Chapter 11. Application Behavior Analysis
This chapter covers the following topics:
When attempting to write policies to control and secure your application environment, you must have a detailed understanding of those applications and their usage. The information required includes the following:
What applications are deployed
Where the applications are deployed
How the user should interact with the application
How the applications ...
Get Cisco Security Agent now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.