FAQ on implementing a Network Based IDS in a heavily switched environment.
cc66b70318c7efd394059454a0d70109b701ba98a36ee39ee4fb3c3150644b34
Text about different kinds of security holes - Physical Security Holes, Software Security Holes, and Incompatible Usage Security Holes.
ea7014edaa765d66b377462bb46afe771b4fba2e580da3722e971eaa2ea6c0ff