Intrusion Detection In-Depth: Compliance, Security, Forensics and Troubleshooting