How This Book Is Organized
Although you could read this book cover-to-cover, it is designed to be flexible and allow you to easily move between chapters and sections of chapters to cover only the material you need. If you do intend to read them all, the order in which they are presented is an excellent sequence.
• Chapter 1, “Here There Be Hackers!”—This chapter provides a glimpse into the mind and motivation of the individuals who are attacking your systems. This chapter covers tools, techniques, and attacks.
• Chapter 2, “Security Policies and Responses”—This chapter starts the layered defense concept with the foundation of securing your network, which is the security policy being discussed. ...