Articles

RSS Feed Subscribe to this topic  RSS details

1406 Items

Sort by Date | Title

Implementing Scalability and Elasticity
Sep 24, 2022
Mobile Device Accessories and Ports
Sep 24, 2022
Securing the Enterprise Architecture by Implementing Data Security Techniques
Sep 24, 2022
Device Access Control
By Donald Bacha
Mar 11, 2022

This sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram reviews the configuration and verification of network device access control with usernames and passwords.It also covers authentication, authorization, and accounting (AAA), and looks at the configuration and verification of network device access control on Cisco IOS devices using TACACS+ and RADIUS.

Footprinting, Reconnaissance, and Scanning
By Michael Gregg, Omar Santos
Mar 10, 2022

In this sample chapter from CEH Certified Ethical Hacker Cert Guide, 4th Edition, you will review a number of ways individuals can attempt to passively gain information about an organization and interactive scanning techniques.

Data Security and Compliance Controls in Cloud Environments
By William Rothwell
Feb 10, 2022

In this sample chapter from CompTIA Cloud+ CV0-003 Exam Cram, you will learn how to apply data security and compliance controls in cloud environments.

Cloud, Mobile, and IoT Security
By Omar Santos
Jan 28, 2022

In this chapter from CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition, you will learn about different attacks against cloud, mobile, and IoT implementations.

Denial of Service and Session Hijacking
By William Chuck Easttom
Jan 23, 2022

In this sample chapter from Certified Ethical Hacker (CEH) Exam Cram, you will explore types of protocol attacks, common tools used for denial of service (DoS) attacks, and countermeasures.

Dynamic Multipoint Virtual Private Network (DMVPN)
By Steven Chimes, Joseph Muniz, James Risler
Jan 23, 2022

Dynamic Multipoint Virtual Private Network (DMVPN) enables different branch locations to communicate in a direct and secure manner using either a public or a private network. In this sample chapter from CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide, you will explore DMVPN core concepts, risks, design considerations, and more.

Clusters and High Availability
By Steve Baca, John A. Davis, Owen Thomas
Jan 8, 2022

In this sample chapter from VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide, 4th Edition, you will explore cluster concepts, the Distributed Resources Scheduler (DRS), vSphere High Availability (HA), and other resource management and availability features.

Managing and Understanding the Boot Procedure
By Sander van Vugt
Nov 18, 2021

In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition, you will learn about Systemd targets and how the boot procedure on Red Hat Enterprise Linux is organized.

Routing Technologies and Bandwidth Management
By Anthony J. Sequeira
Oct 28, 2021

In this sample chapter from CompTIA Network+ N10-008 Cert Guide, you will explore a variety of approaches for performing routing, including dynamic routing, static routing, and default routing. The chapter also breaks down the various categories of routing protocols and provides specific examples of each.

Summarizing the Techniques Used in Security Assessments
By Joseph Mlodzianowski, Omar Santos, Ron Taylor
Oct 19, 2021

In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.

Network Implementations
By Emmett Dulaney
Oct 12, 2021

In this sample chapter from CompTIA Network+ N10-008 Exam Cram, 7th Edition, you will learn how to compare and contrast various devices, their features, and their appropriate placement on the network.

Highly Available and Fault-Tolerant Architectures
By Mark Wilkins
Aug 17, 2021

In this sample chapter from AWS Certified Solutions Architect - Associate (SAA-C02) Cert Guide, you will explore topics related to exam Domain 1: Design Resilient Architectures, including Disaster Recovery and Business Continuity, Automating AWS Architecture, and Elastic Beanstalk.

Understanding Asset Security
By Michael Gregg
Aug 10, 2021

In this sample chapter from CISSP Exam Cram, 5th Edition, you will explore basic building blocks of any good security program.

Policy-Based Decryption (Lesson 6 transcript from Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons)
By Sander van Vugt
May 20, 2021
In Lesson 6, Sander van Vugt explains policy-based decryption. Read the transcript.
Security Assessment Techniques
By Martin M. Weiss
Feb 25, 2021

A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.

Mobile App Investigations
By Darren R. Hayes
Oct 1, 2020

In this sample chapter from A Practical Guide to Digital Forensics Investigations, 2nd Edition, you will explore the importance of mobile apps in investigations, learn how to perform a static and dynamic analysis, analyze SQLite databases, and more.

Physical Interfaces and Cabling Types
By Anthony J. Sequeira
Aug 19, 2020

In this sample chapter from CCNA 200-301 Exam Cram, 6th Edition, you will review essential terms and components of the Network Fundamentals section of the CCNA 200-301 exam, including ethernet, copper media, unshielded twisted pair (UTP), fiber media, Cat 5e, Cat 6, Auto MDI-X, and PoE.

Page 1 2 3 4 5 Next >