Text
Practical intrusion analysis: prevention and detection for the twenty-first century
Table of Contents:
1. Network Overview
2. Infrastructure Monitoring
3. Intrusion Detection Systems
4. Lifecycle of a Vulnerability
5. Proactive Intrusion Prevention and Response via Attack Graphs
6. Network Flows and Anomaly Detection
7. Web Application Firewalls
8. Wireless IDS/IPS
9. Physical Intrusion Detection for IT
10. Geospatial Intrusion Detection
11. Visual Data Communications
12. Return on Investment: Business Justification
A. Bro Installation Guide
No other version available