Intrusion Detection Systems
Introduction into Intrusion Detection Systems (IDS)
Table of Contents
Part 1 - Introduction
Part 2 - Policy and Signatures
Part 3 - Program design structure diagrams
Part 4 - Detailed analysis of functions and procedures
Part 5 - Alternative approach - heuristics
Part 6 - Appendix - The Code