(nezbytná registrace)
Kapitola 8 s názvem: Monitoring and intrusion detection.
Z obsahu:
- Designing for detection
- Defensive monitoring considerations
- Intrusion detection strategies
- Conducting vulnerability assessments
- Incident response and handling
- Conducting site surveys for rogue access points