[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <828af05c0701040801g40beee1cu453c55ed29bc5a34@mail.gmail.com>
Date: Thu, 4 Jan 2007 23:01:42 +0700
From: "Fajar Edisya Putera" <fajarep@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: [OOT] Intrusion Prevention System Impelementation
Methodology
Hello All,
I'm trying to find methodology for implementing intrusion prevention system
in my report. I'm reading about an improvement for system development life
cycle for information security. But it's really complicated for just a guide
how to implement intrusion prevention. Maybe someone willing here can't help
me? I'm really frustated here...
Thanks
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists