PART 3Network Security

CHAPTER 7Securing Network Traffic

Infiltration is a very real problem for network administrators. Every day, new network attacks are developed to try to breach a network's security perimeter. Building a secure network requires that a number of key software and hardware components are implemented and configured correctly. But securing a network is not just about acquiring the right network hardware to block unwanted traffic. What is more important in a discussion about network security is understanding how a network works, how Internet traffic is managed, how information flows within that network, and what services need to be secured that control the traffic. Once these crucial elements are explored, discussing how to ...

Get Foundations of Mac OS X Leopard Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.