ABSTRACT

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward

chapter 1|6 pages

Introduction

chapter 2|50 pages

Managing Network Security

chapter 3|62 pages

The Network Stack and Security

chapter 4|18 pages

Cryptography and VPN Terminology

chapter 5|10 pages

Application Security Needs

chapter 6|20 pages

Access Control

chapter 7|22 pages

The Public Key Infrastructure

chapter 8|64 pages

Firewalls

chapter 9|22 pages

Intrusion Detection Systems

chapter 10|66 pages

Virtual Private Networks

chapter 11|6 pages

Wireless Network Security

chapter 12|16 pages

Network Penetration Testing

chapter 13|20 pages

Incident Response

chapter 14|6 pages

Disaster Recovery and Continuity Planning

chapter 15|2 pages

Acceptable Use Policies

chapter 16|4 pages

The Final Word