Explains the techniques and processes used to build and maintain a secure network, and provides examples of how companies have used these principles to protect themselves without closing the door on... This description may be from another edition of this product.