Intrusion Detection and Prevention Systems

Read this publication up to the end of Chapter 3.