9 Intrusion Detection and Response
10 Intrusion Detection Tools
11 Network Monitoring and Attack Detection
12 Filesystem Integrity
13 Kernel Enhancements