Part 5: Protecting Your Computer

Part 5: Protecting Your Computer

Chapter 18: Firewalls, Intrusion-Detection Systems, and Honeypots
Chapter 19: Computer Forensics-Recovering and Deleting Data
Chapter 20: Protecting Your Computer