In an arrangement with SearchSecurity.com and Addison-Wesley, chapter 11 of The Tao of Network Security Monitoring: Beyond Intrusion Detection is now available online . Although the chapter discusses "Best Practices," typically a boring management concept, I managed to include several packet trace-driven case studies. Chapter 11 joins the foreward, chapter 2, and chapter 10 as being available online.
Kamis, 28 Oktober 2004
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar