In This Chapter
Computer security is a process, not a product. The process is constant, and not following it can prove disastrous. Generally speaking, the security process goes something like this:
After configuring your system as securely as possible with help from resources discussed in this chapter, you, or some other party, discover a vulnerability.
An exploit for that vulnerability becomes public knowledge.
Your system's vendor responds, typically with a patch or upgrade.
By staying on top of alerts posted by vendors and security organizations, you learn ...