您的位置:首页 > 其它

Security Threat Mitigation and Response: Understanding Cisco Security MARS

2008-10-19 12:40 351 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
*Understand how to protect your network with a defense-in-depth strategy

*Examine real-world examples of cost savings realized by Cisco Security MARS deployments

*Evaluate the technology that underpins the Cisco Security MARS appliance

*Set up and configure Cisco Security MARS devices and customize them for your environment

*Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network

*Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network

*Use custom reports and custom queries to generate device and event information about your network and security events

*Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
http://rapidshare.com/files/50529691/1587052601.rar
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息