WorldCat Identities

Abelar, Greg

Overview
Works: 6 works in 31 publications in 1 language and 472 library holdings
Roles: Author, Reviewer, Other
Classifications: TK5105.59, 005.8
Publication Timeline
.
Most widely held works by Greg Abelar
Security threat mitigation and response : understanding Cisco security MARS by Dale Tesch( )

12 editions published between 2006 and 2007 in English and held by 228 WorldCat member libraries worldwide

Understanding Cisco security MARS
Securing your business with CISCO ASA and PIX firewalls by Greg Abelar( )

12 editions published between 1900 and 2005 in English and held by 204 WorldCat member libraries worldwide

The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network devices, including routers, switches, hosts, and servers Covers PIX 7.0 and the most recent version of PDM All networks need a strong security solution to prevent against the devastation of worms, viruses, and malicious intruders, but the real
Cisco ASA, PIX, and FWSM firewall handbook by Dave Hucaby( )

2 editions published in 2008 in English and held by 27 WorldCat member libraries worldwide

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco."--Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th
Security Threat Mitigation And Response by Dale Tesch( )

2 editions published between 1900 and 2006 in English and held by 5 WorldCat member libraries worldwide

Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine i
Security monitoring with Cisco security MARS by Gary Halleen( )

2 editions published in 2007 in English and held by 4 WorldCat member libraries worldwide

Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening. Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors. Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools. “In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.” —Ed Skoudis, Vice President of Security Strategy, Predictive Systems Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful comput
Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544)( )

1 edition published in 2007 in English and held by 4 WorldCat member libraries worldwide

 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.56 (from 0.51 for Security m ... to 0.67 for Security T ...)

Security threat mitigation and response : understanding Cisco security MARS
Covers
Securing your business with CISCO ASA and PIX firewalls
Languages
English (31)