Phillips.
590.
Recovering and Securing Your Wi-Fi Encryption Keys
Jun 4, 2010
Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
591.
Remote Site Telephony and Branch Redundancy Options
Mar 5, 2016
Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
592.
Responding to a Breach
By Aamir Lakhani, Joseph Muniz
Jan 8, 2019

In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.

593.
Responding to Real-World Cyber Threats
Feb 16, 2016
Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
594.
RIP Next Generation (RIPng)
May 27, 2016
595.
Role of CS-MARS in Your Network
Oct 16, 2006
596.
Route Summarization
By Scott Empson
Feb 11, 2020

In this sample chapter from CCNA 200-301 Portable Command Guide, 5th Edition, you will explore route summarization and requirements.

597.
Routers and Switches and Hubs, Oh My! An Introduction to Network Devices and Their Functions
Oct 12, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses some of the most common network devices that network engineers need to know and understand.
598.
Routing Concepts
Jan 1, 2018

This sample chapter from Routing and Switching Essentials v6 Companion Guide, answer the question, “What does a router do with a packet received from one network and destined for another network?” Details of the routing table will be examined, including connected, static, and dynamic routes.

599.
Routing Information Protocol (RIPv2)
By Narbik Kocharians
Feb 5, 2023

The Routing Information Protocol (RIP) is a perfect example of a simple distance vector routing protocol that follows all the standard distance vector designs. In this sample chapter from CCIE Enterprise Infrastructure Foundation, 2nd Edition, you will explore the simplicity of RIP configuration, advanced RIP filtering scenarios, and RIP configuration challenges.

600.
Routing Protocol Authentication Concepts and Configuration
Jul 13, 2011
This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.