tag:blogger.com,1999:blog-8749669686378857359.post4217346685298509940..comments2022-11-22T22:57:48.462-05:00Comments on Writings of Matthew Molyett: Getting Started on Intrusion DetectionMatthew Molyetthttp://www.blogger.com/profile/17095083915652426852noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8749669686378857359.post-47713425967051092802013-09-19T20:29:32.348-04:002013-09-19T20:29:32.348-04:00Oh great, make the initial question even more ambi...Oh great, make the initial question even more ambiguous!<br /><br />Yep. I think that book has been used for all three classes so far.Matthew Molyetthttps://www.blogger.com/profile/17095083915652426852noreply@blogger.comtag:blogger.com,1999:blog-8749669686378857359.post-44327762278420991812013-09-19T10:54:59.283-04:002013-09-19T10:54:59.283-04:00My first question would be, what do you want to pr...My first question would be, what do you want to protect? The two prevailing theories are network defense and data defense with the latter being more more attainable and effective.<br /><br />Also, that text book is familiar to me. Are you pursuing a degree with UMUC?Anonymoushttps://www.blogger.com/profile/17205402015315475177noreply@blogger.com