版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
Learn the differences between various log aggregation and correlation systems
*Examine regulatory and industry requirements
*Evaluate various deployment scenarios
*Properly size your deployment
*Protect the Cisco Security MARS appliance from attack
*Generate reports, archive data, and implement disaster recovery plans
*Investigate incidents when Cisco Security MARS detects an attack
*Troubleshoot Cisco Security MARS operation
*Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
*Manage groups of MARS controllers with global controller operations
http://rapidshare.com/files/78631590/1587052709.zip
http://depositfiles.com/files/2816840
Learn the differences between various log aggregation and correlation systems
*Examine regulatory and industry requirements
*Evaluate various deployment scenarios
*Properly size your deployment
*Protect the Cisco Security MARS appliance from attack
*Generate reports, archive data, and implement disaster recovery plans
*Investigate incidents when Cisco Security MARS detects an attack
*Troubleshoot Cisco Security MARS operation
*Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
*Manage groups of MARS controllers with global controller operations
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
http://rapidshare.com/files/78631590/1587052709.zip
http://depositfiles.com/files/2816840