Security Threat Mitigation and Response: Understanding Cisco Security MARS
2008-10-19 12:40
351 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
*Understand how to protect your network with a defense-in-depth strategy
*Examine real-world examples of cost savings realized by Cisco Security MARS deployments
*Evaluate the technology that underpins the Cisco Security MARS appliance
*Set up and configure Cisco Security MARS devices and customize them for your environment
*Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network
*Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network
*Use custom reports and custom queries to generate device and event information about your network and security events
*Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
http://rapidshare.com/files/50529691/1587052601.rar
*Understand how to protect your network with a defense-in-depth strategy
*Examine real-world examples of cost savings realized by Cisco Security MARS deployments
*Evaluate the technology that underpins the Cisco Security MARS appliance
*Set up and configure Cisco Security MARS devices and customize them for your environment
*Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network
*Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network
*Use custom reports and custom queries to generate device and event information about your network and security events
*Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
http://rapidshare.com/files/50529691/1587052601.rar
相关文章推荐
- Understanding and Using HRMS Security in Oracle HRMS
- A good chance to ALU and NSN -- U.S. security threat concerns over Huawei and ZTE
- Security Monitoring with Cisco Security MARS
- Understanding and Using HRMS Security in Oracle HRMS
- [Java EE][Security] - Understanding Security Realms - 2. DB authentication and authorization
- Understanding and Using HRMS Security in Oracle HRMS
- 10 Open Source Security Tools from Google, Facebook, Netflix and Cisco
- Understanding and Using HRMS Security in Oracle HRMS
- Understanding and Using HRMS Security in Oracle HRMS
- Security Analytics and Threat Analysis brighttalk
- Cisco Router and Security Device Manager (SDM) Demo Install
- Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
- [Cloud Computing]Mechanisms: Endpoint Threat Detection and Response
- Understanding Item Import and Debugging Problems with Item Import (Doc ID 268968.1)
- Understanding NetBIOS and Windows Server 2003
- Understanding TCP/IP: A Clear And Comprehensive Guide
- Pass4Sure Cisco Interactive Testing Engine and BrainDumps
- Web API: Security: Authentication and Authority
- Log message Request and Response in ASP.NET WebAPI