August 2008
Intermediate to advanced
528 pages
10h 42m
English
Whether the motivation for a network attack is for monetary gain, revenge, or simply a challenge, it can potentially result in the same outcome if you are not prepared—Denial of Service (DoS). Having a security infrastructure that is well thought out will certainly minimize the impact of an attack.
The FWSM plays a critical role in an overall network security solution, but other devices also should be incorporated within the infrastructure; these include network intrusion prevention systems (IPS), host-based intrusion prevention systems (HIPS), VPN concentrators, screening routers, switches, and so on. The best defense is one that takes a holistic approach to security and leverages the full capabilities ...
Read now
Unlock full access