Security Monitoring

Security Monitoring

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network.


Saturday, April 19, 2014

The vacation is over soon

Well at the moment my c programming is having some trouble but that is only me being a new guy.
On a other things that is on my mind, is the surveillance of governments and other.
In my opinion normal people should have the right to surf the net, without being tracked without saying yes to being tracked, some shopping sites is ok for me.
But other things there should be a click ok or agreement that one should say yes to.
One of the way i found to stay more anonymous on the net is a tor project
Which is part of what is now known as the deep net.
But yeah the choice for others is not mine to take, but i have made my choice
So stay safe stay anonymous

No comments:

Post a Comment