December 2021
Beginner
550 pages
20h 48m
English
Every organization should deploy a defense-in-depth approach in critical areas of its network as an early warning system. One of the integral components of that approach is intrusion detection tools, of which there are various implementations, each one having features that provide unique capabilities to protect networks and hosts from malicious activity.
A layered defense-in-depth approach would suggest deploying both network- and host-based intrusion detection as well as deploying products that permit both signature- and anomaly-based detection schemes.
Today, most computer users employ some form of virus protection to detect and prevent infection, whereas many mobile device ...