Cisco Press (62 kníh )
-
Michael H. Behringer, Monique J. Morrow MPLS VPN Security EN
A practical guide to hardening MPLS networks... - Define zones of trust for your MPLS VPN environment - Understand fundamental security principles and how MPLS VPNs work - Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms - Identify VPN security requirements, including…
-
Omar Santos Network Security with NetFlow and IPFIX EN
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network…
-
Ron Fuller, David Jansen, Matthew McPherson NX-OS and Cisco Nexus Switching EN
Using Cisco Nexus switches and the NX-OS operating system, data center professionals can build unified core networks that deliver unprecedented scalability, resilience, operational continuity, flexibility, and performance. NX-OS and Cisco Nexus Switching, Second Edition, is the definitive guide to applying these breakthrough technologies in real-world environments. This extensively updated edition contains five new…
-
Ryan Tischer, Jason Gooley Programming and Automating Cisco Networks EN
Today, the best way to stay in control of your network is to address devices programmatically and automate network interactions. In this book, Cisco experts Ryan Tischer and Jason Gooley show you how to do just that. You’ll learn how to use programmability and automation to solve business problems, reduce costs, promote agility and innovation, handle accelerating complexity, and add value in any data center, campus,…
-
Gregg Schudel, David J. Smith Router Security Strategies: Securing IP Network Traffic Planes EN
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP…
-
Jeff Doyle, Jennifer DeHaven Carroll Routing TCP/IP (Volume 1) EN
Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity,…
-
Jeff Doyle Routing TCP/IP (Volume 2) EN
The definitive guide to Cisco exterior routing protocols and advanced IP routing issues—now completely updated. Praised in its first edition for its readability, breadth, and depth, Routing TCP/IP, Volume II, Second Edition will help you thoroughly understand modern exterior routing protocols and implement them with Cisco routers. Best-selling author Jeff Doyle offers crucial knowledge for every network professional…
-
Qiang Huang, Jazib Frahim SSL Remote Access VPNs EN
Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access…
-
John O'Connell The Book of Spice EN
Spices are rare things, at once familiar and exotic, comforting us in favourite dishes while evoking far-flung countries, Arabian souks, trade winds, colonial conquests and vast fortunes. From anise to zedoary, The Book of Spice introduces us to their properties, both medical and magical, and the fascinating stories that lie behind both kitchen staples and esoteric luxuries. John O'Connell's bite-size chapters…
-
Lucien Avramov, Maurizio Portolani The Policy Driven Data Center with ACI EN
Use policies and Cisco® ACI to make data centers more flexible and configurable—and deliver far more business value. Using the policy driven data center approach, networking professionals can accelerate and simplify changes to the data center, construction of cloud infrastructure, and delivery of new applications. As you improve data center flexibility, agility, and portability, you can deliver far more business…
-
Eric Osborne, Ajay Simha Traffic Engineering with MPLS EN
Design, configure, and manage MPLS TE to optimize network performance... Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters, such as utilization and traffic demands. Using Traffic Engineering (TE), network operators can redistribute…
-
Brian Morgan, Steve Jordan Troubleshooting Cisco IP Telephony and Video (CTCOLLAB) Foundation Learning Guide (CCNP Collaboration Exam 300-080 CTCOL
This is Cisco's authorized, self-paced, foundation learning tool for the new Troubleshooting Cisco IP Telephony and Video (CTCOLLAB 300-080) exam, required for Cisco CCNP Collaboration certification. It brings together essential knowledge ...
-
Sanjay K. Hooda, Shyam Kapadia, Padmanabhan Krishnan Using TRILL and Fabricpath EN
Designing Massively Scalable Data Centers with Overlays. TRILL, FabricPath, and VXLAN overlays help you distribute data traffic far more effectively, dramatically improving utilization in even the largest data center networks. Using TRILL, FabricPath, and VXLAN is the first practical and comprehensive guide to planning and establishing these high-efficiency overlay networks. The authors begin by reviewing today’s…