October 2006
Intermediate to advanced
304 pages
5h 47m
English
“In God We Trust, all others we monitor.” | ||
| --Intercept Operator’s motto | ||
Several times in this book, I’ve mentioned the extensibility of ESM. I’ve offered various examples addressing a multitude of security products, network devices, operating systems, applications, databases and telephone systems. Perhaps no category receives as much attention or “cool value” as correlation between physical security devices and logical network devices. Maybe this is because this category has a certain James Bond allure to it. That is, being able to track what somebody is doing in the real world against what he or she is doing in the virtual world does have a certain Hollywood feel. ...