Surviving Security addresses a breadth of security technologies and processes, including policy, encryption, physical security, and maintenance, while continually answering the following questions that are critical to network administrators and managers:Why is this technology/practice important to a security infrastructure?How does this fit into the larger security layer model?What different options-technology and vendor-are available for this area (vendor-specific reviews will be placed primarily on the companion web site) and what is the cost of implementing these options?