How This Book Is Organized
Although you could read this book cover-to-cover, it is designed to be flexible and enable you to easily move between chapters and sections of chapters to cover only the material you need. If you do intend to read them all, the order in which they are presented is an excellent sequence.
Chapters 1 through 12 cover the following topics:
• Chapter 1, “There Be Hackers Here”: Provides a glimpse into the mind and motivation of the individuals who attack your systems. This chapter covers tools, techniques, and attacks.
• Chapter 2, “Security Policies”: Starts the defense-in-depth concept with the foundation of securing your network, which is the security policy. This chapter goes over roles and responsibilities within your ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access