Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
email this pageEmail this Page
notify me when this section changesWatch for Updates
send us feedbackSend us Feedback
Samples from
the Book
More Info
  • How The Book is Organized
  • Why We Wrote The Book
  • Samples from the Book
  • Summary of Errata
  • Summary of FAQs
  • News
    Buy The Book
    at amazon.com

    Not sure if you want the book yet? Perhaps you'd like to read a few chapters first? Well, here ya go. By following the links below you can download pdf versions of four chapters from the book.

    Introduction to Determining Identity (pdf): It’s not enough to have a secure connection between two machines. You also need to be sure that the person or computer you’re connected to is who it claims to be. This part discusses the pros and cons of the many available identification systems as well as ideal technology combinations.

    Biometrics (pdf): Biometrics technologies measure a particular set of a person’s vital statistics in order to determine identity.

    Firewalls (pdf): Firewalls are devices that can restrict information traveling in and out of a network.

    File Integrity (pdf): File integrity tools can detect unauthorized modifications to critical system files and data.