October 2015
Intermediate to advanced
432 pages
9h 55m
English
Get ready to hyper-focus while we dig deep into the IPS policy during this short but vital chapter. In it, you’re going to learn all about this integral topic as well as a key list of the rules and settings we use in concert with it, which can be used to enable, disable, or modify the intrusion prevention system to target the exact types of malicious traffic you want it to look for on the network.
During our exploration of ...