Extrusion Detection: Security Monitoring for Internal Intrusions

Today’s most devastating security attacks are launched from within the company, by intruders who have compromised your users’ Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won’t solve this problem. You must systematically protect client software and monitor the traffic it generates


Addison-Wesley Professional

This entry was posted in Networks. Bookmark the permalink.