O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Online Material

1. The Apache Software Foundation (http://www.apache.org).

2. CERT Coordination Center. “Identifying tools that aid in detecting signs of intrusion” (http://www.cert.org/security-improvement/implementations/i042.07.html).

3. List of intrusions detected by Network ICE (http://www.iss.net/security_center/advice/Intrusions/default.htm).

4. Microsoft Security and Privacy Web site (http://www.microsoft.com/security).

5. Network Security Library. “Network- vs. Host-based Intrusion Detection” (http://secinf.net/info/ids/nvh_ids/).

6. SANs Institute “What Is a Honeypot?” (http://www.sans.org/newlook/resources/IDFAQ/honeypot3.htm).

7. “The Science of Intrusion Detection System Attack Identification” (http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/prodlit/idssa_wp.htm ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required