Chapter 10. Introduction to and Deployment of Cisco Next-Generation IPS
The chapter covers the following topics:
Deployment design considerations
The NGIPS deployment lifecycle
Attackers have constantly improved their methodologies of exploiting gaps in security by concealing their malicious activities and potential intrusions in spite of the security controls used in an infrastructure. Detection challenges are introduced by complicit ...