Priorities in the deployment of network intrusion detection systems

RELATED TOPICS

Helsinki University of Technology – This master's thesis examines many of the factors that go into the architecture decisions in building an IDS. Look to section 3.1 for an in-depth discussion of the merits of using legacy hardware and free software for this purpose. (Thesis is in PDF format.)

continue -->

RELATED TOPICS
ITWorld DealPost: The best in tech deals and discounts.