Chapter 11. Tying It All Together

Introduction

Congratulations on reaching the final chapter of the book! We hope you have been able to use the examples we’ve presented throughout in your daily battles, securing and monitoring your systems. One of the things that we have been annoyed with in the past is books written by multiple authors ...

Get Network Security Assessment: From Vulnerability to Patch now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.