O'Reilly logo

Network Security Architectures by Sean Convery

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Network Security Technologies

 

Technology . . . is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other.

 
 --C. P. Snow, New York Times, March 15, 1971
 

L0pht, making the theoretical practical since 1992.

 
 --L0pht Heavy Industries

Chapter 3 discussed secure networking threats. This chapter focuses on the broad technologies that can mitigate those threats. The technologies discussed here can be considered foundation technologies for network security and include firewalls, intrusion detection systems (IDS), identity systems, and encryption.

This chapter follows the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required