Chapter 7. Network Security Platform Options and Best Deployment Practices
This chapter covers the following topics:
• Network Security Platform Options
• Network Security Device Best Practices
But lo! men have become the tools of their tools. —Henry David Thoreau, “Economy,” Walden, 1854
All of the books in the world contain no more information than is broadcast as video in a single large American city in a single year. Not all bits have equal value. —Carl Sagan
When preparing to deploy security technology, many decisions must be made. Two of the main ones are deciding which kinds of devices should be deployed and where they should be deployed. This chapter covers these two topics in detail. First you will learn the different platforms on which ...
Get Network Security Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.