This chapter covers the concept of intrusion detection and the tools that are available for deploying an IDS in a network. The chapter prepares Netadmins to secure the network by the following means:
Table 9-6 lists all the tools discussed in this chapter for deploying IDSs.
|