Snort IDS/IPS Basics
Section 4.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : THE CURIOUS MR. X.
A Look At The Unidentified Half of Netflow (With an Additional Tutorial On How to Use The Internet2 Netflow Data Archives) ESCC/Internet2 Joint Techs Workshop.
Limb from Limb: Taking on the Giant (or for those who like boring titles – Anatomy of an Attack)
Case study : The curious mr. x
MIT 17-1 (Feb. 2013)