Intrusion Detection using ACID on Linux

At a recent meeting with our IT staff, we were discussing the sometimes overwhelming amount of security required in managing a network and we quickly came to the conclusion that the entire group could devote nearly all of their time to network and system security and never have a shortage of...
By Rusty Scott
September 7, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg