Novell Open Enterprise Server Administrator's Handbook/Cisco Security Agent

Posted By: Alexpal
Еще две свеженькие книжки - краска еще не просохла! :)

Jeffrey Harris, Mike Latimer, "Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition"
Chad Sullivan, "Cisco Security Agent"

Jeffrey Harris, Mike Latimer, "Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition"
Novell Press | ISBN 067232749X | May 13, 2005 Year | CHM | 21 Mb | 600 Pages

As an administrator of a Novell® Open Enterprise Server (OES) on a SUSE® LINUX system, you are looking for ways to leverage it as a platform for delivering Novell's robust network services. Look no further. Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition provides you with the information that you need to take advantage of Novell rich array of nework management tools on a SUSE-powered system. By focusing on the implementation of OES on the SUSE LINUX platform, administrators learn how to integrate the benefits of OES in an existing environment. While this is not a reference work for network theory, protocols or architectures, it will provide the reader with a brief introduction to the concepts necessary to understand features of the product. Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition provides you with quick access to the information about the technologies, concepts and techniques that you need to get the job done.

Chad Sullivan, "Cisco Security Agent"
Cisco Press | ISBN 1587052059 | June 1, 2005 Year | CHM | 27 Mb | 456 Pages

Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System
— Secure your endpoint systems with host IPS
Build and manipulate policies for the systems you wish to protect
— Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related
— Install local agent components on various operating systems
— Explore the event database on the management system to view and filter information
— Examine Cisco Security Agent reporting mechanisms for monitoring system activity
— Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs
— Collect detailed information on processes and see how they use and are used by system resources
— Create and tune policies to control your environment without impacting usability
— Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups
Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked–regardless of the attack.
Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection–the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators.
Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part I covers the importance of endpoint security. Part II examines the basic components of the Cisco Security Agent architecture. Part III addresses agent installation and local use. Part IV discusses the Cisco Security Agent management console’s reporting and monitoring capabilities. Part V covers advanced Cisco Security Agent analysis features. Part VI covers Cisco Security Agent policy, implementation, and management. Part VII presents additional installation and management information.
Whether you are evaluating host IPS in general or looking for a detailed deployment guide for Cisco Security Agent, this book will help you lock down your endpoint systems and prevent future attacks.
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.