(The content of the document describes the solutions of the underlying network security, including the security solutions of windows, linux and network devices. Three mind maps are used to introduce each, to ensure that it affects your mind.
Network Bottom Security Solutions.doc)