Sinopsis:
Presents the details and methodologies associated with intrusion detection technology to control cracking activity on the Internet. Topics include commercial tools, strategies for processing security audit trails, correlation techniques and algorithms, intruder trace back techniques, deception-based honey pots and traps, and incident response and disaster recovery. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Reseña del editor:
Presents the details and methodologies associated with intrusion detection technology to control cracking activity on the Internet. Topics include commercial tools, strategies for processing security audit trails, correlation techniques and algorithms, intruder trace back techniques, deception-based honey pots and traps, and incident response and disaster recovery. Annotation c. Book News, Inc., Portland, OR (booknews.com)
"Sobre este título" puede pertenecer a otra edición de este libro.