Chapter 5. Firewall and Network Access Protection
If, like me, you were born back when music was recorded in an analogue format on vinyl, you might remember using computers without continuous Internet access or even no network connection at all. As today's network technologies made their way from labs to your living room, people started to see the consequences of unauthenticated access and plain-text communication protocols. It seems like we have been playing an incredibly challenging game of cat and mouse with the ...
Get Windows Server® 2008 Security Resource Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.