Security and forensic computing: intrusion detection systems.
(2010)
Digital Artefact
Buchanan, W. J. (2010). Security and forensic computing: intrusion detection systems
2 INTRUSION DETECTION SYSTEMS 50 2.1 Introduction 50 2.2 Types of intrusion 53 2.3 Attack patterns 54 2.4 Host/network-based intrusion detection 55 2.5 Placement of the IDS 57 2.6 SNORT 59 2.7 Example rules 61 2.8 Running Snort 67 2.9 User,... Read More about Security and forensic computing: intrusion detection systems..