Discuss topics development on computer security preferences in whitelisting, intrusion detection or user profile risk mapping

Topics development on computer security preferences in whitelisting, intrusion detection or user profile risk mapping