Overview of Some Windows and Linux Intrusion Detection Tools
Description of book