Details how intrusion detection works in network security with
comparisons to traditional methods such as firewalls and
cryptography
Analyzes the challenges in interpreting and correlating
Intrusion Detection alerts
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!