ABSTRACT

The security of your organization is going to live or die according to the security of your applications. This is true regardless of whether your application is a firewall, VPN gateway, file server, or network printer. Due to the enormous variety of applications and security configurations, this is not a book that can offer configurations on all possible configurations, but we can hit on some of the highest risk areas.