A book/CD-ROM explaining how firewalls, packet filtering, and proxy servers work and showing how to use them to protect a Web site. Offers step-by-step directions for planning, implementing, and maintaining a firewall and related security technologies, with checklists and case studies, and tells how to pursue an intruder. Includes listings of products, software, and consultants. The companion CD-ROM contains a full evaluation copy of Web-logging and reporting software for Windows NT Webservers.