Chapter 1. Network Security Overview
Weaknesses and Vulnerabilities
Responsibilities for Network Security
Chapter 2. Understanding VulnerabilitiesThe Need for Security
Chapter 3. Understanding Defenses
Cryptography versus Cryptanalysis
Importance of a Security Policy
Part III. Tools and Techniques
Router Security to Protect the Network
Case Study: Placing Filtering Routers and Firewalls
Chapter 10. Intrusion Detection System Concepts
Introduction to Intrusion Detection
IDS Management CommunicationsMonitoring the Network
Case Study: Deployment of IDS Sensors in the Organization and Their Typical Placement
Case Study: Configuring Secure Remote Access
Chapter 12. Virtual Private Networks
Generic Routing Encapsulation Tunnels
Chapter 13. Public Key Infrastructure
Case Study: Creating Your Own CA
SAFE WLAN Design Techniques and Considerations
Case Study: Adding Wireless Solutions to a Secure Network
Chapter 15. Logging and Auditing
Simple Network Management Protocol
Introduction to the SAFE Blueprint
SAFE Blueprint: Overview of the Architecture
Is It a Policy, a Standard, or a Guideline?