Google
 
Web www.download-reference-books.blogspot.com

Friday, December 02, 2005


Syngress - Cisco
Security Professional's Guide to Secure
IDS.








Cisco Security Professional's Guide to Secure
Intrusion Detection Systems by C.
Tate Baumrucker, James D. Burton, Scott Dentler, Ido
Dubrawsky, Vitaly Osipov, Michael Sweeney
ISBN: 1-932266-69-0, 656
Pages, October 2003

This book presents a combination of intrusion
detection systems (IDS) and security
theory, Cisco security models, and
detailed information regarding specific
Cisco-based IDS
solutions. The concepts and information presented in this book
are one step towards providing a more secure working and
living network environment.
This book also
exists as a guide for Security
Administrators seeking to pass the
Cisco Secure Intrusion Detection Systems Exam
(CSIDS 9E0-100), which is associated
with CCSP, Cisco IDS
Specialist, and Cisco Security
Specialist 1 certifications.

Cisco has developed two primary and dynamic
components that form their security model, the
Architecture for Voice, Video, and
Integrated Data (
AVVID) and the Secure
Blueprint for Enterprise Networks (
SAFE), that are intended as tools for network
and security architects to assist in the efficient, modular,
and comprehensive design of today’s modern networks.

Along with AVVID and
SAFE, Cisco has
developed a Security Wheel to provide a
roadmap for implementing enterprisewide security and a
foundation for effective and evolving security management.
Within these security models, Cisco has
identified four security threat categories and three attack
categories. Administrators should understand each of these
categories to better protect their network and systems
environments.
Finally, we’ll
discuss the potential issues and shortcomings of an
IDS so that administrators can understand the
limitations of their security devices. Hopefully, armed with
this information, white hat security professionals can provide
their organizations and governments proper, comprehensive, and
forward-thinking security capabilities.



.
1,
2,
3. or

1,
2,
3. 13Mb

Labels:

Programming Tutorials Links

  • C Programming Tutorials

  • C++ (C Plus Plus) Programming Tutorials

  • CGI Programming Tutorials

  • CORBA Programming Tutorials

  • CSS2, CVS & DHTML Tutorials

  • EMAC Programming Tutorials

  • Expect & Fortran Programming Tutorials

  • GIMP Tutorials & Guide

  • GNOME Programming Tutorials

  • GTK Tutorials & Reference Manuals

  • Gnuplot - Plotting Program Tutorials

  • HTML Tutorials & Examples

  • ILU Tutorials & Reference Manuals

  • IP Masquerade, IPChains Tutorials

  • IPC - Interpprocess Communication Tutorials

  • JAVA Programming Tutorials 1

  • JAVA Programming Tutorials 2

  • JavaScript Tutorials & Reference

  • LISP Programming Tutorials

  • MIDI & Music Synthesis Tutorials

  • ML Tutorials

  • MPI Programming Tutorials

  • Matlab Tutorials & Manuals

  • Misc., Tutorials

  • Motif Programming Tutorials

  • OpenGL Programming Guide & Tutorials

  • PHP - MySQL Tutorials

  • PVM & Pascal Tutorials

  • Perl Programming Tutorials

  • PostScript Programming Tutorials

  • Povray & Prolog Programming Tutorials

  • Python Reference Manuals & Tutorials

  • REXX Programming Tutorials

  • RPC - Remote Procecure Call Tutorials

  • Ruby Programming Tutorials

  • SCSI, SSI & STL Tutorials

  • SQL, MySQL Tutorials


  • Google
     
    Web www.download-reference-books.blogspot.com

    Download 1000's of ebook links in one zip file(10KB)