Online Material

1. The Apache Software Foundation (http://www.apache.org).

2. CERT Coordination Center. “Identifying tools that aid in detecting signs of intrusion” (http://www.cert.org/security-improvement/implementations/i042.07.html).

3. List of intrusions detected by Network ICE (http://www.iss.net/security_center/advice/Intrusions/default.htm).

4. Microsoft Security and Privacy Web site (http://www.microsoft.com/security).

5. Network Security Library. “Network- vs. Host-based Intrusion Detection” (http://secinf.net/info/ids/nvh_ids/).

6. SANs Institute “What Is a Honeypot?” (http://www.sans.org/newlook/resources/IDFAQ/honeypot3.htm).

7. “The Science of Intrusion Detection System Attack Identification” (http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/prodlit/idssa_wp.htm ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.