This guide begins with a review of potential security threats, considering each element of a security policy, including who will be responsible for implementing it, and the role of firewalls. It... This description may be from another edition of this product.