This chapter covers the following topics:
Technology . . . is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other.
|--C. P. Snow, New York Times, March 15, 1971|
L0pht, making the theoretical practical since 1992.
|--L0pht Heavy Industries|
Chapter 3 discussed secure networking threats. This chapter focuses on the broad technologies that can mitigate those threats. The technologies discussed here can be considered foundation technologies for network security and include firewalls, intrusion detection systems (IDS), identity systems, and encryption.
This chapter follows the ...