Practical and authoritative, this book delivers details on how to secure internal networks from Internet intrusion, how to customize firewalls and network configuration files to suit specific security needs, and how to configure and use the controversial SATAN software, as well as security tools available via Anonymous FTP.