O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Describe, Recognize, or Select Good Intrusion Detection Methodologies, Applications, and Disaster Recovery and Forensic Practices

When you connect yourself to an external network, such as the Internet, you open yourself to attack. Even if you practice the best security, there is always a chance that your network will experience an intrusion.

Intrusion Detection Systems (IDS) are becoming a mainstay for companies that want to augment their current security by actively monitoring for intrusions into their network and, in some cases, stopping attacks from occurring. Understanding how the two fundamental types of IDS design can protect your systems and network is essential to selecting the right solution for your needs.

Knowing what you should have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required