Host Intrusion Detection System Administrator's Guide Release 3.1

Chapter 2
17
2 Configuration