Chapter 1. Overview of Network Security Technologies
This chapter covers the following topics:
• Virtual Private Networks (VPN)
• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
• Authentication, Authorization, and Accounting (AAA) and Identity Management
• Routing Mechanisms as Security Tools
Technology can be considered your best friend. Nowadays, you can do almost everything over networked systems or the Internet—from simple tasks, such as booking a flight reservation, to a multibillion dollar wire transfer between two large financial organizations. You cannot take security for granted! An attacker can steal credit card information from your online ...
Get End-to-End Network Security: Defense-in-Depth now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.