ACKNOWLEDGMENTS

Seymour Bosworth, Senior Editor I would like to give grateful recognition to Arthur Hutt and Douglas Hoyt, my coeditors of the first, second, and third editions of this Handbook. Although both Art and Doug are deceased, their commitment and their competence remain as constant reminders that less than excellence is acceptable. Mich Kabay, my coeditor from the fourth edition, and Eric Whyne, our new third editor, continue in that tradition. I would not have wanted to undertake this project without them.

We mark with sadness the passing of our friend and colleague Robert Jacobson, who contributed to Chapter 1 (Brief History and Mission of Information System Security) and wrote Chapter 62 (Risk Assessment and Risk Management). Bob was a significant and valued contributor to the development of our field, and we miss his cheerful intelligence. We also miss Diane Levine, who contributed so much to both the third and fourth editions. She wrote four chapters in the third edition and six in the fourth. We are honored to continue to list her as a coauthor on five updated chapters in the fifth edition.

Thanks are also due to our colleagues at John Wiley & Sons: Tim Burgard as Acquisitions Editor, Stacey Rympa as Development Editor, Natasha Andrews-Noel as Senior Production Editor, and Debra Manette as Copyeditor and Joe Ruddick as Proofreader. All have performed their duties in an exemplary manner and with unfailing kindness, courtesy, and professionalism.

M. E. Kabay, Technical Editor The contributions from my faculty colleagues and from our alumni in the Master of Science in Information Assurance (MSIA) program at Norwich University are noteworthy. Many of the Handbook's authors are graduates of the MSIA program, instructors in the program, or both.

I am immeasurably grateful to Sy for his leadership in this project. In addition to the inherent value of his decades of experience in the field of information security, his insightful editorial comments and queries have forced everyone on the project to strive for excellence in all aspects of our work. He is also fun to work with!

Our coeditor Eric Whyne has loyally persevered in his editorial tasks despite ducking bullets in the war in Iraq, where he has served honorably throughout most of the project. Our thanks to him for his service to the nation and to this project.

Our authors deserve enormous credit for the professional way in which they responded to our requests, outlines, suggestions, corrections, and nagging. I want to express my personal gratitude and appreciation for their courteous, collaborative, and responsive interactions with us.

Finally, as always, I want to thank my beloved wife, Deborah Black, light of my life, for her support and understanding over the years that this project has taken away from our time together.

Eric Whyne, Associate Editor There is an enormous amount of work put into a text of this size. The diligent and gifted authors who have contributed their time are some of the brightest and most experienced professionals in their fields. They did so not for compensation but because they love the subjects which they have put so much effort into mastering. The Computer Security Handbook will continue its tradition of being a collection point for these labors so long as there are great minds in love with the challenging problems of computer security and willing to devote their time to sharing solutions.

At the time I started on the project, I was a Marine Officer working in the data communications field in Ramadi, Iraq. I worked the night shift and spent my afternoons perched in a folding chair, under the relatively cool Iraq winter sun, writing correspondence and doing first-past edits of the chapters of the Handbook. Upon my return to the United States, my spare evenings along the North Carolina coast were dedicated to the Handbook as I worked my day job as the Marine Corps Anti-Terrorism Battalion Communications Officer. Since then I have deployed once more to Iraq as an advisor to the Iraqi Army. Everywhere I have gone, and with every job I have held, I have been able to apply and refine the principles covered in this Handbook and in previous versions. From the most high-tech cutting-edge, multiplexed satellite communications system used in military operations in Iraq, to the relatively mundane desktop computer networks of offices in the United States, to the ancient weathered computers the Iraqi Army totes around with them and ties into the power grid at any opportunity, computer security is critical to the accomplishment of the most basic tasks these systems are used for.

Unarguably, the exchange of information and ideas has been the largest factor in the shaping and betterment of our world throughout history. Having spent the last year of my life living as a local in a third-world country, that fact is fresh on my mind. In that spirit, computers are recognized as the most powerful and universally applicable tool ever devised. This book's purpose is to help you ensure that your computers remain powerful and successfully applied to the tasks for which you intend them to be used.

I am grateful to Sy Bosworth and Mich Kabay for their faith in bringing me into this project, and for their guidance and leadership along the way. They are both great people, and it has been an honor and a joy to work with them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.86.86