Acknowledgements

   

Writing is an invigorating process; it can also be long and involved. A book like this means spending a lot of time working with a lot of really smart people, and learning from their experience.

There were so many people involved in the creation of this book that I am not sure where to start, so I will go chronologically.

I want to thank Li Glover, Tony Wynes, and Sean Murhpy for their guidance and support at UUNET, they helped me learn the network, and explore where it was vulnerable. They also covered for me when I went too far.

Shoeb Siraj and Steve Shippa were incredibly understanding while I was writing, providing me the necessary leeway to produce a great book.

Neil Salkind and Vicki Harding were great at unearthing this opportunity and smoothing things over with Prentice Hall when I fell behind.

Mary Franz, at Prentice Hall, has the patience of a cactus. Working with a first-time author, especially one with a newborn , a fulltime job, and no apparent concept of deadlines can be trying. Thank you for your understanding and helpfulness along the way.

Ed Skoudis provided very insightful input to the original proposal, and helped to tighten the focus of the book. Ben Liska also provided great assistance with the original proposal, and throughout the book.

Jorj Bauer and Todd O'Boyle, who reviewed this book, were amazing. Their guidance, suggestions, and challenges to my original text helped transform this work into a much better book.

Jeff Gunther at Intalgent Technologies, Mike Sweeney at Packetattack, George Simmons and Ken Durazzo from Cisco, and James VanBokkelen and the staff at Sandstorm Enterprises for their expertise and assistance with various parts of the book.

Tina Bird and Norm Laudermilch both served as great sounding boards for some of the ideas in this book and really helped me refine those ideas.

Elizabeth Martin and Wil Mara were incredibly helpful during the final stages of this book. Wil pushed to make sure that every little detail was taken care of, improving the final product significantly, and Elizabeth for reviewing the text and producing a much more polished work than what I originally submitted.

I would also like to thank the people whose tools or websites are mentioned throughout this book. Without access to some of these tools protecting a network would be significantly more expensive and time consuming. In addition to great tools, I want to thank the people sharing security information. Companies and web sites like CERT/CC, CIAC, Security Focus, MITRE, and Whitehats provide an invaluable service to the networking community.

Finally, I would like to thank my wife, Roseanne, and my son Bruce. I realize there were a lot of late nights and time away over the last six months. Your unwavering support and love during this period means the world to me, and reminds me how truly blessed I am to have such a wonderful family. I love you both.

   


The Practice of Network Security. Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors: Allan Liska

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net