Introduction

This book was written to address the need for increased understanding of network security. Many texts are available on the subject, and they have value. However, many people and companies are now considering increasing their network security. Where do you start? Perhaps you want to deploy wireless and you need to ensure that it is secure. What single resource can provide you with a good overview of wireless security or firewalls, and so on? This book provides you with enough security information that you can leverage your newfound knowledge for your own benefit and for the benefit of your organization.

I approached this book from the standpoint that every reader needs security, but does not really understand the risks, techniques, and possibilities that are available. Thus, each chapter addresses a specific aspect of an overall layered security model and allows you to see and understand why security for each area is needed, what you should consider, and how you should proceed.

Goals and Methods

The goal of this book is provide a resource for every person concerned with security. Readers do not have to be networking professionals or CIOs to benefit from this book, although they can as well. It is my hope that all readers, from students to professionals, all readers will benefit from this book.

My method was to take each component of the network and verify how it can be deployed securely. When complex security technologies or concepts are encountered, they are explained with real-world examples and practical analogies. This book covers serious topics, but it should also be fun and easy to read. I have endeavored to meet this goal.

Who Should Read This Book?

This book was written with a broad audience in mind. Consider students who are hearing all about the importance of network security and considering focusing on this area. This book helps them by providing an understanding of all the major components of securing a network. Perhaps you are a networking professional with in-depth expertise in routing and switching, and now you have been asked to deploy wireless (securely). This book provides a solid foundation upon which to explore the subject matter in more depth, while understanding the different components necessary for accomplishing your goals. You might even be a CIO who has been tasked with determining whether you should invest in an Intrusion Detection System (IDS). Perhaps you need to understand why they are needed, how they work, and when/where to use them.

Regardless of your expertise or role in the IT industry, this book has a place for you; it takes concepts and simplifies them to give you a solid foundation of understanding. What you do with that knowledge is up to you. This book might give you what you need, or it might be the first step in your journey.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.146.152