O'Reilly logo

Cisco Networking Simplified by Jim Doherty, Paul Della Maggiora

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter . Firewall and IDS

Protecting the Perimeter

Businesses and home users are moving more of their network activities to the Internet. At a minimum, most users have a dialup connection to the Internet, but broadband technologies such as DSL and cable modems enable users to watch online movies, purchase items online, exchange digital photos, download software, and listen to online music over the Internet.

With more home computers and business networks connecting to the Internet, there is considerably more opportunity for malicious attacks from hackers and saboteurs. The same danger applies to internal corporate networks in that companies must protect their data centers and computing resources from internal and external attack.

News stories are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required