S
Stephen Northcutt
10 works on record
Works

Intrusion signatures and analysis

Inside network perimeter security

Intrusion Detection Shadow Style Step by Step

IT Ethics Handbook

Windows NT Security Step by Step

Disaster Recovery and Business Continuity

SANS Security Essentials with CISSP Cbk

Network intrusion detection

Computer security incident handling
Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems
Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems