The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work.