Talks about one of the basics, but powerful methods of Intrusion Detection: Firewall’s
Log analysis and the use of the OsHids tool to monitor your logs.
This text is in pdf format. To
view it click here.
images, content & text (unless other ownership applies) are © copyrighted