Chapter 11. Application Behavior Analysis

This chapter covers the following topics:

When attempting to write policies to control and secure your application environment, you must have a detailed understanding of those applications and their usage. The information required includes the following:

  • What applications are deployed

  • Where the applications are deployed

  • How the user should interact with the application

  • How the applications ...

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.