It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 05033cam 2200529Ma 4500
001 ocn133161515
003 OCoLC
005 20200803175051.0
008 030402s2004 inua o 001 0 eng d
006 m o d
007 cr cn|||||||||
010 $z 2003104999
040 $aUAB$beng$epn$cUAB$dVLB$dCEF$dOCLCQ$dOCLCF$dOCLCQ$dREB$dOCLCQ$dAU@$dWYU$dVT2
019 $a748108770$a1044330867$a1056316515$a1061013742$a1064116341$a1073058545$a1103253979$a1129358820
020 $a1587051443
020 $a9781587051449
035 $a(OCoLC)133161515$z(OCoLC)748108770$z(OCoLC)1044330867$z(OCoLC)1056316515$z(OCoLC)1061013742$z(OCoLC)1064116341$z(OCoLC)1073058545$z(OCoLC)1103253979$z(OCoLC)1129358820
050 4 $aTK5105.59$b.C375 2004
082 04 $a005.8$222
100 1 $aCarter, Earl.
245 10 $aCCSP self-study :$bCisco secure intrusion detection system (CSIDS) /$cEarl Carter.
246 30 $aCisco secure intrusion detection system (CSIDS)
250 $a2nd ed.
260 $aIndianapolis, IN :$bCisco Press,$c©2004.
300 $a1 online resource (xxxvii, 828 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
500 $aIncludes index.
500 $aRevised edition of: Cisco secure intrusion detection system. c2002.
588 0 $aPrint version record.
520 $aUnderstand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
650 0 $aComputer networks$xSecurity measures.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
655 0 $aElectronic book.
655 4 $aElectronic books.
700 1 $aCarter, Earl.$tCisco secure intrusion detection system.
776 08 $iPrint version:$aCarter, Earl.$b2nd ed.$tCCSP self-study.$dIndianapolis, IN : Cisco Press, ©2004$z1587051443$w(OCoLC)55657800
856 40 $3Safari Books Online$uhttp://proquest.safaribooksonline.com/1587051443
856 4 $uhttp://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=1587051443$zSafari (Access restricted to 5 simultaneous users)
856 40 $zVIEW FULL TEXT$uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000074076&T=marc&tab=BOOKS
856 40 $uhttps://www.safaribooksonline.com/library/view/title/1587051443/?ar?orpq&email=^u
856 40 $uhttps://www.safaribooksonline.com/library/view/-/1587051443/?ar?orpq&email=^u
029 1 $aHEBIS$b291462561
029 1 $aAU@$b000067105037
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 133 OTHER HOLDINGS