This book provides an introduction to the field of Intrusion
Prevention and provides detailed information on various IPS methods
and technologies. Specific methods are covered in depth, including
both network and host IPS and response technologies such as port
deactivation, firewall/router network layer ACL modification,
session sniping, outright application layer data modification,
system call interception, and application shims.
* Corporate spending... more...