Network and Security From the book "Active Defense" by Chris Brenton with Cameron Hunt
Chapter 3 "Understanding How Network Systems Communicate" and Chapter 5 " Firewalls" are partly used in "vpn-virtual private network". Chapter 8 "Intrusion Detection Systems" and Chapter 16 "The Anatomy of an Attack" are partly used in "the open internet".
|
By Line Larsen April and May 2004