0 Pt. I. The security threat identification and response challenge -- Ch. 1. Understanding SIM and STM -- Ch. 2. Role of CS-Mars in your network -- Ch. 3. Deriving TCO and ROI -- Pt. II. CS-MARS theory and configuration -- Ch. 4. CS-MARS technologies and theory -- Ch. 5. CS-MARS appliance setup and configuration -- Ch. 6. Reporting and mitigative device configuration -- Pt. III. CS-MARS operation -- Ch. 7. CS-MARS basic operation -- Ch. 8. Advanced operation and security analysis -- Pt. IV. CS-MARS in action -- Ch. 9. CS-MARS uncovered.