Ch. 1. Presenting the business case for free solutions -- Ch. 2. Protecting your perimeter -- Ch. 3. Protecting network resources -- Ch. 4. Configuring an intrusion detection system -- Ch. 5. Managing event logs -- Ch. 6. Testing and auditing your systems -- Ch. 7. Network reporting and troubleshooting -- Ch. 8. Security as an ongoing process