Security monitoring with Cisco security MARS

Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Halleen, Gary (VerfasserIn)
Weitere Verfasser: Kellogg, Greg (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, Ind. Cisco Press 2007
Schriftenreihe:Cisco Press networking technology series
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047641762
003 DE-627-1
005 20240228114142.0
007 cr uuu---uuuuu
008 191023s2007 xx |||||o 00| ||eng c
020 |a 9781587052705  |c paperback  |9 978-1-58705-270-5 
020 |a 1587052709  |c paperback  |9 1-58705-270-9 
035 |a (DE-627-1)047641762 
035 |a (DE-599)KEP047641762 
035 |a (ORHE)9781587052705 
035 |a (DE-627-1)047641762 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 22 
100 1 |a Halleen, Gary  |e VerfasserIn  |4 aut 
245 1 0 |a Security monitoring with Cisco security MARS  |c Gary Halleen, Greg Kellogg 
264 1 |a Indianapolis, Ind.  |b Cisco Press  |c 2007 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Cisco Press networking technology series 
500 |a Includes bibliographical references and index. - Print version record 
520 |a Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening. Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors. Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools. "In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment."--Ed Skoudis, Vice President of Security Strategy, Predictive Systems Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful comput ... 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security  |x Evaluation 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Sécurité informatique ; Évaluation 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security ; Evaluation 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security ; Evaluation 
700 1 |a Kellogg, Greg  |e MitwirkendeR  |4 ctb 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781587052705/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047641762
_version_ 1818767302500286464
adam_text
any_adam_object
author Halleen, Gary
author2 Kellogg, Greg
author2_role ctb
author2_variant g k gk
author_facet Halleen, Gary
Kellogg, Greg
author_role aut
author_sort Halleen, Gary
author_variant g h gh
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047641762
(DE-599)KEP047641762
(ORHE)9781587052705
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04191cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047641762</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114142.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781587052705</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-58705-270-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1587052709</subfield><subfield code="c">paperback</subfield><subfield code="9">1-58705-270-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047641762</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047641762</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781587052705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047641762</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Halleen, Gary</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security monitoring with Cisco security MARS</subfield><subfield code="c">Gary Halleen, Greg Kellogg</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cisco Press networking technology series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening. Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors. Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools. "In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment."--Ed Skoudis, Vice President of Security Strategy, Predictive Systems Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful comput ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Évaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kellogg, Greg</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781587052705/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047641762
illustrated Not Illustrated
indexdate 2024-12-18T08:47:43Z
institution BVB
isbn 9781587052705
1587052709
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Cisco Press
record_format marc
series2 Cisco Press networking technology series
spelling Halleen, Gary VerfasserIn aut
Security monitoring with Cisco security MARS Gary Halleen, Greg Kellogg
Indianapolis, Ind. Cisco Press 2007
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Cisco Press networking technology series
Includes bibliographical references and index. - Print version record
Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening. Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors. Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools. "In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment."--Ed Skoudis, Vice President of Security Strategy, Predictive Systems Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful comput ...
Computer networks Security measures
Computer security Evaluation
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique ; Évaluation
Computer networks ; Security measures
Computer security ; Evaluation
Kellogg, Greg MitwirkendeR ctb
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781587052705/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Halleen, Gary
Security monitoring with Cisco security MARS
Computer networks Security measures
Computer security Evaluation
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique ; Évaluation
Computer networks ; Security measures
Computer security ; Evaluation
title Security monitoring with Cisco security MARS
title_auth Security monitoring with Cisco security MARS
title_exact_search Security monitoring with Cisco security MARS
title_full Security monitoring with Cisco security MARS Gary Halleen, Greg Kellogg
title_fullStr Security monitoring with Cisco security MARS Gary Halleen, Greg Kellogg
title_full_unstemmed Security monitoring with Cisco security MARS Gary Halleen, Greg Kellogg
title_short Security monitoring with Cisco security MARS
title_sort security monitoring with cisco security mars
topic Computer networks Security measures
Computer security Evaluation
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique ; Évaluation
Computer networks ; Security measures
Computer security ; Evaluation
topic_facet Computer networks Security measures
Computer security Evaluation
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique ; Évaluation
Computer networks ; Security measures
Computer security ; Evaluation
url https://learning.oreilly.com/library/view/-/9781587052705/?ar
work_keys_str_mv AT halleengary securitymonitoringwithciscosecuritymars
AT kellogggreg securitymonitoringwithciscosecuritymars