| | Copyright |
| | About the Authors |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Part I: Intrusion Prevention Overview |
| | | Chapter 1. Intrusion Prevention Overview |
| | | Evolution of Computer Security Threats |
| | | Evolution of Attack Mitigation |
| | | IPS Capabilities |
| | | Summary |
| | | Chapter 2. Signatures and Actions |
| | | Signature Types |
| | | Signature Triggers |
| | | Signature Actions |
| | | Summary |
| | | Chapter 3. Operational Tasks |
| | | Deploying IPS Devices and Applications |
| | | Configuring IPS Devices and Applications |
| | | Monitoring IPS Activities |
| | | Securing IPS Communications |
| | | Summary |
| | | Chapter 4. Security in Depth |
| | | Defense-in-Depth Examples |
| | | The Security Policy |
| | | The Future of IPS |
| | | Summary |
| | Part II: Host Intrusion Prevention |
| | | Chapter 5. Host Intrusion Prevention Overview |
| | | Host Intrusion Prevention Capabilities |
| | | Host Intrusion Prevention Benefits |
| | | Host Intrusion Prevention Limitations |
| | | Summary |
| | | References in This Chapter |
| | | Chapter 6. HIPS Components |
| | | Endpoint Agents |
| | | Management Infrastructure |
| | | Summary |
| | Part III: Network Intrusion Prevention |
| | | Chapter 7. Network Intrusion Prevention Overview |
| | | Network Intrusion Prevention Capabilities |
| | | Network Intrusion Prevention Benefits |
| | | Network Intrusion Prevention Limitations |
| | | Hybrid IPS/IDS Systems |
| | | Shared IDS/IPS Capabilities |
| | | Summary |
| | | Chapter 8. NIPS Components |
| | | Sensor Capabilities |
| | | Capturing Network Traffic |
| | | Analyzing Network Traffic |
| | | Responding to Network Traffic |
| | | Sensor Management and Monitoring |
| | | Summary |
| | Part IV: Deployment Solutions |
| | | Chapter 9. Cisco Security Agent Deployment |
| | | Step1: Understand the Product |
| | | Step 2: Predeployment Planning |
| | | Step 3: Implement Management |
| | | Step 4: Pilot |
| | | Step 5: Tuning |
| | | Step 6: Full Deployment |
| | | Step 7: Finalize the Project |
| | | Summary |
| | | Implement Management |
| | | Chapter 10. Deploying Cisco Network IPS |
| | | Step 1: Understand the Product |
| | | Step 2: Predeployment Planning |
| | | Step 3: Sensor Deployment |
| | | Step 4: Tuning |
| | | Step 5: Finalize the Project |
| | | Summary |
| | | Chapter 11. Deployment Scenarios |
| | | Large Enterprise |
| | | Branch Office |
| | | Medium Financial Enterprise |
| | | Medium Educational Institution |
| | | Small Office |
| | | Home Office |
| | | Summary |
| | Part V: Appendix |
| | | Appendix A. Sample Request for Information (RFI) Questions |
| | | Solution |
| | | Support |
| | | Training |
| | | Licensing |
| | | Network Intrusion Prevention |
| | | Host Intrusion Prevention |
| | Glossary |
| | Index |