August 2000
Intermediate to advanced
800 pages
21h 5m
English
In the past pages, I talked about some of the solutions and technology used to solve the new problem presented by high-speed, full-time connections. At the very least, I hope I have convinced you of the importance of securing your broadband connection, no matter who you are or how insignificant you perceive your data to be. In the next chapter, I discuss how to detect and react to intrusions.