Description:This book should have stopped at chapter 4. From the book:Chapter 5 - Networking Hardware & SoftwareChapter 6 - Bridging and SwitchingChapter 7 - RoutersChapter 8 - Wireless EthernetChapter 9 - Security (covers access-lists, anti-spoofing, checkpoint firewalls)Chapter 10 - Managing the NetworkWhy on EARTH is there a chapter on router access-lists, Checkpoint firewalls and proxy servers in a book on Ethernet???