Online Material
1. The Apache Software Foundation (http://www.apache.org).
2. CERT Coordination Center. “Identifying tools that aid in detecting signs of intrusion” (http://www.cert.org/security-improvement/implementations/i042.07.html).
3. List of intrusions detected by Network ICE (http://www.iss.net/security_center/advice/Intrusions/default.htm).
4. Microsoft Security and Privacy Web site (http://www.microsoft.com/security).
5. Network Security Library. “Network- vs. Host-based Intrusion Detection” (http://secinf.net/info/ids/nvh_ids/).
6. SANs Institute “What Is a Honeypot?” (http://www.sans.org/newlook/resources/IDFAQ/honeypot3.htm).
7. “The Science of Intrusion Detection System Attack Identification” (http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/prodlit/idssa_wp.htm ...
Get Security+ Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.