A What Is The Major Attraction Of A Hids B

a) What is the major attraction of a HIDS?
b) What are the two weaknesses of host IDSs?
c) List some things at which host operating system monitors look?

Posted in Uncategorized