Return to Article Details Detection and prevention of intrusions into computer systems Download Download PDF