IT eBooks
Download, Read, Use
Deploying ACI
Deploying ACI

With the Cisco Application Centric Infrastructure (ACI) software-defined networking platform, you can achieve dramatic improvements in data center performance, redundancy, security, visibility, efficiency, and agility. In Deploying ACI, three leading Cisco experts introduce this breakthrough platform, and walk network professionals through all facets of design, deployment, and operation. The authors demonstrate how ACI changes data center networking, security, and management; and offer multiple field-proven configurations. Deploying ACI is organized to follow the key decision points associated with implementing data center network fabrics. After a practical introduction to ACI concepts and design, the authors show how to bring your fabric online, integrate virtualization and external connections, and efficiently manage your ACI network. You'll master new techniques for improving visibility, control, and availability; managing multitenancy; and seamlessly inserting service devices ...
The IT as a Service (ITaaS) Framework
The IT as a Service (ITaaS) Framework

Ongoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT. Instead, Enterprise IT Organizations must transform to Fast IT to keep pace with the various lines of business, operate more agilely and efficiently than ever before, while simultaneously supporting rapid innovation of transformative capabilities. The IT as a Service (ITaaS) Framework - based on the work pioneered by Cisco's own global IT organization - is a proven model for transforming to an end-to-end Services Organization, and shifting the underlying culture of the IT organization as a foundation for Fast IT. Now, the developer of the ITaaS framework provides you with an in-depth guide ensuring that your Services Transformation achieves the intended value outcomes of establishing IT as a trusted advisor to the business, and operating IT like an agile, competitive, and cost-effic ...
Investigating the Cyber Breach
Investigating the Cyber Breach

Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...
IP Multicast, Volume II
IP Multicast, Volume II

IP Multicast, Volume II thoroughly covers advanced IP multicast designs and protocols specific to Cisco routers and switches. It offers a pragmatic discussion of common features, deployment models, and field practices for advanced Cisco IP multicast networks, culminating with commands and methodologies for implementation and advanced troubleshooting. After fully discussing inter-domain routing and Internet multicast, the authors thoroughly explain multicast scalability, transport diversification, and multicast MPLS VPNs. They share in-depth insights into multicast for the data center, a full chapter of best-practice design solutions, and a start-to-finish troubleshooting methodology designed for complex environments. Reflecting the authors extensive experience with service provider and enterprise networks, IP Multicast, Volume II will be indispensable to IP multicast engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. ...
CCNA Routing and Switching 200-125 Certification Guide
CCNA Routing and Switching 200-125 Certification Guide

Cisco Certified Network Associate (CCNA) Routing and Switching is one of the most important qualifications for keeping your networking skills up to date. CCNA Routing and Switching 200-125 Certification Guide covers topics included in the latest CCNA exam, along with review and practice questions. This guide introduces you to the structure of IPv4 and IPv6 addresses and examines in detail the creation of IP networks and sub-networks and how to assign addresses in the network. You will then move on to understanding how to configure, verify, and troubleshoot layer 2 and layer 3 protocols. In addition to this, you will discover the functionality, configuration, and troubleshooting of DHCPv4. Combined with router and router simulation practice, this certification guide will help you cover everything you need to know in order to pass the CCNA Routing and Switching 200-125 exam. By the end of this book, you will explore security best practices, as well as get familiar with the proto ...
SAFe 4.5 Distilled, 2nd Edition
SAFe 4.5 Distilled, 2nd Edition

To succeed in today's adapt-or-die marketplace, businesses must be able to rapidly change the way they create and deliver value to their customers. Hundreds of the world's most successful companies - including Intel, Capital One, AstraZeneca, Cisco, and Philips - have turned to the Scaled Agile Framework (SAFe) to achieve agility at scale and maintain a competitive edge. SAFe 4.5 Distilled: Applying the Scaled Agile Framework for Lean Enterprises explains how adopting SAFe can quickly improve time to market and increase productivity, quality, and employee engagement. In this book, you will. Understand the business case for SAFe: its benefits, the problems it solves, and how to apply it; Get an overview of SAFe across all parts of the business: team, program, value stream, and portfolio; Learn why SAFe works: the power of SAFe's Lean-Agile mindset, values, and principles; Discover how systems thinking, Agile development, and Lean product development form the underlying basis for S ...
← Prev      
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024