Some of these books directly address Intrusion Detection and Prevention, while others provide insight into the subtleties of detecting malicious, anomalous, or inappropriate activity.
Excellent, relevant, immediately useful information. I can't wait to get back to the office to try it out. -Steve Zehl, USGS
Excellent, relevant, immediately useful information. I can't wait to get back to the office to try it out.
Application White-listing with Bit9 ParityBy Mike Weeks
Data Center Server Security Survey 2014By Jacob Williams
The Best Defenses Against Zero-day Exploits for Various-sized OrganizationsBy David Hammarberg
When cyberspace isn't working there's always a physical pene [...]October 31, 2014 - 7:05 PM
Breaches of corporate data are SCARY!! Add more security wit [...]October 31, 2014 - 3:20 PM
Join @john_pescatore on 11/13 for Protecting DNS: Securing Y [...]October 31, 2014 - 2:35 PM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"The amount of knowledge conveyed and technical diving by practical hands-on was well balanced."- Aaron Moore, Maricopa County
"The perfect balance of theory and hands-on experience."- James D. Perry II, University of Tennessee
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."- Mark Austin, PHH Mortgage