Subcategories

Chad Sullivan, Jeff Asher, Paul Mauvais, «Advanced Host Intrusion Prevention with CSA»

Posted By: Alexpal
Chad Sullivan, Jeff Asher, Paul Mauvais, «Advanced Host Intrusion Prevention with CSA»

Chad Sullivan, Jeff Asher, Paul Mauvais, «Advanced Host Intrusion Prevention with CSA»
Cisco Press | ISBN 1587052520 | 2006 Year | PDF | 26,16 Mb | 336 Pages


Maximize end-point security with Cisco Security Agent

Eases the complexity of CSA installation and management
Helps users maximize their CSA investment and the security of their end-point systems
Provides a structured approach to host IPS planning and installation
Includes hard-to-find information on advanced CSA feature deployment
Presents real-world expertise gathered from field installations
Advanced Host Intrusion Prevention with CSA is a practical guide to getting the most out of CSA deployments. This book helps ease the fears of security administrators seeking to install and configure a host IPS through methodical explanation of the advanced CSA features and concepts. Real-world best practices taken from actual installation and support experience of the authors provide an installation framework. The book will help administrators and security engineers implement CSA appropriately, giving their organizations better protection from the various threats that are impacting their business and enabling them to comply with various legal requirements put forth by such legislature as: HIPAA, SOX, SB1386, and VISA PCI. This book aims to take the baseline CSA knowledge that implementation and support teams have and build upon that foundation solid CSA implementation knowledge to guarantee success. The book will consist of 5 major sections covering several advanced concepts in detail and will require basic product knowledge. Part 1 presents an overview of host IPS and CSA. Part 2 discusses project planning and CSA installation. Part 3 covers CSA installation, including server installation and agent deployment. Part 4 addresses CSA policy. Part 5 talks about monitoring and troubleshooting methodologies.