This is the definitive guide to best practices and advanced troubleshooting techniques for the newest versions of Cisco’s flagship Firepower Threat Defense (FTD) system running on Cisco ASA, VMW
Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control o
The Internet Key Exchange v2 (IKEv2) Handbook is the first plain English introduction to IKEv2: both a complete primer on this important new security protocol, and a practical guide to deploying it wi
Network security has never been more challenging. Cisco Next-Generation Network Security products and solutions can help network security administrators achieve and maintain the visibility and control
HANDS-ON-NETWORKING FUNDAMENTALS, Second Edition, helps you learn network administration from the ground up. Designed to provide a solid foundation in essential concepts and methods, this detailed int
GUIDE TO NETWORKING ESSENTIALS provides both the knowledge and hands-on skills necessary to work with network operating systems in a network administration environment. By focusing on troubleshooting
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein patterns. This book explores the range of technologi