IBM Smarter Business 2012 - IBM Security: Threat landscape
Addressing the full attack continuum new security model white paper
Acs
Topic 1. At the end of the lesson, the students are able to: explain different terminologies used in IDS make comparisons between different types.