Summary and Info
In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare, Windows and Unix environments, they describe how networks operate, and the authors discuss network cables, protocols, routers, bridges, hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls, Cisco router configuration settings, intrusion detection systems, authentication and encryption software, Virtual Private Networks (VPNs), viruses, trojans and worms.