Loading…

Security monitoring /

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by he...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Fry, Chris
Other Authors: Nystrom, Martin
Format: Electronic eBook
Language:Inglés
Published: Sebastopol, Calif. : O'Reilly Media, Inc., ©2009.
Edition:1st ed.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Security Monitoring; What This Book Is; Conventions Used in This Book; Using Code Examples; Safari® Books Online; Comments and Questions; Acknowledgments; 1. Getting Started; Why Monitor?; Insider Threats; Challenges to Monitoring; Operational Realities; Volume; Privacy Concerns; Outsourcing Your Security Monitoring; Monitoring to Minimize Risk; Policy-Based Monitoring; Why Should This Work for You?; Open Source Versus Commercial Products; Introducing Blanco Wireless; 2. Implement Policies for Monitoring; Anomaly Monitoring; Policy Monitoring; Monitoring Against Defined Policies.