Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1016 Results Found

Results per page: 10 40 80

The History Behind EIGRP

Article | Feb. 16, 2011

Interior Gateway Routing Protocol (IGRP) was a Cisco-proprietary Distance-Vector (D-V) classful routing protocol - basically an improved version of RIPv1. Like other D-V protocols, each IGRP router periodically flooded its routing table, but it differed from RIP in two ways. First, RIP’s advertisement interval was thirty seconds but IGRP’s was ninety seconds, which allowed IGRP to scale to larger networks than RIP. Second, RIP used a simple hop count metric, but IGRP’s more sophisticated metric was based on minimum path bandwidth and total path delay, with options to include link reliability and interface loading.

Troubleshoot Domain Controllers with Dcdiag.exe

Article | Feb. 15, 2011

Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.

Protecting Your Network with Authentication and Cryptography

Webinar – Recorded | Feb. 09, 2011

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

Introduction to Negotiation: A Primer for "Getting to Yes"

White Paper | Jan. 05, 2011

Negotiation is a dialogue intended to resolve disputes, to produce an agreement on courses of action, to bargain for individual or collective advantage, or to craft outcomes to satisfy various interests. It is the primary method of alternative dispute resolution. This white paper focuses primarily on the negotiation process, different negotiation styles, and the various elements of communication that affect the outcome, including: Negotiation Communications, Constructive Questioning, Communication Obstacles (and overcoming those obstacles), Challenging Negotiation Situations and "Traps," and, finally, completing Successful Negotiations, a.k.a. "Getting to Yes"

Geek Speak: A Glossary of Common IT Terms v3.0

Special Report | Jan. 03, 2011

Need to know the difference between copper and optical fiber? Want to learn what the acronyms PBX, PC, PCI, PCIe, PCM, PDA, and PDU mean? Our "Geek Speak v3.0" can teach you all this and more. An update to our popular v2.0 "Geek Speak", this white paper will teach you more than 925 popular IT words, phrases, and acronyms.

12 Advantages of Agile Software Development

White Paper | Dec. 21, 2010

Organizations can find significant value in adopting Agile methodologies and techniques. Agile practices can help ensure meet customer expectations, deliver products on time, and create a motivated environment that is able to quickly adapt to change. This white paper explores 12 benefits of Agile development and management, explaining why you should consider incorporating Agile methodologies into your current standards and processes.

Implementing Dynamic DNS on Cisco IOS Router and ASA

Article | Dec. 09, 2010

When the hostname.domainname associated with my Small Office Home Office (SOHO) failed to update after a power outage, and a new DHCP-assigned external address was assigned to my router, I was reminded of the need for Dynamic DNS. This article will explore the implem...

ASDM Demo Mode Tour

Article | Nov. 17, 2010

As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...

13 Skills Every IT Pro Should Know

Article | Nov. 12, 2010

No matter which IT field you're working in, there are several skills that are useful for every IT professional to know. Here, seven experienced IT professionals working in the networking, programming, project management, and security fields, share what they believe a...

ASA Service Policies with Priority and Policing

Article | Nov. 03, 2010

As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...