Home > Store

Lesson 2: Implementing Secure Management and Monitoring, Downloadable Version

Register your product to gain access to bonus material or receive a coupon.

Lesson 2: Implementing Secure Management and Monitoring, Downloadable Version

Downloadable Video

  • Sorry, this book is no longer in print.
  • About this video
  • Accessible from your Account page after purchase. Requires the free QuickTime Player software.

    Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.

Not for Sale

Audio & Video

Your browser doesn't support playback of this video. Please download the file to view it.

Actual product comes full screen and in high resolution.

Description

  • Copyright 2013
  • Edition: 1st
  • Downloadable Video
  • ISBN-10: 0-13-325902-1
  • ISBN-13: 978-0-13-325902-5

Accurate and centralized reporting regarding the activities of your network devices is critical, especially when making sense of an attack that effected multiple network devices. Limiting the damage that can be done by a single administrator is good policy. This lesson addresses both of these issues with best practices for monitoring and role based access control

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.