LEADER 03194cam a2200445Ii 4500 001 991003260209707536 006 m d 007 cr cn||||||||| 008 070806s2003 maua s 001 0 eng d 020 $a9781932266696 020 $a1932266690 035 $ab13656740-39ule_inst 037 $a101323:101329$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aBurton, James.$094095 245 10$aCisco security professional's guide to secure intrusion detection systems$h[electronic resource] /$cJames Burton, Ida Dubrawsky, Vitaly Osipov, C. Tate Baumrucker, Michael Sweeney. 246 30$aSecure intrusion detection systems 260 $aRockland, MA :$bSyngress Pub.,$cc2003. 300 $axxvi, 645 p. :$bill. ;$c24 cm. 500 $aIncludes index. 505 0 $aInstallation and Setup; Pervasive Network-based and Host-based protection; Real-Time Intrusion Detection; Response to Unauthorized Activity; Intrusion Alarms; Scalability; Remote Configuration Capability; Attack Database; User-Defined Signatures; Notification actions; Automatic Signature; Web-based embedded device management; IDS Anti-Evasion Techniques. 520 $aCisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. A comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. This book does more than show network engineers how to set up and manage this line of best selling products ... it walks them step by step through all the objectives of the Cisco Secure Intrusion Detection System course (and corresponding exam) that network engineers must pass on their way to achieving sought-after CCSP certification. * Offers complete coverage of the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 650 0$aComputer security. 655 7$aElectronic books.$2local 700 1 $aDubrawsky, Ida.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739090 700 1 $aOsipov, Vitaly.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739091 700 1 $aBaumrucker, C. Tate. 700 1 $aSweeney, Michael. 776 1 $cOriginal$z1932266690$z9781932266696$w(OCoLC)53826389 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781932266696$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656740$b24-02-22$c24-01-08 912 $a991003260209707536 994 $aC0$bTEF 996 $aCisco security professional's guide to secure intrusion detection systems$91464047 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0