Section C.1. From Chapter 1: Introduction
Section C.2. From Chapter 2: Network Traffic Analysis
Section C.3. From Chapter 4: Know Your Enemy
Section C.4. From Chapter 6: Deploying Snort
Section C.5. From Chapter 7: Creating and Managing Snort Rules
Section C.6. From Chapter 8: Intrusion Prevention
Section C.7. From Chapter 10: Using ACID as a Snort IDS Management Console
Section C.8. From Chapter 12: Additional Tools for Snort IDS Management
Section C.9. From Chapter 13: Strategies for High-Bandwidth Implementations of Snort