This book provides a thorough inroduction to network security. This portable desk reference focuses on the overall security processes based on security policy with an emphasis in the areas of secure perimeter, secure connectivity, security management, identity services and intrusion detection. It also includes security appendixes that cover several installation tutorials for various hardware and software products.