By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Download Chapter 18, Tactics for attacking network security monitoring (PDF), from The Tao of Network Security Monitoring: Beyond Intrusion Detection written by Richard Bejtlich and published by Addison-Wesley Professional
The Tao of Network Security Monitoring: Beyond Intrusion Detection
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321246772; Published: 7/14/2004; Copyright 2005; Pages: Final; Edition: 1