CONTENTS:- Preface; Security Overview; Security Architecture; Attackers and Vulnerabilities; Workstation Security; Server Security; Virtual Private Networks; firewells; Vulnerability Assessment; Intrusion detection; Incident response; Network security for trade shows; NFS; FTP security introduction; IP traffic processing; Internet Protocol; IP address and classes; Network Scanning techniques; Performance issues; Future of computer system security;
Computer and network security are challenging topics among executives and managers of computer corporations. Even discussing security policies may seem to create a potential liability. As a result, enterprise management teams are often not aware of the many advances and innovations in internet and intranet security technology. Without this knowledge, corporations are not able to take full advantage of the benefits and capabilities of the network, Together, network security and a well-implemented security policy can provide a highly secure solution. Employees can then confidently use secure data transmission channels and reduce or eliminate less secure methods, such as photocopying proprietary information, sending purchase orders and other sensitive financial information by fax, and placing orders by phone.