Microsoft's Security at Home, http://www.microsoft.com/athome/security/default.mspx Intrusion Detection FAQ, http://www.sans.org/resources/idfaq/ Intrusion Detection Systems FAQ, http://www.windowsecurity.com/articles/Intrusion-Detection-Systems-FAQ.html What You Need to Know About Intrusion Detection Systems, http://www.windowsecurity.com/articles/What_You_Need_to_Know_About_Intrusion_Detection_Systems.html Intrusion Detection Systems (IDS) Part 1, http://www.windowsecurity.com/articles/Intrusion_Detection_Systems_IDS_Part_I__network_intrusions_attack_symptoms_IDS_tasks_and_IDS_architecture.html Intrusion Detection Systems (IDS) Part 2, http://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html Host-Based IDS vs. Network-Based IDS (Part 1), http://www.windowsecurity.com/articles/Hids_vs_Nids_Part1.html Host-Based IDS vs. Network-Based IDS (Part 2), http://www.windowsecurity.com/articles/Hids_vs_Nids_Part2.html Log Analysis, http://www.loganalysis.org/ SecurityFocus, http://www.securityfocus.com/ SANS InfoSec Reading Room, http://www.sans.org/rr/ Windows Security Portal, http://searchwindowssecurity.techtarget.com/ Slashdot Technical News and Information, http://slashdot.org/ NSA Security Configuration Guides, http://www.nsa.gov/snac/ Insecure.org Security Portal, http://www.insecure.org/ Team Cymru, http://www.cymru.com/ Center for Internet Security, http://www.cisecurity.org/ Networking Portal, http://searchnetworking.techtarget.com/ Microsoft Security Home Page, http://www.microsoft.com/security/default.mspx United States Computer Emergency Response Team, http://www.us-cert.gov/ Windows Security Exploit Mailing List, http://www.ntbugtraq.com/ The Register News Portal, http://www.theregister.co.uk/ IP Authentication Header, http://www.faqs.org/rfcs/rfc2402.html IP Encapsulating Security Payload, http://www.faqs.org/rfcs/rfc2406.html |