This book walks the reader through a security audit and the process of developing an effective security policy. While some of the author's advice in this area may seem like common sense, it's helpful to have the many related issues summarized. Then, on the theory that it's easier to secure territory you know well, Brenton provides an overview of internetworking technologies--notably, Virtual Private Networks (VPNs)--and their inherent security characteristics.
Mastering Network Security shows how to implement security measures--including logging, encryption, and packet filtering--on your existing network infrastructure. (He provides specifics for Unix, Windows NT, Cisco IOS, and NetWare). The author also writes at length about supplementary security measures such as firewalls (especially Firewall-1), intrusion detection systems (focusing on RealSecure), and RAID data redundancy (with emphasis on OctopusHA+). --David Wall