Chapter 9. Computer Security Technology
After reading this chapter and completing the exercises, you will be able to do the following:
Evaluate the effectiveness of a scanner based on how it works
Choose the best type of firewall for a given organization
Understand antispyware methods
Employ intrusion detection systems to detect ...