|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm69366558 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
060525s2006 inua o 001 0 eng d |
010 |
|
|
|a 2005922371
|
040 |
|
|
|a MKN
|b eng
|e pn
|c MKN
|d VLB
|d CEF
|d C6I
|d OCLCQ
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCA
|d AU@
|d WYU
|d VT2
|d RDF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 748095002
|a 1062869655
|a 1103266740
|a 1129348008
|
020 |
|
|
|z 1587052393
|
020 |
|
|
|a 9781587052392
|
020 |
|
|
|a 1587052393
|
024 |
3 |
|
|z 9781587052392
|
029 |
1 |
|
|a HEBIS
|b 291463088
|
029 |
1 |
|
|a AU@
|b 000057222683
|
035 |
|
|
|a (OCoLC)69366558
|z (OCoLC)748095002
|z (OCoLC)1062869655
|z (OCoLC)1103266740
|z (OCoLC)1129348008
|
050 |
|
4 |
|a TK5105.59
|b .C385 2006
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Carter, Earl.
|
245 |
1 |
0 |
|a Intrusion prevention fundamentals /
|c by Earl Carter, Jonathan Hogue.
|
260 |
|
|
|a [Indianapolis, Ind.] :
|b Cisco Press,
|c [2006]
|
300 |
|
|
|a 1 online resource (312 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cisco Press fundamentals series
|
500 |
|
|
|a Title from title screen (viewed May 25, 2006).
|
500 |
|
|
|a "January 18, 2006."
|
500 |
|
|
|a Includes index.
|
505 |
0 |
0 |
|g Ch. 1.
|t Intrusion prevention overview --
|g Ch. 2.
|t Signatures and actions --
|g Ch. 3.
|t Operational tasks --
|g Ch. 4.
|t Security in depth --
|g Ch. 5.
|t Host intrusion prevention overview --
|g Ch. 6.
|t HIPS components --
|g Ch. 7.
|t Network intrusion prevention overview --
|g Ch. 8.
|t NIPS components --
|g Ch. 9.
|t Cisco security agent deployment --
|g Ch. 10.
|t Deploying Cisco network IPS --
|g Ch. 11.
|t Deployment scenarios.
|
520 |
|
|
|a An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the "big picture"? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project-from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques. Includes a FREE 45-Day Online Edition.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
653 |
|
|
|a intrusion prevention system
|
700 |
1 |
|
|a Hogue, Jonathan.
|
776 |
0 |
8 |
|i Print version:
|a Carl, Earl.
|t Intrusion prevention fundamentals.
|d [Indianapolis, Ind.] : Cisco Press, [2006]
|z 1587052393
|w (OCoLC)64441632
|
830 |
|
0 |
|a Cisco Press fundamentals series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587052393/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851696
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37819366
|
994 |
|
|
|a 92
|b IZTAP
|