Reporting Unauthorized Intrusions: A 'How To' Guide
You have spent many hours implementing security on your network. Your firewall is running smoothly, you have installed every service pack and patch available. You could wall paper your office with the audits you have been logging. Yet, despite your best efforts criminal hackers somehow compromise...