HostedDB - Dedicated UNIX Servers

-->
Internet Security Professional Reference:About the Authors
Table of Contents


About the Authors

Derek Atkins, Paul Buis, Chris Hare, Robert Kelley, Carey Nachenberg, Anthony B. Nelson, Paul Phillips, and Tim Ritchey were authors of the first edition of this book. Tim Meyers, Tim Petru, Tom Sheldon, Joel Snyder, and Wes Vos were responsible for updating, rewriting, and adding new material.

Tim Meyers is a senior software engineer at Novell, Inc. He is currently the team leader in charge of the Class C2 evaluation of NetWare against the Trusted Network Interpretation (TNI) of the Trusted Computer System Evaluation Criteria (TCSEC). Mr. Myers graduated from Brigham Young University with a B.S. degree in Computer Science. His home is the great state of Utah where his family has never found a good reason to leave.

Tom Sheldon is no stranger to the computer industry. During his college days, he sold Hewlett-Packard programmable calculators and wrote programs for fellow students. That touched off an interest in computers that eventually led him into the computer business full-time. In the early 1980s, Tom operated several ComputerLand stores on the West coast where he got involved with some of the earliest “experiments” in PC networking. During that time, he set up some of the first Ethernet and token ring networks for PCs and participated in the initial testing and evalution of those then-emerging products. He has designed and built networks for a variety of businesses, government agencies, and schools. Tom started his writing career in 1982 with a series of articles for PC World magazine. That led to a book contract and eventually 28 books on a variety of topics including Windows, networks, and computer security. Many readers know Tom for his series of educational videotapes. Tom holds a number of industry certifications and stays active in the industry through the requisite trade shows, seminars, and occasional consulting. He operates a computer lab with racks of networked systems that are used in his work as a software tester for Microsoft, Novell, and other vendors. Tom lives with his family on the Big Sur coast of California. His other interests are biking, kayaking, tropical locations, and the new physics.

Joel Snyder is a senior partner with Opus One, a consulting firm in Tucson, Arizona. He spends most of his time on the road helping people build larger, faster, better, and more reliable networks. His professional travels have taken him from San Francisco to St. Petersburg, where he always carries his trusty Macintosh and modem, neither of which have cute names.

Joel has been working with networks since 1980, when he signed on with CompuServe Research and Development, and has been a member of the ISO and ITU committees that write network standards for over a decade. He has authored several books and over 100 articles for technical publications and has been a network consultant since 1984. He has helped over 150 companies (many of which you’ve heard of) with their networking, e-mail, and security problems. At home, his fourteen-node Ethernet network has run almost any protocol you can think of—except SNA and token ring, mostly for religious reasons.

Snyder’s baccalaureate degree is in Latin, and his Ph.D. is in Management Information Systems. His dissertation is on computer networks in the former Soviet Union. Almost everything he wrote in graduate school is now classified and he’s not allowed to read it anymore, which is good because it wasn’t very interesting to begin with. His favorite color Crayola crayon is Burnt Sienna.

Joel lives and works in Tucson with Jan Trumbo and their cat, Romeo Y Julieta, who is the only feline in the Internet Network Information Center’s databases to be listed as an administrative point of contact for an Internet domain.

Wes Vos has been employed in the computer industry since 1991, and is currently employed as a software engineer at Novell, Inc. During that time he has been involved in training, technical support, testing, and software engineering. Wes has also had the opportunity to present security-related sessions at several of Novell’s technical conferences.

Trademark Acknowledgments

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. New Riders Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.


Table of Contents