Intrusion Detection: Network Security beyond the Firewall
(Publisher: John Wiley & Sons, Inc.)
Author(s): Terry Escamilla
ISBN: 0471290009
Publication Date: 11/01/98

Table of Contents


Acknowledgments

For my family—the people I can always count on to be there.

My friends and professional colleagues at Haystack Labs during 1996—97 were an endless source of ideas and humor. Steve Snapp, Scott Chapman, Crosby Marks, Tom Bernhard, Marta Z., Bill Leddy, Bill Kainer, Virgil Itliong, Rich Letsinger, and Boomer all deserve my warmest thanks. Fred Pinkett, Steve Artick, and Jim Geary provided guidance and insight about the broader computer security industry, and Steve proved to be a valuable career counselor as well. Charisse Castagnoli has delivered an endless stream of new information, practical experience, and friendship. She deserves a very special thanks. Steve Smaha and Jessica Winslow were always encouraging and insightful when I worked with them, and, of course, Steve’s historical perspective on intrusion detection was invaluable.

A number of people influenced the book without knowing it. These professionals were kind enough to humor my ideas and to explore computer security with me in conversations. Thanks are thus also extended to Eli Singer, Dave Dalva, Lee Terrell, and Peter Crotty. Some of my new colleagues at IBM have been valuable because of their practical experiences and ideas about where network security is headed. John Simmons, Lance Walker, Grant Miller, Bob Pryor, Bill Althauser, Steve Burnham, and Michael Bauer have been especially helpful. I also am grateful to my manager, Alma Rosales, for being kind-hearted and understanding while the book was finished. Some people contributed graphics, comments, contacts, and other information when sorely needed. For their assistance, I wish to thank Marianne Rochelle, Paul Proctor, and David Drake.

Carol Long from Wiley used her knowledge of the security marketplace to keep the book focused appropriately. Carol also deserves credit for choosing the theme of the book and for recognizing the need for an overview of intrusion detection on the bookshelves. She was dependable for providing a solid perspective on the marketplace, for delightful conversation, and for saying the right things to keep me moving.

I cannot find enough words to thank Pam Sobotka (also from Wiley). Pam fulfilled many roles—motivator, scheduler, editor, reviewer, sounding board, and too many others to completely list. I could always count on a friendly voice of encouragement on the other end of the phone anytime Pam would call.

My parents, brothers, and sisters taught me many lessons about life, including the importance of being dedicated. Although they understandably had only a passing interest in intrusion detection, they regularly supplied enthusiasm and a kind reminder that some day the writing would be complete. I can scarcely begin to thank them for all the treasures they have given me.

Finally, my deepest thanks are reserved for my wife, Becky, and my two children, Brent and Meghann. They have tolerated the long writing sessions into the early hours of the morning, the scattered books and papers in the house, the seemingly endless business trips, and a fair dose of other inconveniences while I completed this book. Without their love and support, this task surely would have been impossible.


Table of Contents