Chapter 11. Tying It All Together
Introduction
Congratulations on reaching the final chapter of the book! We hope you have been able to use the examples we’ve presented throughout in your daily battles, securing and monitoring your systems. One of the things that we have been annoyed with in the past is books written by multiple authors ...
Get Network Security Assessment: From Vulnerability to Patch now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.