5
1
Paperback(List)
$61.00
-
SHIP THIS ITEMChoose Expedited Shipping at checkout for delivery by Thursday, April 4PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
61.0
In Stock
Overview
Get a solid foundation in Cisco products and technologies from this fully updated bestseller. Covering the latest solutions, Cisco: A Beginner’s Guide, Fifth Edition shows you, step-by-step, how to design, build, and manage custom networks. Learn how to configure hardware, use IOS commands, set up wireless networks, and secure your systems. You’ll also get tips on preparing for Cisco certification exams. Brand-new voice and social networking features, Cisco TelePresence, the cloud-based Cisco Unified Computing System, and more are fully covered in this practical resource.
- Understand Cisco networking and Internet basics
- Connect and configure routers and switches
- Work with TCP/IP, Wi-Fi, and Ethernet technologies
- Maintain your network through IOS and IOS XR
- Handle security using firewalls, Adaptive Security Appliances, SecureX, TrustSec, and other tools
- Virtualize hardware and migrate resources to a private cloud
- Manage wireless networks with Aironet and Airespace
- Deliver VoIP, video, and social networking services
- Design, administer, and tune a Cisco enterprise network
- Identify and repair performance issues and bottlenecks
Product Details
ISBN-13: | 9780071812313 |
---|---|
Publisher: | McGraw Hill LLC |
Publication date: | 09/06/2013 |
Edition description: | List |
Pages: | 816 |
Product dimensions: | 7.40(w) x 9.10(h) x 1.70(d) |
About the Author
Anthony T. Velte, CISSP, CISA (Lake Elmo, MN) is cofounder of Velte Publishing, Inc., and coauthor of several books on Cisco technologies.
Toby J. Velte, Ph.D., MCSE+I, CCNA, CCDA, cofounder of Velte Publishing, Inc., is an internationally bestselling author of business technology articles and books. He is currently part of Microsoft’s North Central practice focused on helping thriving companies with their technology-based initiatives.
Anthony T. Velte, CISSP, CISA, cofounder of Velte Publishing, Inc., has more than 20 years of experience in the information systems industry. He is coauthor, with Toby J. Velte, of Cloud Computing: A Practical Approach, Green IT: Reduce Your Information System’s Environmental Impact While Adding to the Bottom Line, and Cisco: A Beginners Guide, Fourth Edition.
Table of Contents
IntroductionWho Should Read This BookWhat This Book CoversHow to Read This BookPart I: Cisco OverviewChapter 1: Cisco and the InternetInternetworkingCisco’s Position in the Computer IndustryThe Internet LandscapeInternetworking’s Five Major Device TypesBasic Internetwork TopologiesInternetwork PlayersInternetworking ProtocolsRouting vs. SwitchingOther Internetworking TrendsCisco’s OfferingsCompetitionWho Wants to Be a Millionaire?Cisco SolutionsCisco InnovationChapter 2: Networking PrimerBits and BytesHow Computers Understand DataOSI Reference ModelThe Seven-Layer StackOSI Implementation by LayerNetwork TechnologiesEthernetGigabit, 10 Gigabit, 40 Gigabit, and 100 Gigabit EthernetWirelessWAN TechnologiesDial-in TechnologiesWAN Trunk TechnologiesTCP/IPTCP/IP MessagingThe Transport LayerIP AddressingThe IP Address FormatIP Address ClassesPrivate AddressingSubnettingIP Version 6Putting It All TogetherChapter 3: Cisco CertificationsCertifications OverviewCareer Certifications and PathsEntry LevelAssociateProfessionalExpertArchitectSpecialistCertification TracksRouting and SwitchingDesignNetwork SecurityWirelessVoiceService ProviderService Provider OperationsTechnician CertificationsCCT Routing & SwitchingCCT Data CenterCCT TelePresenceSpecialist CertificationsCollaboration CertificationsData Center CertificationsOperating System Software (Cisco IOS XR Specialist)Security CertificationsVideo CertificationsWhere to Get HelpWebsitesClassesPart II: Cisco Internetworking ToolsChapter 4: Routing OverviewHow Routers WorkRouting for EfficiencyRouters and the InternetOptical RoutersIOS: The Internetwork Operating SystemRouter SecurityRouter Administrative SecurityRouter Network SecurityRouter PasswordsChapter 5: Routing PlatformsRouter HardwareRouter MemoryRouter Ports and ModulesCisco Router ModelsEssential FilesCommunicating with IOSMeet IOS 12.4T (A.K.A. the “OLD” IOS)IP MobilityMeet IOS Release 15 (A.K.A. the “New” IOS)Meet NX-OSMeet IOS XRUsing IOS CommandsOverview of Router ModesThe Configuration File’s Central RoleChapter 6: Configuring RoutingCommunicating with a RouterThe Console PortThe Auxiliary PortSSH/TelnetThe HTTP Server User InterfaceEssential Router CommandsPassword RecoveryRecovering Enable PasswordsRecovering Passwords from Older Cisco RoutersStep-by-Step Router ConfigurationSetup ModeGiving a Router an IdentityExamining Device StatusCisco Discovery ProtocolChanges in IOS from Release 12.4 to Release 15Using Applications to Help Configure RoutersCisco Configuration ProfessionalWhat’s NextChapter 7: SwitchesNetwork TopologiesThe Importance of Network DomainsCabling Defines Network Speed and DistanceCisco SwitchesHow an Individual Switch WorksSwitched Networking BasicsDesigning Switched InternetworksVLANsSmartOperationsCisco’s Switched Network ProductsConfiguring and Managing Cisco SwitchesCisco Network AssistantFeaturesInstallationViewsInteractionCommunitiesUsing CNAChapter 8: Security OverviewOverview of Network SecurityTraffic-Based SecurityUser-Based SecurityAuthentication, Authorization, and AccountingOverview of the AAA ModelHow AAA WorksDynamic Access ListsLock-and-Key Using a Local User DatabaseBest PracticesReviewing LogsSecuring ProtocolsPhysical SecurityKeep Current on Your DevicesChapter 9: Access ControlCisco SecureX ArchitectureOverviewCisco SecureX FrameworkIdentity ManagementCisco TrustSecCisco Secure Access Control Server (ACS)Cisco Network Admission Control (NAC)Identity Services Engine (ISE)The Access ListsNetwork Address TranslationVirtual Private NetworksWhat Composes a VPN?Cisco’s SolutionDigging a TunnelSummaryChapter 10: Security AppliancesFirewallsFirewall BasicsHow Firewalls WorkThe IOS Firewall Feature SetASA Firewall OS’s Adaptive Security AlgorithmASA OS 9Adaptive Security AppliancesAccess RoutersOverviewModelsCisco Cloud Web SecurityHow Cisco Cloud Web Security WorksExample of Cisco Cloud Web SecurityCisco Security ManagerIntegrated Services RouterThe Right Tool for the Right JobModelsSpecialized ModulesFirewall Services Module and ASA Service ModulesCisco Wireless Service Module (WiSM2)Intrusion Prevention SystemSummaryChapter 11: Cisco Unified WirelessIntroduction to Wireless NetworkingThe Roots of Wireless NetworkingBenefitsWLANsHow They WorkArchitectureTechnologiesCisco Wireless NetworkingPhilosophyCisco’s OfferingsAccess Point ConfigurationSite SurveyAP PlacementInterferenceInitial Autonomous AP SettingsSecurityAntenna PlacementSummaryPart III: Cisco Business SolutionsChapter 12: Cisco VoIPVoIPIntroduction to VoIPBuilding VoIP NetworksH.323SIPSCCPImplementationCisco Unified CommunicationsCisco Unified Communications ManagerCisco Business EditionIP PhonesCisco Unified Communications GatewaysTelePresenceCollaborationsSummaryChapter 13: Data Center and VirtualizationStorage Area NetworksStorage NeedsFibre ChannelOther SAN ProtocolsDesigning and Building a SANCisco MDS Switches and DirectorsTechnologiesHardwareSoftwarePrivate CloudCisco Unified Computing SystemCisco Intelligent Automation for CloudChapter 14: Cisco Content Networking and Video SolutionsContent Delivery NetworksMeet the CDNCisco’s SolutionACNSWide Area Application EngineCisco Wide Area File SystemCachingWeb Cache Communication ProtocolFreshnessContent Engine CachingVideoVideo EntertainmentVideo CollaborationVideo IntelligencePart IV: Designing Cisco NetworksChapter 15: Routing ProtocolsOverview of Routing ProtocolsRouting Protocol BasicsRouting Protocol ArchitecturesHow Routing Protocols Are ImplementedOverview of Cisco Routing ProtocolsCisco’s Interior Gateway Routing ProtocolConfiguring RIP 2Configuring Open Shortest Path FirstBorder Gateway ProtocolMultiprotocol Label SwitchingCisco’s Routing Protocol StrategyChapter 16: Network ManagementOverview of Network ManagementThe Evolution of Management ToolsNetwork Management Tools TodayTrends in Enterprise System ManagementSNMP Is IP’s Common Management PlatformWhat Is SNMP?SNMP Polling and Managed ObjectsThe MIBPolling Groups and Data AggregationSNMP CommandsThresholdsEvents and TrapsRMON: Hardware Probes for Switched NetworksNetFlow: Software Traffic Flow-RecordingCisco’s SNMP and RMON ImplementationsCisco Prime InfrastructureCisco Network AssistantFeaturesInstallationViewsInteractionCommunitiesUsing CNASummaryChapter 17: Network Design ProcessInternetwork Design BasicsInternetworking Basics ReviewedThe Three-Layer Hierarchical Design ModelDesign MethodsDesigning to Fit NeedsUnderstanding Existing InternetworksCharacterizing NetworksCisco Network DesignsLogical Network DesignCampus Network DesignsChapter 18: Troubleshooting Cisco NetworksThe Mechanics of Network TroubleshootingNetwork Troubleshooting MethodsTroubleshooting Host IP ConfigurationIsolating Connectivity ProblemsTroubleshooting WAN LinksClient-Server VPNsTroubleshooting Cisco HardwareInspecting DevicesThe Reboot TestTroubleshooting Network ConfigurationsWireless NetworksTroubleshooting Network PerformanceIndexFrom the B&N Reads Blog
Page 1 of