Cisco ThousandEyes, the cloud-based network intelligence tool, delivers expanded visibility, automated insights, and seamless workflows to ensure digital experiences across any network-whether on premise, on the Internet, or in the cloud.
The CCNA 200-301 exam will challenge you to not only focus on the theory of a technology, but the ability to demonstrate mastery of configuration, verification, and troubleshooting.
Step into the next frontier of technology with The Quantum Internet Revolution, a groundbreaking exploration of the science, innovations, and transformative potential of quantum networking.
Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks.
An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms.
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150 is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.
As artificial intelligence (AI) becomes more and more woven into our everyday lives-and underpins so much of the infrastructure we rely on-the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats.
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks.
Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures.
Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures.
Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1 Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic.
IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course.
Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and infrastructure across any hybrid cloud environment.
Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today's challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today's dangerous world, failures in information security can be catastrophic.
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "e;Blockchain's potential to transform businesses has generated a tremendous amount of excitement across industries.
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.