This is an emerging area of work. Someone on this list pointed us to an
interesting article on the subject not long ago:
http://www.sei.cmu.edu/publications/documents/97.reports/97tr013/97tr013chap
04.html
-khm
At 01:11 PM 6/2/99 -0400, [EMAIL PROTECTED] wrote:
>
>It anyone using intruder detection programs out there? Any
>recommendations?
>
>Thanks Tom Cowell
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
*********************************************************************
Kenneth H. Milder
Los Alamos National Laboratory
Computing, Information, and Communications Division
Network Engineering Group(CIC-5)
Network Support Team (NST)/X Division Computing Services Team (XCS)
MS-F605
Los Alamos, New Mexico 87545-0010
Office: (505)667-2552
Fax: (505)665-9387
E-mail: [EMAIL PROTECTED]
*********************************************************************
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]