ABSTRACT

With the exception of Chapter 7, we have ignored most of the network aspects. In fact, until we began the standup of our enterprise environment, we did not realize just how intrusive some of the devices can be. Much of this was published as recently as 2014 [121] and 2015 [122].