| | | Copyright |
| | | About the Authors |
| | | About the Technical Reviewers |
| | | Acknowledgments |
| | | Icons Used in This Book |
| | | Part I: Intrusion Prevention Overview |
| | | | Chapter 1. Intrusion Prevention Overview |
| | | | Evolution of Computer Security Threats |
| | | | Evolution of Attack Mitigation |
| | | | IPS Capabilities |
| | | | Summary |
| | | | Chapter 2. Signatures and Actions |
| | | | Signature Types |
| | | | Signature Triggers |
| | | | Signature Actions |
| | | | Summary |
| | | | Chapter 3. Operational Tasks |
| | | | Deploying IPS Devices and Applications |
| | | | Configuring IPS Devices and Applications |
| | | | Monitoring IPS Activities |
| | | | Securing IPS Communications |
| | | | Summary |
| | | | Chapter 4. Security in Depth |
| | | | Defense-in-Depth Examples |
| | | | The Security Policy |
| | | | The Future of IPS |
| | | | Summary |
| | | Part II: Host Intrusion Prevention |
| | | | Chapter 5. Host Intrusion Prevention Overview |
| | | | Host Intrusion Prevention Capabilities |
| | | | Host Intrusion Prevention Benefits |
| | | | Host Intrusion Prevention Limitations |
| | | | Summary |
| | | | References in This Chapter |
| | | | Chapter 6. HIPS Components |
| | | | Endpoint Agents |
| | | | Management Infrastructure |
| | | | Summary |
| | | Part III: Network Intrusion Prevention |
| | | | Chapter 7. Network Intrusion Prevention Overview |
| | | | Network Intrusion Prevention Capabilities |
| | | | Network Intrusion Prevention Benefits |
| | | | Network Intrusion Prevention Limitations |
| | | | Hybrid IPS/IDS Systems |
| | | | Shared IDS/IPS Capabilities |
| | | | Summary |
| | | | Chapter 8. NIPS Components |
| | | | Sensor Capabilities |
| | | | Capturing Network Traffic |
| | | | Analyzing Network Traffic |
| | | | Responding to Network Traffic |
| | | | Sensor Management and Monitoring |
| | | | Summary |
| | | Part IV: Deployment Solutions |
| | | | Chapter 9. Cisco Security Agent Deployment |
| | | | Step1: Understand the Product |
| | | | Step 2: Predeployment Planning |
| | | | Step 3: Implement Management |
| | | | Step 4: Pilot |
| | | | Step 5: Tuning |
| | | | Step 6: Full Deployment |
| | | | Step 7: Finalize the Project |
| | | | Summary |
| | | | Implement Management |
| | | | Chapter 10. Deploying Cisco Network IPS |
| | | | Step 1: Understand the Product |
| | | | Step 2: Predeployment Planning |
| | | | Step 3: Sensor Deployment |
| | | | Step 4: Tuning |
| | | | Step 5: Finalize the Project |
| | | | Summary |
| | | | Chapter 11. Deployment Scenarios |
| | | | Large Enterprise |
| | | | Branch Office |
| | | | Medium Financial Enterprise |
| | | | Medium Educational Institution |
| | | | Small Office |
| | | | Home Office |
| | | | Summary |
| | | Part V: Appendix |
| | | | Appendix A. Sample Request for Information (RFI) Questions |
| | | | Solution |
| | | | Support |
| | | | Training |
| | | | Licensing |
| | | | Network Intrusion Prevention |
| | | | Host Intrusion Prevention |
| | | Glossary |
| | | Index |