click to print
to the Book

This book is both a reference guide and something that can be read end-to-end. It has been designed to provide decision makers with essential knowledge about information security concepts and technologies. After reading this book, will you be able to run out and implement a specific solution based on instructions contained within these pages? No. Will you know where any one technology fits within the framework of securing your business? Definitely. Will you feel comfortable discussing the technology in a business capacity? Absolutely.

Here is some advice to help you take full advantage of the experience:

Use the Website: Designed as a companion to the book, the website has loads of additional information. The structure of the site mirrors that of the book. There are additional chapters posted on the site that did not make it into the book. For each chapter, in the book and on the site, you’ll find links to additional resources including security articles, whitepapers and websites. You’ll also find corrections and clarifications. Finally, topic specific forums allow readers and community members to discuss security concepts, best practices and issues in an intuitive, organized manner. See

Use the Map: The book and the map are designed to be symbiotic. When used together, the reader can gain powerful insight about security technologies in a relative short period of time. The map contains a large number of icons that have been strategically placed within a simulated business environment. All of the icons refer to technologies covered in the book. Corresponding chapters within the book are labeled with these icons. For example, on the fold out map, a tank icon is used to represent a virtual private network. The tank is located on the title page for the chapter on virtual private networks, and in the upper right margin of subsequent pages. This makes it easy to reference information about concepts on the map by just flipping through the book and looking for the appropriate icon.

Make the Connections: Many topics covered in this book have strong connections with one another. While reading a chapter, be sure to check out the "Making the Connection" section. The references provided will lead directly to concepts that surround the current chapter and give your tremendous insight to related technologies.

Read the Rest of this Introduction: We know; you want to jump right in and get your security-groove on. Resist the temptation for a few more minutes and finish up the introduction. We promise not to let it drag on and on (we ramble often enough later on in the book). You will get a lot more out of the book by understanding how content is organized and why we bothered to write this book in the first place.

Drop us a line: We may not be able to answer every question, but we’ll try. Frequent questions and their answers will get posted to the website, so check there first.