HostedDB - Dedicated UNIX Servers

Internet Security Professional Reference:Introduction
Table of Contents


You should find Internet Security Professional Reference, Second Edition to be a valuable tool in protecting your Internet connection from hackers, thieves, and mishaps. It is a comprehensive book, containing all the information a private person, a small business, or a large business would need to prevent security breaches. If you are a security professional, or anyone involved in consulting on, administering, or providing Internet and network services, you need this book, and will find it extremely helpful.

It covers everything from specific technologies to specific strategies, as well as business decisions involved in securing an Internet connection. The authors get into the minds of hackers and beat them at their own game. If you want a secure network connection to the Internet, you want this book.

How This Book is Organized

This book is organized into five different parts.

Part I, Managing Internet Security, covers topics that are important to understand as you plan and implement a network connection. With chapters on TCP/IP, UUCP, daemons, and audit trails, Part I will completely prepare you to tackle the issues involving specific security strategies.

Part II, Gaining Access and Securing the Gateway, is the next, and perhaps the most important step. If your gateway isn’t secure, nothing is. This section deals with spoofing, sniffing, and the ever-important firewall. It also covers SATAN and Kerberos, so after reading the chapters in Part II, you’ll know everything you need to know regarding a secure gateway.

Part III, Messaging: Creating a Secure Channel, gets to the heart of the matter. If hackers manage to get past the foundation of your security, you can still protect the message itself. With detailed coverage of encryption techniques and PGP, you’ll have a complete understanding of how to utilize encryption for maximum results.

Part IV, Modern Concerns, finishes off the book with in-depth discussions of how modern technologies can affect security and how to implement in the most secure fashion possible. You will read about Java security, Windows NT security, CGI security, and viruses.

Part V, Appendices, holds appendices A and B, which you will find useful when looking for Security information, resources and references.

New Riders Publishing

The staff of New Riders Publishing is committed to bringing you the very best in computer reference material. Each New Riders book is the result of months of work by authors and staff who research and refine the information contained within its covers.

As part of this commitment to you, New Riders invites your input. Please let us know if you enjoy this book, if you have trouble with the information and examples presented, or if you have a suggestion for the next edition.

Please note, however: New Riders staff cannot serve as a technical resource for Internet security or for questions about software- or hardware-related problems. Please refer to the documentation that accompanies your software or to the applications’ Help systems.

If you have a question or comment about any New Riders book, there are several ways to contact New Riders Publishing. We will respond to as many readers as we can. Your name, address, or phone number will never become part of a mailing list or be used for any purpose other than to help us continue to bring you the best books possible.

You can write us at the following address:

New Riders Publishing
Attn: Publisher
201 W. 103rd Street
Indianapolis, IN 46290

If you prefer, you can fax New Riders Publishing at:


You can also send electronic mail to New Riders at the following Internet address:

New Riders Publishing is an imprint of Macmillan Computer Publishing. To obtain a catalog or information, or to purchase any Macmillan Computer Publishing book, call 800-428-5331 or visit our Web site at

Thank you for selecting Internet Security Professional Reference, Second Edition!

Table of Contents