September 2004
Intermediate to advanced
352 pages
11h 44m
English
The original intention was to have several authors assist in the creation of this book. Unfortunately, schedules, pressures, workloads, and unforeseen changes in focus—a regular occurrence over the lifetime of writing a book—limited contributions. However, a couple of individuals accepted my challenge to provide elements of this book and delivered above expectations.
Felicia Nicastro, CISSP, a principal security consultant for International Network Services based in New York, was very helpful in creating elements for policies and procedures, implementation, and the exploitation section. She also helped in reviewing the book several times to keep things on track. She has published several papers and articles, including the paper, ...