CHAPTER 15
Understanding Network Security
In this chapter, you will learn about
• Understanding how encryption works
• Implementing secured tunnel networks
• Configuring high-availability networking
• Understanding single sign-on
• Defending against network attacks
• Encrypting files with GPG
We came up with the standard to allow different CAD systems to communicate.
—Walt Braithwaite, Boeing
Unethical hackers have figured out that a minimal amount of information can yield huge profits, and they will stop at nothing to get it. As a result, ethical hackers must be obsessive about information security.
Network security is focused on protecting valuable electronic information of organizations and users. Therefore, the demand for IT ...
Get CompTIA Linux+ Certification All-in-One Exam Guide, Second Edition (Exam XK0-005), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.