Greetings,

Would anyone kindly point me to some resources, either on-line or book 
form, that detail the creation of an effective security policy.  I have 
found several resources for creating usage policies and now I need to 
concentrate on our security policy.  It is my understanding that it is this 
policy that is used when creating firewall, IDS, etc rules.

Thanks in advance,
- Bennett

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to