Priorities in the deployment of network intrusion detection systems


Helsinki University of Technology – This master's thesis examines many of the factors that go into the architecture decisions in building an IDS. Look to section 3.1 for an in-depth discussion of the merits of using legacy hardware and free software for this purpose. (Thesis is in PDF format.)

continue -->

Free Course: JavaScript: The Good Parts
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies