Security monitoring /
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by he...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, Calif. :
O'Reilly Media, Inc.,
©2009.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Security Monitoring; What This Book Is; Conventions Used in This Book; Using Code Examples; Safari® Books Online; Comments and Questions; Acknowledgments; 1. Getting Started; Why Monitor?; Insider Threats; Challenges to Monitoring; Operational Realities; Volume; Privacy Concerns; Outsourcing Your Security Monitoring; Monitoring to Minimize Risk; Policy-Based Monitoring; Why Should This Work for You?; Open Source Versus Commercial Products; Introducing Blanco Wireless; 2. Implement Policies for Monitoring; Anomaly Monitoring; Policy Monitoring; Monitoring Against Defined Policies.