Anbieter: unifachbuch e.K., Köln, NRW, Deutschland
Taschenbuch. Zustand: Neu. Unbenutzte Restauflage Unbenutzt. Schnelle Lieferung, Kartonverpackung. Abzugsfähige Rechnung. Bei Mehrfachbestellung werden die Versandkosten anteilig erstattet. -Protecting systems within an enterprise has proven as important to overall security as securing the enterprise perimeter. Over the past few years, the number of vulnerabilities stemming from weaknesses in applications and operating systems has grown dramatically. In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. To add to the typical virus issues that businesses have had to confront, there are also malicious programs infiltrating organizations today in the form of spyware and adware. \* Prevent day-zero attacks \* Enforce acceptable-use policies \* Develop host-IPS project implementation plans \* Evaluate management hierarchy installation options, including single-server, multiserver, and built-in database usage \* Learn about CSA agents and manual and scripted installation options \* Understand policy components and custom policy creation \* Use and filter information from CSA event logs \* Troubleshoot CSA deployments with agent and management server logs and built-in troubleshooting tools Protecting systems where the private data and intellectual property resides is no longer considered a function of perimeter defense systems but has instead become the domain of endpoint protection software, such as host Intrusion Prevention Systems (IPS). 298 pp. Englisch.
Zustand: Hervorragend. Zustand: Hervorragend | Sprache: Englisch | Produktart: Bücher.