Foreword

The Internet used to be a place of shared access and shared ideas. In recent years, however, the Internet has taken on more of a Wild West personality, with general users, hackers, crackers, troublemakers, and information thieves using it for both business and pleasure. With such a mix of personalities online, it has become much more difficult to sort out who is safe and who is a threat. At the same time, the threats have become much more difficult to detect and protect against. Like the old west, network managers, administrators, and anyone else with a vested interest in protecting their data have built forts on the Internet to protect that data (now called “intellectual property”). People have finally awoken to the understanding that ...

Get Cisco Security Professional's Guide to Secure Intrusion Detection Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.