|
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
“... intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack...”