6 The Role of a Router
7 Virtual Private Networks
8 Network Intrusion Detection
9 Host Hardening
10 Host Defense Components
11 Intrusion Prevention Systems