Chapter 11 of The Tao of Network Security Monitoring: Beyond Intrusion Detection is now available online. Chapter 11 joins foreward, chapter 2, and chapter 10 as being available online as well as the foreward and chapter 2. The chapter discusses “Best Practices,” typically a boring management concept, but I managed to include several packet trace-driven case studies. The Tao Security Blog Volume 4 is published by SearchSecurity.com and Addison-Wesley.com. Back to the page you came from.”]
Source: https://taosecurity.blogspot.com/2004/10/best-practices-chapter-now-online-in.html

