Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
email this pageEmail this Page
notify me when this section changesWatch for Updates
send us feedbackSend us Feedback
Networking
Hardware
Chapter List
Networking Hardware
Wireless Connections
Networking Lingo
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com
When many people think of big networks they also think “complicated.” This is for good reason, as big networks are undoubtedly complicated. They contain millions of nodes connected by hundreds of thousands of specialized network devices, not to mention a whole lot of copper wire. If someone told you that giant networks, such as the Internet, were simple and manageable beasts that anyone could understand you might second-guess their sanity. It takes an engineering degree and years of experience to even begin to understand the complex issues that major network carriers face.

Networks can become complicated, but the fundamental concepts are actually pretty simple. In fact, powerful and effective network strategies can be created after understanding just a few basic networking tools and concepts.

More Information

The above information is the start of a chapter in "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages