|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm70077834 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
060613s2006 inua o 001 0 eng d |
010 |
|
|
|a 2005931071
|
040 |
|
|
|a MKN
|b eng
|e pn
|c MKN
|d OCLCA
|d TXJ
|d CEF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d C6I
|d OCLCQ
|d IDEBK
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCA
|d YDX
|d CNCEN
|d AU@
|d VT2
|d RDF
|d HS0
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA650047
|2 bnb
|
016 |
7 |
|
|a 013472079
|2 Uk
|
019 |
|
|
|a 1044297249
|a 1048115480
|a 1048389839
|a 1056388051
|a 1074449923
|a 1097141469
|a 1180308015
|a 1202541212
|a 1240508708
|
020 |
|
|
|a 9781587052521
|
020 |
|
|
|a 1587052520
|
020 |
|
|
|z 1587052520
|
020 |
|
|
|a 8131737764
|
020 |
|
|
|a 9788131737767
|
020 |
|
|
|a 1282654616
|
020 |
|
|
|a 9781282654617
|
020 |
|
|
|a 9786612654619
|
020 |
|
|
|a 6612654619
|
020 |
|
|
|a 1587054051
|
020 |
|
|
|a 9781587054051
|
024 |
3 |
|
|z 9781587052521
|
029 |
1 |
|
|a DEBSZ
|b 355390027
|
029 |
1 |
|
|a GBVCP
|b 617230242
|
029 |
1 |
|
|a AU@
|b 000057222712
|
029 |
1 |
|
|a AU@
|b 000073551866
|
035 |
|
|
|a (OCoLC)70077834
|z (OCoLC)1044297249
|z (OCoLC)1048115480
|z (OCoLC)1048389839
|z (OCoLC)1056388051
|z (OCoLC)1074449923
|z (OCoLC)1097141469
|z (OCoLC)1180308015
|z (OCoLC)1202541212
|z (OCoLC)1240508708
|
037 |
|
|
|a CL0500000004
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b S85 2006
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sullivan, Chad.
|
245 |
1 |
0 |
|a Advanced host intrusion prevention with CSA /
|c by Chad Sullivan, Paul Mauvais, Jeff Asher.
|
260 |
|
|
|a [Indianapolis, Ind.] :
|b Cisco,
|c [2006]
|
300 |
|
|
|a 1 online resource (336 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cisco Press networking technology series
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Protecting systems within an enterprise has proven as important to overall security as securing the enterprise perimeter. Over the past few years, the number of vulnerabilities stemming from weaknesses in applications and operating systems has grown dramatically. In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. To add to the typical virus issues that businesses have had to confront, there are also malicious programs infiltrating organizations today in the form of spyware and adware. Prevent day-zero attacks Enforce acceptable-use policies Develop host-IPS project implementation plans Evaluate management hierarchy installation options, including single-server, multiserver, and built-in database usage Learn about CSA agents and manual and scripted installation options Understand policy components and custom policy creation Use and filter information from CSA event logs Troubleshoot CSA deployments with agent and management server logs and built-in troubleshooting tools Protecting systems where the private data and intellectual property resides is no longer considered a function of perimeter defense systems but has instead become the domain of endpoint protection software, such as host Intrusion Prevention Systems (IPS). Cisco® Security Agent (CSA) is the Cisco Systems® host-IPS solution. CSA provides the security controls that corporations need to deal with threats to host and desktop computing resources. Advanced Host Intrusion Prevention with CSA is a practical guide to getting the most out of CSA deployments. Through methodical explanation of advanced CSA features and concepts, this book helps ease the fears of security administrators seeking to install and configure a host IPS. This book explains in detail such topics as installation of the management servers, installation of the agents for mass deployment, granular agent policy creation, advanced policy creation, real-world troubleshooting techniques, and best practices in implementation methodology. This guide also provides a practical installation framework taken from the actual installation and support experience of the authors. This book helps you implement host IPS appropriately, giving your organization better protection from the various threats that are impacting your business while at the same time enabling you to comply with various legal requirements put forth in such legislati...
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Cisco Security Agent (Computer file)
|
630 |
0 |
7 |
|a Cisco Security Agent (Computer file)
|2 blmlsh
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
700 |
1 |
|
|a Asher, J. A.
|q (Jeffrey Allen)
|
700 |
1 |
|
|a Mauvais, Paul.
|
776 |
|
|
|z 1-58705-252-0
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587052520/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis23897577
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15629065
|
994 |
|
|
|a 92
|b IZTAP
|