Implementing Intrusion Detection Systems (A Hands-On Guide for Securing the Network)