Chapters & Articles

All Articles

Showing 841-854 of 854

Sort by Date | Title

Page: < Prev 39 40 41 42 43

841.
Wireless Concepts
By Allan Johnson
Mar 27, 2020

In this sample chapter from 31 Days Before your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam, you will learn how to explain the role and function of network components, describe wireless principles, compare Cisco Wireless Architectures and AP modes, and more.

842.
Wireless is Calling - Will You Answer? Why Wireless Networking is a Promising Career Choice
By David Hucaby
Jun 25, 2013
David Hucaby shares his thoughts on why wireless engineering is a satisfying career choice, especially with new wireless capabilities rolling out all the time.
843.
Wireless LAN Design
Jun 2, 2006
This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
844.
Wireless LAN Fundamentals: Mobility
Jan 9, 2004
This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
845.
Wireless LAN Implications, Problems, and Solutions
Jun 15, 2015
When designing and supporting a WLAN, however, you must be aware of potential implications, such as security vulnerabilities, radio signal interference, multipath propagation, and other issues. This chapter from Designing and Deploying 802.11 Wireless Networks explains the impacts of these problems and introduces some ways to resolve them.
846.
Wireless LANs: Extending the Reach of a LAN
By Stephen McQuerry
Jun 17, 2008
This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.
847.
Wireless Security
Jul 16, 2004
Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
848.
Wireless System Architecture: How Wireless Works
Oct 15, 2004
Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
849.
WLAN Design: Range, Performance, and Roaming Considerations
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
850.
WLAN Fundamentals
May 30, 2012
This excerpt from CCNA Wireless (640-722 IUWNE) Quick Reference covers Wireless Networks and Topologies.
851.
Working with Protocol Analyzers and Related Certifications
Aug 30, 2011
Ed Tittel, creator of the Exam Cram series, discusses the current network protocol analyzers that any real expert needs to know. Who exactly counts as an "expert?" Ed also sorts out which of the many available certifications are really useful in identifying true masters of protocol analysis.
852.
Workload Optimization
By Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, Mohit Vaswani
Dec 17, 2022

Workload Optimizer is an analytical decision engine that generates actions that drive the IT environment toward a desired state where workload performance is assured and cost is minimized. In this sample chapter from Cisco Intersight: A Handbook for Intelligent Cloud Operations, you will explore how Workload Optimizer helps applications perform well while simultaneously minimizing cost (in a public cloud) and optimizing resource utilization (on premises) while also complying with workload policies.

853.
Zero Trust Capabilities
By Cindy Green-Ortiz, Brandon Fowler, Jason Frazier, Hank Hensel, David Houck, Patrick Lloyd, Andrew McDonald
Dec 24, 2023

In this sample chapter from Zero Trust Architecture, uncover the foundations of Zero Trust strategy with insights into its five pillars: policy overlay, identity-centric approach, vulnerability management, access control, and visibility. The authors offer a comprehensive guide for implementing Zero Trust in your organization.

854.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.

Page: < Prev 39 40 41 42 43