IP Multicast, Volume IIIP Multicast, Volume II thoroughly covers advanced IP multicast designs and protocols specific to Cisco routers and switches. It offers a pragmatic discussion of common features, deployment models, and field practices for advanced Cisco IP multicast networks, culminating with commands and methodologies for implementation and advanced troubleshooting.
After fully discussing inter-domain routing and Internet multicast, the authors thoroughly explain multicast scalability, transport diversification, and multicast MPLS VPNs. They share in-depth insights into multicast for the data center, a full chapter of best-practice design solutions, and a start-to-finish troubleshooting methodology designed for complex environments.
Reflecting the authors extensive experience with service provider and enterprise networks, IP Multicast, Volume II will be indispensable to IP multicast engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. ...
Investigating the Cyber BreachToday, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.
Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.
Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...
The IT as a Service (ITaaS) FrameworkOngoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT. Instead, Enterprise IT Organizations must transform to Fast IT to keep pace with the various lines of business, operate more agilely and efficiently than ever before, while simultaneously supporting rapid innovation of transformative capabilities.
The IT as a Service (ITaaS) Framework - based on the work pioneered by Cisco's own global IT organization - is a proven model for transforming to an end-to-end Services Organization, and shifting the underlying culture of the IT organization as a foundation for Fast IT. Now, the developer of the ITaaS framework provides you with an in-depth guide ensuring that your Services Transformation achieves the intended value outcomes of establishing IT as a trusted advisor to the business, and operating IT like an agile, competitive, and cost-effic ...
Deploying ACIWith the Cisco Application Centric Infrastructure (ACI) software-defined networking platform, you can achieve dramatic improvements in data center performance, redundancy, security, visibility, efficiency, and agility. In Deploying ACI, three leading Cisco experts introduce this breakthrough platform, and walk network professionals through all facets of design, deployment, and operation. The authors demonstrate how ACI changes data center networking, security, and management; and offer multiple field-proven configurations.
Deploying ACI is organized to follow the key decision points associated with implementing data center network fabrics. After a practical introduction to ACI concepts and design, the authors show how to bring your fabric online, integrate virtualization and external connections, and efficiently manage your ACI network.
You'll master new techniques for improving visibility, control, and availability; managing multitenancy; and seamlessly inserting service devices ...
Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances.
Senior Cisco engineer Nazmul Rajib draws on unsurpassed experience supporting and training Cisco Firepower engineers worldwide, and presenting detailed knowledge of Cisco Firepower deployment, tuning, and troubleshooting. Writing for cybersecurity consultants, service providers, channel partners, and enterprise or government security professionals, he shows how to deploy the Cisco Firepower next-generation security technologies to protect your network from potential cyber threats, and how to use Firepower's robust command-line tools to investigate a wide variety of technical issues.
Each consistently organized chapter contains definitions of keywords, operational flowcharts, architectural di ...
NX-OS and Cisco Nexus SwitchingCisco Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco Nexus Switching is the definitive guide to utilizing these powerful new capabilities in enterprise environments. ...
The Economics of Cloud ComputingThis concise book delivers the insight and tools you need to make intelligent decisions about cloud computing and effectively manage the transition to this new paradigm. Bill Williams explains how cloud computing platforms are transforming business IT and helps you fully understand the economies of scale and other benefits associated with "the cloud".
Williams defines and explains cloud computing platforms and technologies, analyzes the costs associated with the IT supply chain, and (using industry standard metrics) creates a process for measuring the value of implementing cloud service models. He presents realistic and up-to-date ROI and NPV calculations comparing cloud strategies with conventional investments in owned/leased hardware. Through additional examples, he addresses costs and savings related to software licensing and disaster recovery/high availability, offering even deeper practical insight into the financial impact of cloud computing. ...
IT Essentials: PC Hardware and Software Companion Guide, 3rd EditionThe IT Essentials: PC Hardware and Software Companion Guide supplements and complements the IT Essentials I: PC Hardware and Software v4.0 online curriculum offered by the Cisco Networking Academy Program.
The Companion Guide is designed as a supplemental textbook for the Networking Academy course, offering students a portable desk reference of the course content to use anytime anywhere as a study aid. The chapter content aligns 1:1 to the online course module topics, but does not merely mimic the content word-for-word. The authors present the course material in the Companion Guide in a comprehensive manner, providing their own examples where necessary to augment a student's understanding of the course material. ...
End-to-End Network SecurityEnd-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds. ...
Implementing Cisco Unified Communications Voice over IP and QoS (Cvoice), 4th Editionmplementing Cisco Unified Communications Voice over IP and QoS (CVOICE) Foundation Learning Guide is a Cisco - authorized, self-paced learning tool for CCNP Voice foundation learning. Developed in conjunction with the Cisco CCNP Voice certification team, it covers all aspects of planning, designing, and deploying Cisco VoIP networks and integrating gateways, gatekeepers, and QoS into them. ...
Network Security AuditingThis complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. ...