๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Security Threat Mitigation and Response: Understanding Cisco Security MARS

โœ Scribed by Dale Tesch, Greg Abelar


Publisher
Cisco Press
Year
2006
Tongue
English
Leaves
408
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


We got a MARS box at my work, so I grabbed this book to get up to snuff. It was a very annoying and frustrating book. The first 1/3 of the book seemed to be semi-marketing fluff, and actually prompted me to note "hahaha" in one of the margins. In about a decade of working through technical books, and a BA in political science (which led me to read some seriously pompous material), I've NEVER DONE THAT.Overall I didn't find the book that helpful. If you are fairly new to infosec (I'm not condescending here, everyone was once new at everything) it might have enough new information hidden amongst the MBA-speak to keep your attention, but I found myself skimming a lot, and eventually just tossed the book aside.On the bright side you can occasionally find useful material in it as a reference book. Since it's light on technical information for it's weight, don't count on that too much, but it's not totally useless. For example I was able to find MARS' place in our infrastructure in regards to Netflow with this book, (MARS as a collector is security-focused, and not a proper primary collector for traffic engineering, which makes complete sense), but to set it up accordingly I had to google around and eventually found a really good MARS blog.So I'd say that if you have a MARS box, get your work to buy you this book because it will occasionally be handy, maybe shaving a few minutes off of a google session. If I was paying I would skip it. The line that prompted me to actually burst into laughter actually claimed that a specific set of practices surrounding the MARS box made it impenetrable. If I had the book at home right now I would quote it, so readers could recall the Oracle "unbreakable" debacle and smile.


๐Ÿ“œ SIMILAR VOLUMES


Security threat mitigation and response
โœ Tesch, Dale;Abelar, Greg ๐Ÿ“‚ Library ๐Ÿ“… 2006;2007 ๐Ÿ› Cisco Press ๐ŸŒ English

Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System. While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply ha

Cyber-Security Threats, Actors, and Dyna
โœ Nicholas Kolokotronis and Stavros Shiaeles ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting

Understanding New Security Threats
โœ Michel R Gueldry; Gigi Gokcek; Lui Hebron ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Routledge ๐ŸŒ English

This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors.ใ€€ Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized issues of threats to state and national territory

Security in Nigeria: Contemporary Threat
โœ Caroline Varin; Freedom Onuoha (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› I.B. Tauris ๐ŸŒ English

Nigeria is one of the most dynamic countries on the African continent with severe security threats. Tackling the major issues, Security in Nigeria examines the underlying causes of insecurity, specific violent threats to the state, the crisis of governance on the legitimacy of the Nigerian state and