Security Monitoring is formed upon a authors’ years of believe conducting situation reply to keep Cisco’s tellurian network secure. It offers 6 stairs to urge network monitoring. These stairs will assistance you:
Develop Policies: conclude rules, regulations, as well as monitoring criteria
Know Your Network: set up believe of your infrastructure with network telemetry
Select Your Targets: conclude a subset of infrastructure to be monitored
Choose Event Sources: brand eventuality sorts indispensable to find process violations
Feed as well as Tune: pick up data, beget alerts, as well as balance systems regulating contextual information
Maintain Dependable Event Sources: forestall vicious gaps in pciking up as well as monitoring events
Security Monitoring illustrates these stairs with minute examples which will assistance we sense to name as well as muster a most appropriate techniques for monitoring your own craving network.
Publisher: O’Reilly Media, Inc.; 1 book (February 24, 2009)
Language: English
ISBN-10: 0596518161
ISBN-13: 978-0596518165
No comments:
Post a Comment