Some of these books directly address Intrusion Detection and Prevention, while others provide insight into the subtleties of detecting malicious, anomalous, or inappropriate activity.
After 9 years of doing forensics work and 14 seminars/conferences on computer forensics, this is proving to be the best. -Frank Grindstaff, Home Depot
After 9 years of doing forensics work and 14 seminars/conferences on computer forensics, this is proving to be the best.
Getting Started with the Internet Storm Center WebhoneypotBy Mason Pokladnik
SOHO Remote Access VPN. Easy as Pie, Raspberry Pi...By Eric Jodoin
Predicting Control Attributes With Bayesian NetworksBy Dan Lyon
Last day for #SANSSecEast Early Bird Discount of $250. Jumps [...]December 11, 2013 - 2:03 PM
Infographic from @Egnyte on #BYOD http://t.co/1h3pfnWQE7. At [...]December 11, 2013 - 1:56 PM
New Blog Post: DFIRCON APT Malware and Memory Challenge #DFI [...]December 11, 2013 - 2:24 AM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"This has been a great way to get working knowledge that would have taken years of experience to learn."- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."- Mark Austin, PHH Mortgage