Network and Security

  From the book "Active Defense" by Chris Brenton with Cameron Hunt


bulletvirus etc  Chapter 11 "Viruses, Trojans and Worms: Oh My!"
bulletthe open internet Chapter 4 "Topology Security "
bullet authentication and PKI  Chapter 9 "Authentication and Encryption"
bullet vpn-virtual private network Chapter 10 "Virtual Private Networking"



Chapter 3 "Understanding How Network Systems Communicate" and Chapter 5 " Firewalls" are partly used in "vpn-virtual private network".  Chapter 8 "Intrusion Detection Systems" and Chapter 16 "The Anatomy of an Attack" are partly used in "the open internet". 


By Line Larsen April and May 2004