Intrusion Detection Systems and Network Security
One person’s “paranoia” is another person’s “engineering redundancy.”
—MARCUS J. RANUM
In this chapter, you will learn how to
Apply the appropriate network tools to facilitate network security
Determine the appropriate use of tools to facilitate network security
Apply host-based security ...
Get Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.