Intrusion Detection and Prevention Systems

Read chapters 4, 5, and 6.