Host Intrusion Detection System Administrator's Guide Release 3.0

Chapter 2
17
2 Configuration