Publisher's Synopsis
With computer security such a high priority in business, the solution is no longer expected to come from specific assigned technicians in a company. This book provides cost-effective, time-saving guidance to building customized network security tools using existing components.