Acknowledgments

   

The authors wish to thank the people who contributed to this project.

Kerry Cox

I owe many thanks to all the people who shared with me their time, talents, and experiences while patiently answering my questions. Thanks especially to all the employees at KSL, Bonneville International, Bonneville Communications, LDS Business College, and Deseret Management Corporation who allowed me to install intrusion detection systems on their servers and then critiqued the systems' performance, providing me with feedback that assisted in many ways to make this a better book.

I would especially like to thank all the technical and nontechnical staff with whom I work at Bonneville International, KSL, and the Deseret Management Corporation: Greg James, Roger Graves, Owen Smoot, Don Huntsman, Steve Tolman, Edward Cheadle, Brent Cherrington, Mark Fenton, Jason Williams, Hal Whitlock, Steve Wise, Bryan Carter, Brent Cole, Karl Hancock, Trevor Gunnell, Jamie Hall, Kevin McReynolds, Julie Hill, Jason Jones, Amy Kimball, Pat Neilson, and the many others whom I may have forgotten.

According to Eric S. Raymond, "Given enough eyeballs, all bugs are shallow." This was especially true of the assistance I received from many friends and co-workers. There are fewer errors here than there might otherwise have been thanks to their diligence in proofing this material. I am deeply indebted to these people for the time and effort they took to verify the accuracy of what I wrote. I consider each and every one contributing editors to this work. This is as much for them as it is for the readers.

I wish especially to thank the following people, who spent many hours reviewing and critiquing the text and code of this book before submissions were sent to O'Reilly. I am extremely grateful to Jason Jones for checking each chapter's syntax and tightening up the content. He pointed out some crucial items that made the reading flow better. Our conversations to and from work every day helped to improve the quality of this material. I am deeply indebted to him for all his work.

I wish to thank Brad Hokanson for testing the source code and installing numerous programs on his machines. He proved that everything shown here actually works on various operating systems. His work with encryption and wireless security was most valuable. I want to thank Jason Williams for his help in proofing the layout and looking over the subject matter for viability. Edward Cheadle was very helpful in implementing many of these applications in real-world scenarios. His feedback improved much of the content.

Thanks to Steve Scott for his assistance in providing detailed IDS documentation. Also, I owe many thanks to Patrick S. Harper for his useful notes and explanations for performing a full source-code install. His excellent paper has helped many a beginner on the road to configuring a working IDS box. Thanks also to Jamie Hall and Karl Hancock for continued feedback from their own experiences with open source intrusion detection systems.

I also need to thank Jason Williams again, for providing me with the laptop on which I ran Linux. Many are the nights and days on the train I was able to write this book thanks to his donation. It proved very useful for testing Kismet and AirSnort and setting up wireless security applications.

My hat is also off to Mike Loukides for his assistance in bringing this book to print. He provided invaluable suggestions for improving the layout, content, and syntax of each chapter. I value his input and appreciate the trust he has placed in me. I want to also thank the several technical reviewers who proofed this document for potential flaws or errors. I want to personally thank Edin Dizdarevic for his close scrutiny, analysis, and commentary. I very much enjoyed his German commentary and notes on each section. Thanks also to the other editors who contributed their time and talents to making this a better book: Kevin Binsfield, Andrea Barisani, Daniel Harrison, and Adam Hogan.

I would especially like to thank my wife, Karen, for her encouragement. It was she who suggested I write this book and stood by me these past few months. Her unwavering support has not gone unnoticed. I have also my boys to thank for their encouragement. Kids, I'm finally done. Let's play.

Christopher Gerg

This book would not have been possible without the support of my peers, friends, and family. The Security Services team that I work with at Berbee Information Networks is the most talented and diverse group of people I've had the privilege to work and learn with. I've learned more in the last five years than I have up to that point in my life. Paul Tatarsky, Matt Jach, Peyton Engel, David Klann, and Joe Mondloch have shared their wit and large brains with me most generously. I hope I'm able to repay a fraction of the debt I owe. (Assume the horse stance...)

Thanks to Eric Patterson for everything.

Of course, I wouldn't be able to accomplish much of anything without the support of my wife, Becky, and our two crumb-crunchers, Matthew (shorty) and Sarah (the Bunner). They keep me sane and centered. Well, centered, anyway.

Standard thanks to my Mother and Father for having me and setting the stage for my career and fruitful adulthood. (Hi, Jessika!)

A special thanks to Jim Elliot for introducing me to my editor, Mike Loukides. Thanks, Mike, for giving me the opportunity to step into this project. The work of John Ives, the technical reviewer, was excellent thank you very much.



Managing Security With Snort and IDS Tools
Managing Security with Snort and IDS Tools
ISBN: 0596006616
EAN: 2147483647
Year: 2006
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net