Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book


This chapter concludes the theoretical discussions of NSM. Without this background, it may be difficult to understand why NSM practitioners look at the world differently than traditional IDS users do. From here we turn to technical matters like gaining physical access to network traffic and making sense of the data we collect.

  • + Share This
  • 🔖 Save To Your Account