CAn anyone provide guide/reference/link for Deploting IDS in an enterprise network including Deployment guideline in Data centre as well as in Extranet and remote Locations.
Your best bet would be read SANS documentation. One excellent book is Inside Network Perimeter Security by Stephen Northcutt.
Getting Started
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: