Advanced host intrusion prevention with CSA /

Protecting systems within an enterprise has proven as important to overall security as securing the enterprise perimeter. Over the past few years, the number of vulnerabilities stemming from weaknesses in applications and operating systems has grown dramatically. In direct correlation with the numbe...

Full description

Saved in:
Bibliographic Details
Main Author: Sullivan, Chad
Other Authors: Asher, J. A., Mauvais, Paul
Format: Electronic eBook
Language:English
Published: [Indianapolis, Ind.] : Cisco, [2006]
Series:Cisco Press networking technology series.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000Ia 4500
001 in00006087161
006 m o d
007 cr unu||||||||
008 060613s2006 inua o 001 0 eng d
005 20220718133214.7
010 |a  2005931071 
035 |a 1WRLDSHRocm70077834 
040 |a MKN  |b eng  |e pn  |c MKN  |d OCLCA  |d TXJ  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d C6I  |d OCLCQ  |d IDEBK  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCA  |d YDX  |d CNCEN  |d AU@  |d VT2  |d RDF  |d HS0  |d OCLCO 
015 |a GBA650047  |2 bnb 
016 7 |a 013472079  |2 Uk 
019 |a 1044297249  |a 1048115480  |a 1048389839  |a 1056388051  |a 1074449923  |a 1097141469  |a 1180308015  |a 1202541212  |a 1240508708 
020 |a 9781587052521 
020 |a 1587052520 
020 |z 1587052520 
020 |a 8131737764 
020 |a 9788131737767 
020 |a 1282654616 
020 |a 9781282654617 
020 |a 9786612654619 
020 |a 6612654619 
020 |a 1587054051 
020 |a 9781587054051 
024 3 |z 9781587052521 
035 |a (OCoLC)70077834  |z (OCoLC)1044297249  |z (OCoLC)1048115480  |z (OCoLC)1048389839  |z (OCoLC)1056388051  |z (OCoLC)1074449923  |z (OCoLC)1097141469  |z (OCoLC)1180308015  |z (OCoLC)1202541212  |z (OCoLC)1240508708 
037 |a CL0500000004  |b Safari Books Online 
050 4 |a QA76.9.A25  |b S85 2006 
082 0 4 |a 005.8  |2 22 
049 |a TXMM 
100 1 |a Sullivan, Chad. 
245 1 0 |a Advanced host intrusion prevention with CSA /  |c by Chad Sullivan, Paul Mauvais, Jeff Asher. 
260 |a [Indianapolis, Ind.] :  |b Cisco,  |c [2006] 
300 |a 1 online resource (336 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cisco Press networking technology series 
588 0 |a Print version record. 
520 |a Protecting systems within an enterprise has proven as important to overall security as securing the enterprise perimeter. Over the past few years, the number of vulnerabilities stemming from weaknesses in applications and operating systems has grown dramatically. In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. To add to the typical virus issues that businesses have had to confront, there are also malicious programs infiltrating organizations today in the form of spyware and adware. Prevent day-zero attacks Enforce acceptable-use policies Develop host-IPS project implementation plans Evaluate management hierarchy installation options, including single-server, multiserver, and built-in database usage Learn about CSA agents and manual and scripted installation options Understand policy components and custom policy creation Use and filter information from CSA event logs Troubleshoot CSA deployments with agent and management server logs and built-in troubleshooting tools Protecting systems where the private data and intellectual property resides is no longer considered a function of perimeter defense systems but has instead become the domain of endpoint protection software, such as host Intrusion Prevention Systems (IPS). Cisco® Security Agent (CSA) is the Cisco Systems® host-IPS solution. CSA provides the security controls that corporations need to deal with threats to host and desktop computing resources. Advanced Host Intrusion Prevention with CSA is a practical guide to getting the most out of CSA deployments. Through methodical explanation of advanced CSA features and concepts, this book helps ease the fears of security administrators seeking to install and configure a host IPS. This book explains in detail such topics as installation of the management servers, installation of the agents for mass deployment, granular agent policy creation, advanced policy creation, real-world troubleshooting techniques, and best practices in implementation methodology. This guide also provides a practical installation framework taken from the actual installation and support experience of the authors. This book helps you implement host IPS appropriately, giving your organization better protection from the various threats that are impacting your business while at the same time enabling you to comply with various legal requirements put forth in such legislati... 
546 |a English. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
630 0 0 |a Cisco Security Agent (Computer file) 
630 0 7 |a Cisco Security Agent (Computer file)  |2 blmlsh 
650 0 |a Computer security. 
700 1 |a Asher, J. A.  |q (Jeffrey Allen) 
700 1 |a Mauvais, Paul. 
730 0 |a WORLDSHARE SUB RECORDS 
776 |z 1-58705-252-0 
830 0 |a Cisco Press networking technology series. 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/1587052520/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 2604f6e7-ac40-47a7-9284-b7ce71a47a2f  |i be652f3b-002a-4713-8d19-31aeebaa6848  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25 S85 2006  |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/1587052520/?ar  |z CONNECT