• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 16. A NETWORK SECURITY PRIMER

In this chapter

  • Protecting your network from attack

  • Understanding user accounts

  • Working with resource permissions

  • Using groups to control resource access

  • Protecting against computer viruses

  • Understanding worms and Trojan horses

  • Becoming familiar with the types of outside network attacks

  • Understanding IPSec

  • Working with firewalls

I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image.

Stephen Hawking


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint