|
Why We Created This Book's Second EditionThe world of information security is evolving, as attackers develop new tools and techniques, and as defenders create new protective mechanisms. In turn, we have updated this book to ensure that it continues to be a useful resource for those responsible for protecting their organizations' network resources. We have expanded the coverage of perimeter security by adding two brand new chapters: one focusing on intrusion prevention systems, and the other on security of wireless networks. We also carefully went through the book's other chapters, revising them where appropriate to address current threats, to describe advancements in defensive technologies, and to improve the way we explain core concepts. No book is perfect; revising this book has given us the opportunity to come a bit closer to this unattainable goal. |
|