Cisco Security Professional's Guide to Secure Intrusion Detection Systems by SyngressCisco Security Professional's Guide to Secure Intrusion Detection Systems by Syngress

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

bySyngressEditorSyngress

Paperback | November 6, 2003

Pricing and Purchase Info

$82.20 online 
$86.95 list price save 5%
Earn 411 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003.

Cisco Security Professional's Guide to Secure Intrusion Detection Systemsis a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS.Cisco Security Professional's Guide to Secure Intrusion Detection Systemsdoes more than show network engineers how to set up and manage this line of best selling products ... it walks them step by step through all the objectives of the Cisco Secure Intrusion Detection System course (and corresponding exam) that network engineers must pass on their way to achieving sought-after CCSP certification.



  • Offers complete coverage of the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs
Title:Cisco Security Professional's Guide to Secure Intrusion Detection SystemsFormat:PaperbackDimensions:656 pages, 10.43 × 7.5 × 0.68 inPublished:November 6, 2003Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1932266690

ISBN - 13:9781932266696

Look for similar items by category:

Reviews

Table of Contents

Installation and Setup; Pervasive Network-based and Host-based protection; Real-Time Intrusion Detection; Response to Unauthorized Activity; Intrusion Alarms; Scalability; Remote Configuration Capability; Attack Database; User-Defined Signatures; Notification actions; Automatic Signature; Web-based embedded device management; IDS Anti-Evasion Techniques