Priorities in the deployment of network intrusion detection systems

RELATED TOPICS

Helsinki University of Technology – This master's thesis examines many of the factors that go into the architecture decisions in building an IDS. Look to section 3.1 for an in-depth discussion of the merits of using legacy hardware and free software for this purpose. (Thesis is in PDF format.)

continue -->

RELATED TOPICS
Morale boosters: 5 proven ways to motivate your IT team
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies