This text presents practical examples which aim to show the reader how to identify and defend themself against real security threats. It includes information on how to inoculate networks against viruses; secure data against theft and corruption; protect equipment from theft and malicious dnst fire, flood and lightning. It also includes special coverage of Internet- and Intranet-related issues.