PART 3Network Security

CHAPTER 7Securing Network Traffic

Infiltration is a very real problem for network administrators. Every day, new network attacks are developed to try to breach a network's security perimeter. Building a secure network requires that a number of key software and hardware components are implemented and configured correctly. But securing a network is not just about acquiring the right network hardware to block unwanted traffic. What is more important in a discussion about network security is understanding how a network works, how Internet traffic is managed, how information flows within that network, and what services need to be secured that control the traffic. Once these crucial elements are explored, discussing how to ...

Get Foundations of Mac OS X Leopard Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.