Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system. * Author provides the benefit of his day-to-day practices as a security... This description may be from another edition of this product.