Detailed coverage of the incident response procedures goes beyond the framework of this book, which is dedicated to intrusion detection technologies and systems that implement such technologies. More detailed information on this topic is provided in [Navy1-96], [Northcutt1-96], [NRL1-95], [Wack1-91], [Smith1-94], [Chen1-00], [Chen1-95], [Longstaff1-93], and [Brownlee1-96].