Evaluating Network Intrusion Detection Signatures

Karen Kent: Evaluating Network Intrusion Detection Signatures:
[Part 1]
[Part 2]
[Part 3]
(via Bruce Schneier’s crypto-gram)

Leave a Reply