Gives an overview of the guidance given in the five parts of ISO/IEC 18028, but also goes deeper into real world issues that are of concern to todays organizations and communities. It looks at how to identify network security risks and the related technical aspects and security controls, and explains how to ensure that correct network technical security architecture is put in place. Areas covered include: local and wide area networking, wireless networking, remote access, IP convergence, and routed access to third-party organizations among others.