Intrusion Prevention Fundamentals
✍ Scribed by Earl Carter, Jonathan Hogue
- Book ID
- 127434099
- Publisher
- Cisco Press
- Year
- 2006
- Tongue
- English
- Weight
- 2 MB
- Edition
- 1
- Category
- Library
- ISBN-13
- 9781587052392
No coin nor oath required. For personal study only.
✦ Synopsis
An introduction to network attack mitigation with IPS• Where did IPS come from? How has it evolved?• How does IPS work? What components does it have?• What security needs can IPS address?• Does IPS work with other security products? What is the "big picture"?• What are the best practices related to IPS?• How is IPS deployed, and what should be considered prior to a deployment?Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS projectfrom needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like:Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace.• Understand the types, triggers, and actions of IPS signatures• Deploy, configure, and monitor IPS activities and secure IPS communications• Learn the capabilities, benefits, and limitations of host IPS• Examine the inner workings of host IPS agents and management infrastructures• Enhance your network security posture by deploying network IPS features• Evaluate the various network IPS sensor types and management options• Examine real-world host and network IPS deployment scenarios"
📜 SIMILAR VOLUMES
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se