Reporting Unauthorized Intrusions: A 'How To' Guide

You have spent many hours implementing security on your network. Your firewall is running smoothly, you have installed every service pack and patch available. You could wall paper your office with the audits you have been logging. Yet, despite your best efforts criminal hackers somehow compromise...
Melton Roland
July 26, 2001

All papers are copyrighted. No re-posting of papers is permitted