Publisher's Synopsis
This text covers everything the reader needs to learn why and how an IDS should be implemented and identify how Snort fits into a security management environment. It also teaches the reader how to deploy Snort on Linux and Windows systems and understand and create Snort detection rules.