版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
*Understand how to protect your network with a defense-in-depth strategy
*Examine real-world examples of cost savings realized by Cisco Security MARS deployments
*Evaluate the technology that underpins the Cisco Security MARS appliance
*Set up and configure Cisco Security MARS devices and customize them for your environment
*Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network
*Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network
*Use custom reports and custom queries to generate device and event information about your network and security events
*Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks
http://rapidshare.com/files/50529691/1587052601.rar
*Understand how to protect your network with a defense-in-depth strategy
*Examine real-world examples of cost savings realized by Cisco Security MARS deployments
*Evaluate the technology that underpins the Cisco Security MARS appliance
*Set up and configure Cisco Security MARS devices and customize them for your environment
*Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network
*Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network
*Use custom reports and custom queries to generate device and event information about your network and security events
*Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
http://rapidshare.com/files/50529691/1587052601.rar