CHAPTER 21
Network Endpoint Security
21.2 Intrusion Detection Systems
Approaches to Intrusion Detection
Host-Based Intrusion Detection Techniques
Network-Based Intrusion Detection Systems
21.4 Distributed Denial of Service Attacks
Constructing the Attack Network
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Explain the role of firewalls as part of a computer and network security strategy.
- ◆ List the key characteristics of firewalls.
- ◆ Understand the relative merits ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.