Flylib.com
Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115
Authors:
Earl Carter
,
Jonathan Hogue
BUY ON AMAZON
Intrusion Prevention Fundamentals
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Part I: Intrusion Prevention Overview
Chapter 1. Intrusion Prevention Overview
Evolution of Computer Security Threats
Evolution of Attack Mitigation
IPS Capabilities
Summary
Chapter 2. Signatures and Actions
Signature Types
Signature Triggers
Signature Actions
Summary
Chapter 3. Operational Tasks
Deploying IPS Devices and Applications
Configuring IPS Devices and Applications
Monitoring IPS Activities
Securing IPS Communications
Summary
Chapter 4. Security in Depth
Defense-in-Depth Examples
The Security Policy
The Future of IPS
Summary
Part II: Host Intrusion Prevention
Chapter 5. Host Intrusion Prevention Overview
Host Intrusion Prevention Capabilities
Host Intrusion Prevention Benefits
Host Intrusion Prevention Limitations
Summary
References in This Chapter
Chapter 6. HIPS Components
Endpoint Agents
Management Infrastructure
Summary
Part III: Network Intrusion Prevention
Chapter 7. Network Intrusion Prevention Overview
Network Intrusion Prevention Capabilities
Network Intrusion Prevention Benefits
Network Intrusion Prevention Limitations
Hybrid IPSIDS Systems
Shared IDSIPS Capabilities
Summary
Chapter 8. NIPS Components
Sensor Capabilities
Capturing Network Traffic
Analyzing Network Traffic
Responding to Network Traffic
Sensor Management and Monitoring
Summary
Part IV: Deployment Solutions
Chapter 9. Cisco Security Agent Deployment
Step1: Understand the Product
Step 2: Predeployment Planning
Step 3: Implement Management
Step 4: Pilot
Step 5: Tuning
Step 6: Full Deployment
Step 7: Finalize the Project
Summary
Implement Management
Chapter 10. Deploying Cisco Network IPS
Step 1: Understand the Product
Step 2: Predeployment Planning
Step 3: Sensor Deployment
Step 4: Tuning
Step 5: Finalize the Project
Summary
Chapter 11. Deployment Scenarios
Large Enterprise
Branch Office
Medium Financial Enterprise
Medium Educational Institution
Small Office
Home Office
Summary
Part V: Appendix
Appendix A. Sample Request for Information (RFI) Questions
Solution
Support
Training
Licensing
Network Intrusion Prevention
Host Intrusion Prevention
Glossary
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115
Authors:
Earl Carter
,
Jonathan Hogue
BUY ON AMAZON
Similar book on Amazon
File System Forensic Analysis
Penetration Testing and Network Defense
CCNP Security Secure 642-637 Official Cert Guide
LAN Switch Security: What Hackers Know About Your Switches
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 3 Preventive Maintenance
Domain 5 Printers
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Snort Cookbook
Building a Distributed IDS (Encrypted)
Basic Rules You Shouldnt Leave Home Without
Testing Rules
Detecting Fragmentation Attacks and Fragment Reassembly with Frag2
Analyzing and Graphing Logs
SQL Hacks
Hack 73. Mix File and Database Storage
Hack 88. Test Two Values from a Subquery
Hack 89. Choose Any Three of Five
Hack 93. Auto-Create Database Users
Hack 96. Create an Audit Trail
Information Dashboard Design: The Effective Visual Communication of Data
Even Dashboards Have a History
Variations in Dashboard Uses and Data
Choosing a Deficient Measure
Characteristics of a Well-Designed Dashboard
Organize the Information to Support Its Meaning and Use
Ruby Cookbook (Cookbooks (OReilly))
Blocks as Closures: Using Outside Variables Within a Code Block
Objects and Classes8
Calling a Superclasss Method
Simulating Multiple Inheritance with Mixins
Finding the Number of Rows Returned by a Query
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Troubleshooting AAA
Adaptive Inspection Prevention Security Services Module Overview (AIP-SSM)
Configuration Management
Failover
VPN Monitoring
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies