Cisco Cisco Tetration Analytics G1 Libro bianco
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 9 of 9
For More Information
Cisco Tetration Analytics
Available Papers
Cisco Tetration Analytics Policy Compliance: Find the Needle by Removing the Haystack Advantage Series White
Papers
– Flow Telemetry in Cisco ASICs
Bibliography
Apicella, M. (2003, 02 25). Disaster recovery taken to heart. Retrieved 03 24, 2016, from Computer World:
http://www.computerworld.com/article/2581411/disaster-recovery/disaster-recovery-taken-to-heart.html
Australian Government. (2014, 02). Strategies to Mitigate Targeted Cyber Intrusions. Retrieved 03 23, 2016,
from Australian Government - Department of Defence:
Benson, T., Akella, A., & Maltz, D. (2010). Network traffic characteristics of data centers in the wild. SIGCOMM
conference on Internet measurement (pp. 267-280). ACM.
Powers, A. (2011, 08 08). Measuring NetFlow Scalability: How Much is a Lot of Flows? Retrieved 03 25, 2016,
from Lancope:
Qiu, L., Zhang, Y., & Keshav, S. (2001). Understanding the performance of many TCP flows. Computer
Networks, 37(3), 277-306.
Schmidt Ocean Institute. (2013, 03 12). The Ocean: Haven't we already mapped it? Retrieved 03 22, 2016, from
schmidtocean.org:
Xu, C., Zhang, M., Mao, Z., & Bahl, P. (2008, 12). Automating Network Application Dependency Discovery:
Experiences, Limitations, and New Solutions. OSDI, 8, pp. 117-130.
Printed in USA
C11-737370-00 06/16