Security threat mitigation and response: understanding Cisco security MARS
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often comp...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, Ind.
Cisco Press
2006
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/1587052601/?ar |
Zusammenfassung: | Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine if an attack has exploited devices on their networks. Cisco® Security Monitoring, Analysis, and Response System (Cisco Security MARS) complements network and security infrastructure investment by delivering a security command and control solution that is easy to deploy, easy to use, and cost-effective. Cisco Security MARS fortifies deployed network devices and security countermeasures, empowering you to readily identify, manage, and eliminate network attacks and maintain compliance. Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. This book clearly presents the advantages of moving from a security reporting system to an all-inclusive security and network threat recognition and mitigation system. You will learn how Cisco Security MARS works, what the potential return on investment is for deploying Cisco Security MARS, and how to set up and configure Cisco Security MARS in your network. "Dealing with gigantic amounts of disparate data is the next big challenge in computer security; if you're a Cisco Security MARS user, this book is what you've been looking for."--Marcus J. Ranum, Chief of Security, Tenable Security, Incorporated Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers. Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team's e ... |
Beschreibung: | Print version record |
Umfang: | 1 online resource |
ISBN: | 1587052601 9781587052606 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047379162 | ||
003 | DE-627-1 | ||
005 | 20240228114106.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2006 xx |||||o 00| ||eng c | ||
020 | |a 1587052601 |c paperback |9 1-58705-260-1 | ||
020 | |a 9781587052606 |c paperback |9 978-1-58705-260-6 | ||
035 | |a (DE-627-1)047379162 | ||
035 | |a (DE-599)KEP047379162 | ||
035 | |a (ORHE)1587052601 | ||
035 | |a (DE-627-1)047379162 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22/eng/20230216 | |
100 | 1 | |a Tesch, Dale |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Security threat mitigation and response |b understanding Cisco security MARS |c Dale Tesch and Greg Abelar |
246 | 3 | 3 | |a Understanding Cisco security MARS |
246 | 3 | 3 | |a Understanding Cisco security monitoring, analysis, and response system |
264 | 1 | |a Indianapolis, Ind. |b Cisco Press |c 2006 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine if an attack has exploited devices on their networks. Cisco® Security Monitoring, Analysis, and Response System (Cisco Security MARS) complements network and security infrastructure investment by delivering a security command and control solution that is easy to deploy, easy to use, and cost-effective. Cisco Security MARS fortifies deployed network devices and security countermeasures, empowering you to readily identify, manage, and eliminate network attacks and maintain compliance. Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. This book clearly presents the advantages of moving from a security reporting system to an all-inclusive security and network threat recognition and mitigation system. You will learn how Cisco Security MARS works, what the potential return on investment is for deploying Cisco Security MARS, and how to set up and configure Cisco Security MARS in your network. "Dealing with gigantic amounts of disparate data is the next big challenge in computer security; if you're a Cisco Security MARS user, this book is what you've been looking for."--Marcus J. Ranum, Chief of Security, Tenable Security, Incorporated Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers. Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team's e ... | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Computer security |x Evaluation | |
650 | 0 | |a Electronic countermeasures | |
650 | 0 | |a Firewalls (Computer security) | |
650 | 0 | |a Internet |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Évaluation | |
650 | 4 | |a Contre-mesures électroniques | |
650 | 4 | |a Coupe-feu (Sécurité informatique) | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security ; Evaluation | |
650 | 4 | |a Electronic countermeasures | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Internet ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Evaluation | |
650 | 4 | |a Electronic countermeasures | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Internet ; Security measures | |
700 | 1 | |a Abelar, Greg |e MitwirkendeR |4 ctb | |
710 | 2 | |a Cisco Systems, Inc. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/1587052601/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047379162 |
---|---|
_version_ | 1833357118333255680 |
adam_text | |
any_adam_object | |
author | Tesch, Dale |
author2 | Abelar, Greg |
author2_role | ctb |
author2_variant | g a ga |
author_corporate | Cisco Systems, Inc |
author_corporate_role | ctb |
author_facet | Tesch, Dale Abelar, Greg Cisco Systems, Inc |
author_role | aut |
author_sort | Tesch, Dale |
author_variant | d t dt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047379162 (DE-599)KEP047379162 (ORHE)1587052601 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05024cam a22006732c 4500</leader><controlfield tag="001">ZDB-30-ORH-047379162</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114106.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1587052601</subfield><subfield code="c">paperback</subfield><subfield code="9">1-58705-260-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781587052606</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-58705-260-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047379162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047379162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)1587052601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047379162</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tesch, Dale</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security threat mitigation and response</subfield><subfield code="b">understanding Cisco security MARS</subfield><subfield code="c">Dale Tesch and Greg Abelar</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Understanding Cisco security MARS</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Understanding Cisco security monitoring, analysis, and response system</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine if an attack has exploited devices on their networks. Cisco® Security Monitoring, Analysis, and Response System (Cisco Security MARS) complements network and security infrastructure investment by delivering a security command and control solution that is easy to deploy, easy to use, and cost-effective. Cisco Security MARS fortifies deployed network devices and security countermeasures, empowering you to readily identify, manage, and eliminate network attacks and maintain compliance. Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. This book clearly presents the advantages of moving from a security reporting system to an all-inclusive security and network threat recognition and mitigation system. You will learn how Cisco Security MARS works, what the potential return on investment is for deploying Cisco Security MARS, and how to set up and configure Cisco Security MARS in your network. "Dealing with gigantic amounts of disparate data is the next big challenge in computer security; if you're a Cisco Security MARS user, this book is what you've been looking for."--Marcus J. Ranum, Chief of Security, Tenable Security, Incorporated Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers. Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team's e ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic countermeasures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Évaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Contre-mesures électroniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic countermeasures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic countermeasures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abelar, Greg</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Cisco Systems, Inc.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/1587052601/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047379162 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:46:36Z |
institution | BVB |
isbn | 1587052601 9781587052606 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Cisco Press |
record_format | marc |
spelling | Tesch, Dale VerfasserIn aut Security threat mitigation and response understanding Cisco security MARS Dale Tesch and Greg Abelar Understanding Cisco security MARS Understanding Cisco security monitoring, analysis, and response system Indianapolis, Ind. Cisco Press 2006 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine if an attack has exploited devices on their networks. Cisco® Security Monitoring, Analysis, and Response System (Cisco Security MARS) complements network and security infrastructure investment by delivering a security command and control solution that is easy to deploy, easy to use, and cost-effective. Cisco Security MARS fortifies deployed network devices and security countermeasures, empowering you to readily identify, manage, and eliminate network attacks and maintain compliance. Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. This book clearly presents the advantages of moving from a security reporting system to an all-inclusive security and network threat recognition and mitigation system. You will learn how Cisco Security MARS works, what the potential return on investment is for deploying Cisco Security MARS, and how to set up and configure Cisco Security MARS in your network. "Dealing with gigantic amounts of disparate data is the next big challenge in computer security; if you're a Cisco Security MARS user, this book is what you've been looking for."--Marcus J. Ranum, Chief of Security, Tenable Security, Incorporated Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers. Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team's e ... Computer networks Security measures Computer networks Access control Computer security Evaluation Electronic countermeasures Firewalls (Computer security) Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique ; Évaluation Contre-mesures électroniques Coupe-feu (Sécurité informatique) Internet ; Sécurité ; Mesures Computer networks ; Security measures Computer networks ; Access control Computer security ; Evaluation Internet ; Security measures Abelar, Greg MitwirkendeR ctb Cisco Systems, Inc. MitwirkendeR ctb |
spellingShingle | Tesch, Dale Security threat mitigation and response understanding Cisco security MARS Computer networks Security measures Computer networks Access control Computer security Evaluation Electronic countermeasures Firewalls (Computer security) Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique ; Évaluation Contre-mesures électroniques Coupe-feu (Sécurité informatique) Internet ; Sécurité ; Mesures Computer networks ; Security measures Computer networks ; Access control Computer security ; Evaluation Internet ; Security measures |
title | Security threat mitigation and response understanding Cisco security MARS |
title_alt | Understanding Cisco security MARS Understanding Cisco security monitoring, analysis, and response system |
title_auth | Security threat mitigation and response understanding Cisco security MARS |
title_exact_search | Security threat mitigation and response understanding Cisco security MARS |
title_full | Security threat mitigation and response understanding Cisco security MARS Dale Tesch and Greg Abelar |
title_fullStr | Security threat mitigation and response understanding Cisco security MARS Dale Tesch and Greg Abelar |
title_full_unstemmed | Security threat mitigation and response understanding Cisco security MARS Dale Tesch and Greg Abelar |
title_short | Security threat mitigation and response |
title_sort | security threat mitigation and response understanding cisco security mars |
title_sub | understanding Cisco security MARS |
topic | Computer networks Security measures Computer networks Access control Computer security Evaluation Electronic countermeasures Firewalls (Computer security) Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique ; Évaluation Contre-mesures électroniques Coupe-feu (Sécurité informatique) Internet ; Sécurité ; Mesures Computer networks ; Security measures Computer networks ; Access control Computer security ; Evaluation Internet ; Security measures |
topic_facet | Computer networks Security measures Computer networks Access control Computer security Evaluation Electronic countermeasures Firewalls (Computer security) Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique ; Évaluation Contre-mesures électroniques Coupe-feu (Sécurité informatique) Internet ; Sécurité ; Mesures Computer networks ; Security measures Computer networks ; Access control Computer security ; Evaluation Internet ; Security measures |
work_keys_str_mv | AT teschdale securitythreatmitigationandresponseunderstandingciscosecuritymars AT abelargreg securitythreatmitigationandresponseunderstandingciscosecuritymars AT ciscosystemsinc securitythreatmitigationandresponseunderstandingciscosecuritymars AT teschdale understandingciscosecuritymars AT abelargreg understandingciscosecuritymars AT ciscosystemsinc understandingciscosecuritymars AT teschdale understandingciscosecuritymonitoringanalysisandresponsesystem AT abelargreg understandingciscosecuritymonitoringanalysisandresponsesystem AT ciscosystemsinc understandingciscosecuritymonitoringanalysisandresponsesystem |