Some of these books directly address Intrusion Detection and Prevention, while others provide insight into the subtleties of detecting malicious, anomalous, or inappropriate activity.
The fire hose strikes again! My brain hurts! -Dean Farrington, Wells Fargo
The fire hose strikes again! My brain hurts!
Securing Single Points of Compromise (SPoC)By David Belangia
Tactical Data Diodes in Industrial Automation and Control SystemsBy Austin Scott
Accessing the inaccessible: Incident investigation in a world of embedded devicesBy Eric Jodoin
What is a #PenTesting course like with @edskoudis? Watch/Li [...]July 4, 2015 - 3:05 AM
Learn the art of Network #PenTesting & Ethical Hacking f [...]July 4, 2015 - 2:15 AM
Learn to hack/defend MOBILE APPs & DEVICES w/ @joswr1ght [...]July 3, 2015 - 11:55 PM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"This has been a great way to get working knowledge that would have taken years of experience to learn."- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"The amount of knowledge conveyed and technical diving by practical hands-on was well balanced."- Aaron Moore, Maricopa County