Finally, I have published my new CCDE book titled CCDE In-Depth. The much-awaited book is available in three version: PDF, Kindle and Paperback versions. You can purchase the PDF version directly from this website. And if you need the Kindle and Paperback version, it is available on Amazon. Why This Book Is the Best for CCDE […]
The post CCDE In-Depth: The New CCDE Book of Orhan Ergun Is Available appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
To ensure optimal performance, check your TCP maximum segment size.
CTO Singh leaves Cisco, Why Google's Network Needs 5 Controllers, and Top 10 Acquisitions.
The networking industry continued to morph with several significant acquisitions so far this year.
How Does Internet Work - We know what is networking
If you want to send or store data and be sure it is safe from being intercepted, you will use Cryptography. Cryptography uses chipper as mathematical virtual lock to make data scrambled so that is not understandable if intercepted by unauthorized third parties. There are different cryptography techniques, some of them are: encryption, hashing, and steganography. Cryptography can be differentiated by usage of different key types: Symmetric Key Encryption Asymmetric Key Encryption Symmetric Key Encryption is sometimes known as Secret Key Cryptography. Main characteristic of this type of cryptography is the same key usage in encryption and decryption of transferred