19 Maintaining a Security Perimeter
20 Network Log Analysis
21 Troubleshooting Defense Components
22 Assessment Techniques
23 Design Under Fire
24 A Unified Security Perimeter: The Importance of Defense in Depth