A practical guide with well presented explanations of both the technical and human sides of a particular aspect of computer security. --Book News, No. 7, 2001 ...a significant contribution to the body of literature in the field of information security... --Information Security Bulletin, June 2001 The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology, it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely. Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors. Back cover description This book will help the CEO, the CIO, information technology managers, and business persons with an interest in the architecture, design, and configuration of a secure computing environment. This book discusses and reviews the strategies, steps, and procedures necessary to conduct business securely on the Internet. The Internet Security Guidebook: From Planning to Deployment provides an analysis of an enterprise's complete Internet security. Very few organizations take the needed precautions to protect their Internet-facing enterprises. Protection for the Internet-facing enterprise is not just a firewall, it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach, offered in this book, evaluates the security needs in relation to the business goals and the current attacks on our Internet. Specific steps that show the reader how to implement security from the individual process to the complete corporate enterprise are discussed and illustrated. About the authors: Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer. Juanita Ellis was the lead technical architect in Lotus Consulting for the Southern, Mid Atlantic, and Eastern regions of the U. S. She was responsible for designing and architecting enterprise-wide applications that integrated with Enterprise Resource Planning Systems, Internet technologies, and relational and transaction-based systems. She is the co-author of The E-Commerce Book: Building the E-Empire, (1st and 2nd), AP.