SlideShare a Scribd company logo
CHAPTER THIRTEEN Switching and VLANs
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet Operations ,[object Object],[object Object],[object Object],[object Object]
CSMA/CD ,[object Object],[object Object],[object Object],[object Object],[object Object]
Collisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collision Domain ,[object Object],[object Object],[object Object],[object Object]
Latency ,[object Object],[object Object],[object Object],[object Object],[object Object]
Latency Table 13-1: Propagation delay for Ethernet media and devices
Latency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet Errors: Frame Size Errors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet Errors: Frame Size Errors ,[object Object],[object Object],[object Object],[object Object]
Ethernet Errors: Collision Errors ,[object Object],[object Object],[object Object],[object Object]
Ethernet Errors: Broadcasts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fast Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Half- and Full-Duplex Communications ,[object Object],[object Object],[object Object],[object Object]
Half- and Full-Duplex Communications Figure 13-1: Half-duplex Ethernet communications
Half- and Full-Duplex Communications ,[object Object],[object Object],[object Object],[object Object]
Half- and Full-Duplex Communications ,[object Object],[object Object],[object Object],[object Object],[object Object]
LAN Segmentation: Segmenting with Bridges ,[object Object],[object Object],[object Object],[object Object],[object Object]
When Segmenting a LAN with One or More Bridges, Note the Following ,[object Object],[object Object],[object Object],[object Object],[object Object]
LAN Segmentation: Segmenting with Routers ,[object Object],[object Object],[object Object],[object Object],[object Object]
When Segmenting a LAN with Routers, Routers Do the Following ,[object Object],[object Object],[object Object],[object Object],[object Object]
When Segmenting a LAN with Routers, Routers Do the Following ,[object Object],[object Object],[object Object],[object Object]
LAN Switching ,[object Object],[object Object],[object Object],[object Object],[object Object]
Segmentation with Switches ,[object Object],[object Object],[object Object],[object Object],[object Object]
Segmentation with Switches Figure 13-2: Switch packet forwarding actions
Segmentation with Switches Figure 13-3: Packet forwarding decisions made by a switch
Segmentation with Switches ,[object Object],[object Object],[object Object],[object Object],[object Object]
Switch Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Switch Operations ,[object Object],[object Object],[object Object],[object Object]
Securing Switch Ports ,[object Object],[object Object],[object Object],[object Object]
Switching Methods Figure 13-4: Catalyst 2820 switching menu
Cut-Through ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cut-Through Figure 13-5: Portion of packet read into buffer by a cut-through switch
Store-and-Forward Switches ,[object Object],Figure 13-6: Entire packet read into buffer by a store-and-forward switch
Fragment-Free Switching ,[object Object],[object Object],13-7: Amount of packet read into buffer by fragment-free switch
Adaptive Cut-Through and Changing the Switch Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spanning Tree Protocol ,[object Object],[object Object],[object Object],[object Object]
Spanning Tree Protocol Figure 13-8: Physical loop created on LAN by switches and bridges
Spanning Tree Protocol (STP) ,[object Object],[object Object],[object Object],[object Object]
Building a Logical Path ,[object Object],[object Object],[object Object],[object Object]
Building a Logical Path ,[object Object],[object Object],[object Object],[object Object],[object Object]
Port States ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port States ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual LAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual LAN Figure 13-9: Broadcast domains on a LAN
Virtual LAN Figure 13-10: Broadcast domains using VLANs
Benefit of VLANs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefit of VLANs Figure 13-11: Securing servers with VLANs
Dynamic Versus Static VLANs ,[object Object],[object Object],[object Object],[object Object]
VLAN Standardization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VLAN Standardization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating VLANs ,[object Object],[object Object],[object Object]
Link Types and Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object]
Link Types and Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trunking Protocol ,[object Object],[object Object],[object Object],[object Object]
VTP Domains ,[object Object],[object Object],[object Object],[object Object]
VTP Device Modes ,[object Object],[object Object],[object Object],[object Object]
VTP Pruning ,[object Object],[object Object],[object Object],[object Object]
Switch Interface Descriptions ,[object Object],[object Object],[object Object]
Nonswitching Hubs and VLANs ,[object Object],[object Object],[object Object],[object Object]
Routers and VLANs Figure 13-12: Router implemented in a VLAN configuration
Chapter Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]

More Related Content

What's hot

CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
Sachin Morya
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
Ronoh Kennedy
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
CYBERINTELLIGENTS
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
IndrajaMeghavathula
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
cairo university
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
Rijutha Kumar
 
Network switching
Network switchingNetwork switching
Network switching
Aung Thu Rha Hein
 

What's hot (19)

Mod5
Mod5Mod5
Mod5
 
Mod9
Mod9Mod9
Mod9
 
Switching seminar ppt
Switching seminar pptSwitching seminar ppt
Switching seminar ppt
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
Network switching
Network switchingNetwork switching
Network switching
 

Similar to Chapter 13

CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
tmavroidis
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
N.Jagadish Kumar
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
EliasPetros
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Chapter#3
Chapter#3Chapter#3
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
Eric Vanderburg
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
Raj vardhan
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
Waqas !!!!
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
5 Lan
5 Lan5 Lan
Frame relay
Frame relayFrame relay
Frame relay
Kalluri Vinay Reddy
 

Similar to Chapter 13 (20)

CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Presentasi cisco
Presentasi ciscoPresentasi cisco
Presentasi cisco
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Chapter#3
Chapter#3Chapter#3
Chapter#3
 
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
9 lan
9 lan9 lan
9 lan
 
11 circuit-packet
11 circuit-packet11 circuit-packet
11 circuit-packet
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
10 circuit-packet
10 circuit-packet10 circuit-packet
10 circuit-packet
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
5 Lan
5 Lan5 Lan
5 Lan
 
Frame relay
Frame relayFrame relay
Frame relay
 
Mac
MacMac
Mac
 

More from guest35417d

More from guest35417d (6)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Chapter 13