Ebook OSSEC host-based intrusion detection guide: Part 2 includes contents: Chapter 5: system integrity check and rootkit detection, chapter 6: active response, chapter 7: using the OSSEC web user interface, appendix a: log data mining, appendix b: implementing a successful OSSEC policy, appendix c: rootkit detection using host-based IDS, Appendix D: The OSSEC VMware Guest Image. |