skip to content
Cisco security agent Preview this item
ClosePreview this item

Cisco security agent

Author: Chad Sullivan; Safari Tech Books Online.
Publisher: Indianapolis, IN : Cisco Press, 2005.
Edition/Format:   Computer file : EnglishView all editions and formats

Presents a detailed explanation of Cisco Security Agent (CSA), illustrating the use of the product in a step-by-step fashion. This book also provides a detailed view of host intrusion prevention with  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Chad Sullivan; Safari Tech Books Online.
OCLC Number: 873842702
Notes: Made available through: Safari Books Online, LLC.
Mode of access: World Wide Web.
Reproduction Notes: Electronic reproduction Available via World Wide Web Boston, MA : Safari.
Description: p. S. ; cm
Contents: ForewordIntroductionPart I The Need for Endpoint SecurityChapter 1 Introducing Endpoint SecurityChapter 2 Introducing the Cisco Security AgentPart II Understanding the CSA Building BlocksChapter 3 Understanding CSA Groups and HostsChapter 4 Understanding CSA Policies, Modules, and RulesChapter 5 Understanding Application Classes and VariablesPart III CSA Agent Installation and Local Agent UseChapter 6 Understanding CSA Components and InstallationChapter 7 Using the CSA User InterfacePart IV Monitoring and ReportingChapter 8 Monitoring CSA EventsChapter 9 Using CSA MC ReportsPart V Analyzing CSAChapter 10 Application Deployment InvestigationChapter 11 Application Behavior AnalysisPart VI Creating Policy, Implementing CSA, and Maintaining the CSA MCChapter 12 Creating and Tuning PolicyChapter 13 Developing a CSA Project Implementation PlanChapter 14 CSA MC Administration and MaintenancePart VII AppendixesAppendix A VMS and CSA MC 4.5 InstallationAppendix B Security Monitor IntegrationAppendix C CSA MIBIndex
Responsibility: Chad Sullivan, Jeffrey M. Wells.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Cisco security agent
    a schema:CreativeWork, bgn:ComputerFile ;
   library:oclcnum "873842702" ;
   library:placeOfPublication <> ; # Indianapolis, IN
   library:placeOfPublication <> ;
   schema:about <> ; # Computersicherheit
   schema:about <> ; # Electronic books / local
   schema:about <> ; # Cisco
   schema:contributor <> ; # Safari Tech Books Online.
   schema:creator <> ; # Chad Sullivan
   schema:datePublished "2005" ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <> ;
   schema:name "Cisco security agent" ;
   schema:productID "873842702" ;
   schema:publication <> ;
   schema:publisher <> ; # Cisco Press
   schema:url <> ;
   schema:url <> ;
   wdrs:describedby <> ;

Related Entities

<> # Safari Tech Books Online.
    a schema:Organization ;
   schema:name "Safari Tech Books Online." ;

<> # Chad Sullivan
    a schema:Person ;
   schema:familyName "Sullivan" ;
   schema:givenName "Chad" ;
   schema:name "Chad Sullivan" ;

<> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;

<> # Electronic books / local
    a schema:Thing ;
   schema:name "Electronic books / local" ;

<> # Computersicherheit
    a schema:Intangible ;
   schema:name "Computersicherheit" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.