Some of these books directly address Intrusion Detection and Prevention, while others provide insight into the subtleties of detecting malicious, anomalous, or inappropriate activity.
The information presented is priceless! -Nehal Parmar, North Fork Bank
The information presented is priceless!
Securing Single Points of Compromise (SPoC)By David Belangia
Tactical Data Diodes in Industrial Automation and Control SystemsBy Austin Scott
Accessing the inaccessible: Incident investigation in a world of embedded devicesBy Eric Jodoin
STUDENT REVIEW: Learn what a recent student thought of our m [...]July 1, 2015 - 10:35 PM
30+ SANS Online courses come with a MacBook Air, Toshiba Por [...]July 1, 2015 - 3:55 PM
10 Biggest Mistakes in Implementing Continuous Monitoring we [...]July 1, 2015 - 1:30 PM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health & Security
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."- Mark Austin, PHH Mortgage
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"- Jerry Robles de Medina, Godo CU